WorldWideScience

Sample records for water intrusion model

  1. Calibrating a Salt Water Intrusion Model with Time-Domain Electromagnetic Data

    DEFF Research Database (Denmark)

    Herckenrath, Daan; Odlum, Nick; Nenna, Vanessa

    2013-01-01

    Salt water intrusion models are commonly used to support groundwater resource management in coastal aquifers. Concentration data used for model calibration are often sparse and limited in spatial extent. With airborne and ground-based electromagnetic surveys, electrical resistivity models can......, we perform a coupled hydrogeophysical inversion (CHI) in which we use a salt water intrusion model to interpret the geophysical data and guide the geophysical inversion. We refer to this methodology as a Coupled Hydrogeophysical Inversion-State (CHI-S), in which simulated salt concentrations...... are transformed to an electrical resistivity model, after which a geophysical forward response is calculated and compared with the measured geophysical data. This approach was applied for a field site in Santa Cruz County, California, where a time-domain electromagnetic (TDEM) dataset was collected...

  2. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  3. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  4. Effective use of surface-water management to control saltwater intrusion

    Science.gov (United States)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  5. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  6. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  7. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  8. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  9. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    Science.gov (United States)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  10. Numerical modeling of seawater intrusion in Zhoushuizi district of Dalian City, China

    Science.gov (United States)

    Zhao, J.; Lin, J.; Wu, J.

    2013-12-01

    A three-dimensional heterogeneous density-dependent numerical model was constructed to simulate the seawater intrusion process in coastal aquifers in Zhoushuizi Region, Dalian City. Model calibration was achieved through a prediction-correction method by adjusting the zonation and values of hydrogeologic parameters until the calculated heads and concentrations matched the observed values. Model validation results also showed that it was reasonable under current data conditions. Then the calibrated and validated model was applied to predict the dynamics and trend of seawater intrusion according to the current groundwater abstraction conditions in this study area 30 years after 2010. Prediction results showed that overall seawater intrusion in the future would be even more severe. Actually, with the growing of the population and development of the economy, the demand for ground water will be increasing continuously so that the problem of seawater intrusion may be more serious than that predicted by the modelin this study. Better strategies for reasonably governing exploitation of groundwater in the study area can be further developed by using this three-dimensional seawater intrusion model.

  11. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  12. Geoelectric imaging for saline water intrusion in Geopark zone of Ciletuh Bay, Indonesia

    Science.gov (United States)

    Ardi, N. D.; Iryanti, M.; Asmoro, C. P.; Yusuf, A.; Sundana, A. N. A.; Safura, H. Y.; Fitri, M.; Anggraeni, M.; Kurniawan, R.; Afrianti, R.; Sumarni

    2018-05-01

    Saline water intrusion in estuary is an urgent ecological encounter across the world. The Ciletuh Bay, located in the southern Sukabumi district, is an area with high cultivated potential becoming one of the most important geology tourism zones in Indonesia. However, salt water intrusion along the creek is a natural spectacle that disturbs the economic growth of the whole region. This research was intended at plotting the subsurface level of saltwater interventions into aquifers at the northern part of Ciletuh creek, Indonesia. The study implemented geoelectric imaging methods. 37 imaging datum were acquired using Wenner array configuration. The saline water were identified across the study area. The result of two dimensional cross-sectional resistivity shows that there is an indication of sea content in our measured soil, i.e. the smallest resistivity value is 0.579 Ωm found at a depth of 12.4 m to 19.8 m at a track length of 35 m to 60 m is categorized in the clayey which shows low groundwater quality. However, when compared with the results of direct observation of groundwater from the wells of residents, the water obtained is brackish water. A water chemistry test is conducted to ascertain the initial results of this method so that a potential sea intrusion potential map can be interpreted more clearly. This can consequently help as an extrapolative model to define depth to saline water at any site within the saline water zone in the study area.

  13. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  14. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  15. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  16. Using a time lapse microgravity model for mapping seawater intrusion around Semarang

    Energy Technology Data Exchange (ETDEWEB)

    Supriyadi,, E-mail: supriyadi@mail.unnes.ac.id; Khumaedi [Physics Department, Semarang State University (UNNES), D7 Building 2nd Floor FMIPA Sekaran Gunungpati (Indonesia); Yusuf, M. [Badan Meteologi Klimatologi Goefisika (BMKG), Jl.Angkasa I No.2 Kemayoran Jakarta Pusat (Indonesia); Agung, W. [Physics Department, Diponegoro University (UNDIP), Jl. Prof. Soedharto, Tembalang, Semarang (Indonesia)

    2016-03-11

    A modeling of time-lapse microgravity anomaly due to sea water intrusion has been conducted. It used field data of aquifer cross section, aquifer thickness and lithology of research area. Those data were then processed using Grav3D and Surfer. Modeling results indicated that the intrusion of sea water resulting in a time-lapse microgravity anomalies of 0.12 to 0.18 mGal, at soil layer density of 0.15 g/cm{sup 3} to 0.3 g/cm{sup 3} and at depth of 30 to 100 m. These imply that the areas experiencing seawater intrusion were Tanjung Mas, SPBE Bandarharjo, Brass, Old Market Boom and Johar as the microgravity measured there were in the range of 0.12 to 0.18 mGal and the density contrast were at 0.15 g/cm{sup 3} to 0.28 g/cm{sup 3}. Areas that experienced fluid reduction were Puri Anjasmoro, Kenconowungu and Puspowarno with microgravity changes from -0.06 mGal to -0.18 mGal.

  17. Saline-water intrusion related to well construction in Lee County, Florida

    Science.gov (United States)

    Boggess, Durward Hoye; Missimer, T.M.; O'Donnell, T. H.

    1977-01-01

    Ground water is the principle source of water supply in Lee County, Florida where an estimated 30,000 wells have been drilled since 1990. These wells ranges in depth from about 10 to 1,240 feet and tap the water table aquifer or one or more of the artesian water-bearing units or zones in the Tamiami Formation, the upper part of the Hawthorn Formation, the lower part of the Hawthorn Formation and the Tampa Limestone and the Suwannee Limestone. Before 1968, nearly all wells were constructed with galvanized or black iron pipe. Many of these wells are sources of saline-water intrusion into freshwater-bearing zones. The water-bearing zones in the lower part of the Hawthorn Formation, Tampa Limestone, and Suwannee Limestone are artesian-they have higher water levels and usually contain water with a higher concentration of dissolved solids than do the aquifers occurring at shallower depths. The water from these deeper aquifers generally range in dissolved solids concentration from about 1,500 to 2,400 mg/L, and in chloride from about 500 to 1,00 mg/L. A maximum chloride concentration of 15,200 mg/L has been determined. Few of the 3,00 wells estimated to have been drilled to these zones contain sufficient casing to prevent upward flow into overlaying water-bearing zones. Because of water-level differentials, upward movement and lateral intrusion of saline water occurs principally into the upper part of the Hawthorn Formation where the chloride concentrations in water unaffected by saline-water intrusion ranges from about 80 to 150 mg/L. Where intrusion from deep artesian zones has occurred, the chloride concentration in water from the upper part of the Hawthorn Formation ranges from about 300 to more than 2,100 mg/L Surface discharges of the saline water from wells tapping the lower part of the Hawthorn Formation and the Suwannee Limestone also had affected the water-table aquifer which normally contains water with 10 to 50 mg/L of chloride. In one area, the chloride

  18. A Simulation-Optimization Model for Seawater Intrusion Management at Pingtung Coastal Area, Taiwan

    Directory of Open Access Journals (Sweden)

    Po-Syun Huang

    2018-02-01

    Full Text Available The coastal regions of Pingtung Plain in southern Taiwan rely on groundwater as their main source of fresh water for aquaculture, agriculture, domestic, and industrial sectors. The availability of fresh groundwater is threatened by unsustainable groundwater extraction and the over-pumpage leads to the serious problem of seawater intrusion. It is desired to find appropriate management strategies to control groundwater salinity and mitigate seawater intrusion. In this study, a simulation–optimization model has been presented to solve the problem of seawater intrusion along the coastal aquifers in Pingtung Plain and the objective is using injection well barriers and minimizing the total injection rate based on the pre-determined locations of injection barriers. The SEAWAT code is used to simulate the process of seawater intrusion and the surrogate model of artificial neural networks (ANNs is used to approximate the seawater intrusion (SWI numerical model to increase the computational efficiency during the optimization process. The heuristic optimization scheme of differential evolution (DE algorithm is selected to identify the global optimal management solution. Two different management scenarios, one is the injection barriers located along the coast and the other is the injection barrier located at the inland, are considered and the optimized results show that the deployment of injection barriers at the inland is more effective to reduce total dissolved solids (TDS concentrations and mitigate seawater intrusion than that along the coast. The computational time can be reduced by more than 98% when using ANNs to replace the numerical model and the DE algorithm has been confirmed as a robust optimization scheme to solve groundwater management problems. The proposed framework can identify the most reliable management strategies and provide a reference tool for decision making with regard to seawater intrusion remediation.

  19. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  20. Effects of sea-level rise on salt water intrusion near a coastal well field in southeastern Florida

    Science.gov (United States)

    Langevin, Christian D.; Zygnerski, Michael

    2013-01-01

    A variable-density groundwater flow and dispersive solute transport model was developed for the shallow coastal aquifer system near a municipal supply well field in southeastern Florida. The model was calibrated for a 105-year period (1900 to 2005). An analysis with the model suggests that well-field withdrawals were the dominant cause of salt water intrusion near the well field, and that historical sea-level rise, which is similar to lower-bound projections of future sea-level rise, exacerbated the extent of salt water intrusion. Average 2005 hydrologic conditions were used for 100-year sensitivity simulations aimed at quantifying the effect of projected rises in sea level on fresh coastal groundwater resources near the well field. Use of average 2005 hydrologic conditions and a constant sea level result in total dissolved solids (TDS) concentration of the well field exceeding drinking water standards after 70 years. When sea-level rise is included in the simulations, drinking water standards are exceeded 10 to 21 years earlier, depending on the specified rate of sea-level rise.

  1. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  2. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Science.gov (United States)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  3. Effect of sea-level rise on salt water intrusion near a coastal well field in southeastern Florida.

    Science.gov (United States)

    Langevin, Christian D; Zygnerski, Michael

    2013-01-01

    A variable-density groundwater flow and dispersive solute transport model was developed for the shallow coastal aquifer system near a municipal supply well field in southeastern Florida. The model was calibrated for a 105-year period (1900 to 2005). An analysis with the model suggests that well-field withdrawals were the dominant cause of salt water intrusion near the well field, and that historical sea-level rise, which is similar to lower-bound projections of future sea-level rise, exacerbated the extent of salt water intrusion. Average 2005 hydrologic conditions were used for 100-year sensitivity simulations aimed at quantifying the effect of projected rises in sea level on fresh coastal groundwater resources near the well field. Use of average 2005 hydrologic conditions and a constant sea level result in total dissolved solids (TDS) concentration of the well field exceeding drinking water standards after 70 years. When sea-level rise is included in the simulations, drinking water standards are exceeded 10 to 21 years earlier, depending on the specified rate of sea-level rise. Published 2012. This article is a U.S. Government work and is in the public domain in the USA.

  4. Bacterial amplification and in-place carpet drying: implications for category 1 water intrusion restoration.

    Science.gov (United States)

    Holland, Jim; Banta, John; Passmore, Boni; Ayers, Mark; Abbott, Sean P; Cole, Eugene C

    2012-05-01

    The study described in this article investigated whether in-place carpet drying processes resulted in bacterial amplification following water intrusion from a clean water source (category 1) in a residential indoor environment. Bacterial amplification was examined after wetting a 10-year-old carpet and pad that had no history of water intrusion. Three test areas were extracted and dried using industry-recommended procedures for in-place drying and compared to a control area that was not extracted or dried. Results from carpet, pad, and subsurface dust demonstrated that bacterial amplification occurred in all test areas. CFUs of bacteria per gram of carpet surface dust and subsurface dust prior to water intrusion were lower than levels in subsurface dust after in-place drying. The authors' study contributes to information regarding the restoration of water-based carpet damage by professional water damage restoration companies, building maintenance personnel, and housekeeping managers. Results suggest that the appropriate response time for carpet pad salvage is considerably shorter than the current industry recommendation of 72 hours.

  5. Simulation-Optimization Model for Seawater Intrusion Management at Pingtung Coastal Area, Taiwan

    Science.gov (United States)

    Huang, P. S.; Chiu, Y.

    2015-12-01

    In 1970's, the agriculture and aquaculture were rapidly developed at Pingtung coastal area in southern Taiwan. The groundwater aquifers were over-pumped and caused the seawater intrusion. In order to remedy the contaminated groundwater and find the best strategies of groundwater usage, a management model to search the optimal groundwater operational strategies is developed in this study. The objective function is to minimize the total amount of injection water and a set of constraints are applied to ensure the groundwater levels and concentrations are satisfied. A three-dimension density-dependent flow and transport simulation model, called SEAWAT developed by U.S. Geological Survey, is selected to simulate the phenomenon of seawater intrusion. The simulation model is well calibrated by the field measurements and replaced by the surrogate model of trained artificial neural networks (ANNs) to reduce the computational time. The ANNs are embedded in the management model to link the simulation and optimization models, and the global optimizer of differential evolution (DE) is applied for solving the management model. The optimal results show that the fully trained ANNs could substitute the original simulation model and reduce much computational time. Under appropriate setting of objective function and constraints, DE can find the optimal injection rates at predefined barriers. The concentrations at the target locations could decrease more than 50 percent within the planning horizon of 20 years. Keywords : Seawater intrusion, groundwater management, numerical model, artificial neural networks, differential evolution

  6. Study of Ground water Groundwater Potentiality and Sea Water Intrusion Along along the Coastal Plain, Wadi Thuwal, KSA- A Case Study Based on DC Resistivity

    Directory of Open Access Journals (Sweden)

    Mansour A. Al-Garni

    2010-12-01

    Full Text Available The present study mainly aims to outline zones that have groundwater potentiality with good quality and those which are affected by sea water intrusion. The electrical resistivity data were acquired over an area of about 170 km2 of a coastal plain, Wadi Thuwal, which is bounded by the Red Sea in the west and the volcanic hills in the east.  In such an area, resistivity measurements, using n-layering model, reveal generally reveal a wide range of resistivity values which do not reflect the reality. Hence, the statistical analysis has to be involved to overcome this problem and to make the final interpretation reliable.  In our case, the n-layer models were modified to another statistical geoelectric models (SLM, consisting of  a number of layers equivalent to the stratigraphic layering beneath each VES site. The modified models were used to outline the depth to the bed rock, groundwater accumulation zones and  water table as well as to define the effect of sea water intrusion through the study area. Check alignment above

  7. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Directory of Open Access Journals (Sweden)

    W. Gong

    2018-02-01

    Full Text Available Salt intrusion in the Pearl River estuary (PRE is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  8. Testing alternative conceptual models of seawater intrusion in a coastal aquifer using computer simulation, southern California, USA

    Science.gov (United States)

    Nishikawa, Tracy

    1997-01-01

    Two alternative conceptual models of the physical processes controlling seawater intrusion in a coastal basin in California, USA, were tested to identify a likely principal pathway for seawater intrusion. The conceptual models were tested by using a two-dimensional, finite-element groundwater flow and transport model. This pathway was identified by the conceptual model that best replicated the historical data. The numerical model was applied in cross section to a submarine canyon that is a main avenue for seawater to enter the aquifer system underlying the study area. Both models are characterized by a heterogeneous, layered, water-bearing aquifer. However, the first model is characterized by flat-lying aquifer layers and by a high value of hydraulic conductivity in the basal aquifer layer, which is thought to be a principal conduit for seawater intrusion. The second model is characterized by offshore folding, which was modeled as a very nearshore outcrop, thereby providing a shorter path for seawater to intrude. General conclusions are that: 1) the aquifer system is best modeled as a flat, heterogeneous, layered system; 2) relatively thin basal layers with relatively high values of hydraulic conductivity are the principal pathways for seawater intrusion; and 3) continuous clay layers of low hydraulic conductivity play an important role in controlling the movement of seawater.

  9. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  10. Economic impacts of urban flooding in South Florida: Potential consequences of managing groundwater to prevent salt water intrusion.

    Science.gov (United States)

    Czajkowski, Jeffrey; Engel, Vic; Martinez, Chris; Mirchi, Ali; Watkins, David; Sukop, Michael C; Hughes, Joseph D

    2018-04-15

    High-value urban zones in coastal South Florida are considered particularly vulnerable to salt water intrusion into the groundwater-based, public water supplies caused by sea level rise (SLR) in combination with the low topography, existing high water table, and permeable karst substrate. Managers in the region closely regulate water depths in the extensive South Florida canal network to control closely coupled groundwater levels and thereby reduce the risk of saltwater intrusion into the karst aquifer. Potential SLR adaptation strategies developed by local managers suggest canal and groundwater levels may have to be increased over time to prevent the increased salt water intrusion risk to groundwater resources. However, higher canal and groundwater levels cause the loss of unsaturated zone storage and lead to an increased risk of inland flooding when the recharge from rainfall exceeds the capacity of the unsaturated zone to absorb it and the water table reaches the surface. Consequently, higher canal and groundwater levels are also associated with increased risk of economic losses, especially during the annual wet seasons. To help water managers and urban planners in this region better understand this trade-off, this study models the relationships between flood insurance claims and groundwater levels in Miami-Dade County. Via regression analyses, we relate the incurred number of monthly flood claims in 16 Miami-Dade County watersheds to monthly groundwater levels over the period from 1996 to 2010. We utilize these estimated statistical relationships to further illustrate various monthly flood loss scenarios that could plausibly result, thereby providing an economic quantification of a "too much water" trade-off. Importantly, this understanding is the first of its kind in South Florida and is exceedingly useful for regional-scale hydro-economic optimization models analyzing trade-offs associated with high water levels. Copyright © 2017 Elsevier B.V. All rights

  11. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  12. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  13. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  14. Analysing monthly sectorial water use and its influence on salt intrusion induced water shortage in urbanized deltas

    NARCIS (Netherlands)

    Yao, Mingtian; Yan, Dan; Kabat, Pavel; Huang, Heqing; Hutjes, Ronald W.A.; Werners, Saskia E.

    2016-01-01

    Urbanizing delta regions face seasonal water shortages induced by rising salt intrusion. Decreasing river discharge is readily listed as the major cause of water shortage events. Yet, observations of river discharge often fail to support this attribution. Evidence of the association between

  15. Integral Analysis of Field Work and Laboratory Electrical Resistivity Imaging for Saline Water Intrusion Prediction in Groundwater

    Science.gov (United States)

    Zawawi, M. H.; Zahar, M. F.; Hashim, M. M. M.; Hazreek, Z. A. M.; Zahari, N. M.; Kamaruddin, M. A.

    2018-04-01

    Saline water intrusion is a serious threat to the groundwater as many part of the world utilize groundwater as their main source of fresh water supply. The usage of high salinity level of water as drinking water can lead to a very serious health hazard towards human. Saline water intrusion is a process by which induced flow of seawater into freshwater aquifer along the coastal area. It might happen due to human action and/or by natural event. The climate change and rise up of sea level may speed up the saline water intrusion process. The conventional method for distinguishing and checking saltwater interference to groundwater along the coast aquifers is to gather and test the groundwater from series of observation wells (borehole) with an end goal to give the important information about the hydrochemistry data to conclude whether the water in the well are safe to consume or not. An integrated approach of field and laboratory electrical resistivity investigation is proposed for indicating the contact region between saline and fresh groundwater. It was found that correlation for both soilbox produced almost identical curvilinear trends for 2% increment of seawater tested using sand sample. This project contributes towards predicting the saline water intrusion to the groundwater by non-destructive test that can replaced the conventional method of groundwater monitoring using series of boreholes in the coastal area

  16. Application of a Density-Dependent Numerical Model (MODHMS) to Assess Salinity Intrusion in the Biscayne Aquifer, North Miami-Dade County, Florida

    Science.gov (United States)

    Guha, H.; Panday, S.

    2005-05-01

    Miami-Dade County is located at the Southeastern part of the State of Florida adjoining the Atlantic coast. The sole drinking water source is the Biscayne Aquifer, which is an unconfined freshwater aquifer, composed of marine limestone with intermediate sand lenses. The aquifer is highly conductive with hydraulic conductivity values ranging from 1,000 ft/day to over 100,000 ft/day in some areas. Saltwater intrusion from the coast is an immediate threat to the freshwater resources of the County. Therefore, a multilayer density-dependent transient groundwater model was developed to evaluate the saltwater intrusion characteristics of the system. The model was developed using MODHMS, a finite difference, fully coupled groundwater and surface water flow and transport model. The buoyancy term is included in the equation for unconfined flow and the flow and transport equations are coupled using an iterative scheme. The transport equation was solved using an adaptive implicit total variation diminishing (TVD) scheme and anisotropy of dispersivity was included for longitudinal, transverse, vertical transverse, and vertical longitudinal directions. The model eastern boundaries extended approximately 3.5 miles into the Atlantic Ocean while the western boundary extended approximately 27 miles inland from the coast. The northern and southern boundaries extend 6 miles into Broward County and up to the C-100 canal in Miami-Dade County respectively. Close to 2 million active nodes were simulated, with horizontal discretization of 500 feet. A total of nine different statistical analyses were conducted with observed and simulated hydraulic heads. The analysis indicates that the model simulated hydraulic heads matched closely with the observed heads across the model domain. In general, the model reasonably simulated the inland extent of saltwater intrusion within the aquifer, and matched relatively well with limited observed chloride data from monitoring wells along the coast

  17. Simulation Of Seawater Intrusion With 2D And 3D Models: Nauru Island Case Study

    Science.gov (United States)

    Ghassemi, F.; Jakeman, A. J.; Jacobson, G.; Howard, K. W. F.

    1996-03-01

    With the advent of large computing capacities during the past few decades, sophisticated models have been developed for the simulation of seawater intrusion in coastal and island aquifers. Currently, several models are commercially available for the simulation of this problem. This paper describes the mathematical basis and application of the SUTRA and HST3D models to simulate seawater intrusion in Nauru Island, in the central Pacific Ocean. A comparison of the performance and limitations of these two models in simulating a real problem indicates that three-dimensional simulation of seawater intrusion with the HST3D model has the major advantage of being able to specify natural boundary conditions as well as pumping stresses. However, HST3D requires a small grid size and short time steps in order to maintain numerical stability and accuracy. These requirements lead to solution of a large set of linear equations that requires the availability of powerful computing facilities in terms of memory and computing speed. Combined results of the two simulation models indicate a safe pumping rate of 400 m3/d for the aquifer on Nauru Island, where additional fresh water is presently needed for the rehabilitation of mined-out land.

  18. Groundwater Modeling in Coastal Arid Regions Under the Influence of Marine Saltwater Intrusion

    Science.gov (United States)

    Walther, Marc; Kolditz, Olaf; Grundmann, Jens; Liedl, Rudolf

    2010-05-01

    The optimization of an aquifer's "safe yield", especially within agriculturally used regions, is one of the fundamental tasks for nowaday's groundwater management. Due to the limited water ressources in arid regions, conflict of interests arise that need to be evaluated using scenario analysis and multicriterial optimization approaches. In the context of the government-financed research project "International Water Research Alliance Saxony" (IWAS), the groundwater quality for near-coastal, agriculturally used areas is investigated under the influence of marine saltwater intrusion. Within the near-coastal areas of the study region, i.e. the Batinah plains of Northern Oman, an increasing agricultural development could be observed during the recent decades. Simultaneously, a constant lowering of the groundwater table was registered, which is primarily due to the uncontrolled and unsupervised mining of the aquifers for the local agricultural irrigation. Intensively decreased groundwater levels, however, cause an inversion of the hydraulic gradient which is naturally aligned towards the coast. This, in turn,leads to an intrusion of marine saltwater flowing inland, endangering the productivity of farms near the coast. Utilizing the modeling software package OpenGeoSys, which has been developed and constantly enhanced by the Department of Environmental Informatics at the Helmholtz Centre for Environmental Research Leipzig (UFZ; Kolditz et al., 2008), a three-dimensional, density-dependent model including groundwater flow and mass transport is currently being built up. The model, comprehending three selected coastal wadis of interest, shall be used to investigate different management scenarios. The main focus of the groundwater modelling are the optimization of well positions and pumping schemes as well as the coupling with a surface runoff model, which is also used for the determination of the groundwater recharge due to wadi runoff downstream of retention dams. Based on

  19. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    Science.gov (United States)

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  20. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  1. New Observations of the Gulf of Aden Intermediate Water Intrusion into the Red Sea.

    Science.gov (United States)

    Bower, A.; Abualnaja, Y.

    2012-04-01

    The three-layer exchange flow between the Red Sea and the Indian Ocean during summer is characterized by a thick, northward intrusion of relatively cold, low-salinity and low in dissolved oxygen (Water (GAIW), sandwiched between two thin layers of outflow water. The flux of GAIW into the Red Sea is important in the heat, freshwater and nutrient budgets of the Red Sea, but the structure and pathways of the intrusion are not well-known due to a paucity of hydrographic and direct velocity observations. A research cruise was executed at the eastern side of the Red Sea during September-October 2011 to conduct the first large-scale survey of the intrusion. This mission is part of a series of expeditions in the Red Sea designed to investigate the seasonal Red Sea circulation. Surprisingly, the GAIW intrusion was observed to stretch nearly the entire length of the Red Sea (~1500 km) as a narrow eastern boundary current with subsurface velocity maximum of 0.1-0.3 m/s in the depth range 50-100 m. The intruding layer is weakly stratified compared to the background, possibly an indication of strong vertical mixing as it flows through the strait. Some GAIW was observed to enter deep channels in a coral reef bank (Farasan Banks) located in the southeastern Red Sea, and to enter the Red Sea interior, the latter possibly due to interactions between the boundary current and mesoscale eddies. The pathways and erosion of the GAIW intrusion will likely have major implications for the spatial distribution of biological productivity.

  2. On-line detection of Escherichia coli intrusion in a pilot-scale drinking water distribution system.

    Science.gov (United States)

    Ikonen, Jenni; Pitkänen, Tarja; Kosse, Pascal; Ciszek, Robert; Kolehmainen, Mikko; Miettinen, Ilkka T

    2017-08-01

    Improvements in microbial drinking water quality monitoring are needed for the better control of drinking water distribution systems and for public health protection. Conventional water quality monitoring programmes are not always able to detect a microbial contamination of drinking water. In the drinking water production chain, in addition to the vulnerability of source waters, the distribution networks are prone to contamination. In this study, a pilot-scale drinking-water distribution network with an on-line monitoring system was utilized for detecting bacterial intrusion. During the experimental Escherichia coli intrusions, the contaminant was measured by applying a set of on-line sensors for electric conductivity (EC), pH, temperature (T), turbidity, UV-absorbance at 254 nm (UVAS SC) and with a device for particle counting. Monitored parameters were compared with the measured E. coli counts using the integral calculations of the detected peaks. EC measurement gave the strongest signal compared with the measured baseline during the E. coli intrusion. Integral calculations showed that the peaks in the EC, pH, T, turbidity and UVAS SC data were detected corresponding to the time predicted. However, the pH and temperature peaks detected were barely above the measured baseline and could easily be mixed with the background noise. The results indicate that on-line monitoring can be utilized for the rapid detection of microbial contaminants in the drinking water distribution system although the peak interpretation has to be performed carefully to avoid being mixed up with normal variations in the measurement data. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  4. The geographical conditions of intensity of salty waters intrusions to coastal lakes on Polish Southern Baltic coast

    Science.gov (United States)

    Cieslinski, R.

    2009-04-01

    Lakes situated on the coast of the southern Baltic function in different conditions than those in which typically inland reservoirs occur. They are situated in the contact zone of two environments: land and sea. These reservoirs together with their direct catchments form specific hydrographic arrangement, in which the course of physical, chemical and biological processes depends on the fact which of these two environments exerts a stronger influence at a given moment. This is important as the lakes situated in the shore zone of the southern Baltic are not exposed to phenomena caused by constant tides, as it is the case in open seas (Ataie-Ashtiani et al., 1999), but only to extreme hydrometeorological conditions, which lead to the formation of the phenomenon of intrusions of sea waters and of damming the free outflow of potamic waters (Demirel, 2004; Cieśliński, Drwal, 2005). What should also be remembered are the local hydrographic, hydrological and morphometric conditions. As a result of intrusions, in the waters of coastal lakes, apart from inland waters there are also waters of sea origin. The proportions of these genetically distinct waters are variable and differ in individual lakes (Grassi, Netti, 2000; Drwal, Cieśliński, 2007). Despite the difference in the causal factor triggering the phenomenon of salt water intrusions, the effect is usually the same as that observed, for instance, in lakes and lagoons of seas with tides (Ishitobi et al., 1999; De Louw, Oude Essink, 2001) and poorly flushed lagoon (Hsing-Juh et al., 2006) or estuaries (Uncles et al., 2002), though the scale of qualitative changes is greater in the case of open seas than in half-closed and closed seas. The status of the research carried out so far enables proposing a hypothesis that chlorides concentrations, as the best indicators for establishing the occurrence of the phenomenon of intrusions, depend not only on the meteorological factor but in some of the lakes on various

  5. A modeling study of saltwater intrusion in the Andarax delta area using multiple data sources

    DEFF Research Database (Denmark)

    Antonsson, Arni Valur; Engesgaard, Peter Knudegaard; Jorreto, Sara

    context. The validity of a conceptual model is determined by different factors, where both data quantity and quality is of crucial importance. Often, when dealing with saltwater intrusion, data is limited. Therefore, using different sources (and types) of data can be beneficial and increase......In groundwater model development, construction of the conceptual model is one of the (initial and) critical aspects that determines the model reliability and applicability in terms of e.g. system (hydrogeological) understanding, groundwater quality predictions, and general use in water resources...

  6. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  7. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  8. A 2D fluid motion model of the estuarine water circulation: Physical analysis of the salinity stratification in the Sebou estuary

    Science.gov (United States)

    Haddout, Soufiane; Maslouhi, Abdellatif; Magrane, Bouchaib

    2018-02-01

    Estuaries, which are coastal bodies of water connecting the riverine and marine environment, are among the most important ecosystems in the world. Saltwater intrusion is the movement of coastal saline water into an estuary, which makes up-estuary water, that becomes salty due to the mixing of freshwater with saltwater. It has become a serious environmental problem in the Sebou estuary (Morocco) during wet and dry seasons, which have a considerable impact on residential water supply, agricultural water supply as well as urban industrial production. The variations of salt intrusion, and the vertical stratification under different river flow conditions in the Sebou estuary were investigated in this paper using a two-dimensional numerical model. The model was calibrated and verified against water level variation, and salinity variation during 2016, respectively. Additionally, the model validation process showed that the model results fit the observed data fairly well ( R2 > 0.85, NSC > 0.89 and RMSE = 0.26 m). Model results show that freshwater is a dominant influencing factor to the saltwater intrusion and controlled salinity structure, vertical stratification and length of the saltwater intrusion. Additionally, the extent of salinity intrusion depends on the balance between fresh water discharges and saltwater flow from the sea. This phenomenon can be reasonably predicted recurring to mathematical models supported by monitored data. These tools can be used to quantify how much fresh water is required to counterbalance salinity intrusion at the upstream water intakes.

  9. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  10. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  11. Forced intrusion of water and aqueous solutions in microporous materials: from fundamental thermodynamics to energy storage devices.

    Science.gov (United States)

    Fraux, Guillaume; Coudert, François-Xavier; Boutin, Anne; Fuchs, Alain H

    2017-12-07

    We review the high pressure forced intrusion studies of water in hydrophobic microporous materials such as zeolites and MOFs, a field of research that has emerged some 15 years ago and is now very active. Many of these studies are aimed at investigating the possibility of using these systems as energy storage devices. A series of all-silica zeolites (zeosil) frameworks were found suitable for reversible energy storage because of their stability with respect to hydrolysis after several water intrusion-extrusion cycles. Several microporous hydrophobic zeolite imidazolate frameworks (ZIFs) also happen to be quite stable and resistant towards hydrolysis and thus seem very promising for energy storage applications. Replacing pure water by electrolyte aqueous solutions enables to increase the stored energy by a factor close to 3, on account of the high pressure shift of the intrusion transition. In addition to the fact that aqueous solutions and microporous silica materials are environmental friendly, these systems are thus becoming increasingly interesting for the design of new energy storage devices. This review also addresses the theoretical approaches and molecular simulations performed in order to better understand the experimental behavior of nano-confined water. Molecular simulation studies showed that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional and sufficiently open. In an extreme confinement situations such as in ferrierite zeosil, condensation seem to take place through a continuous supercritical crossing from a diluted to a dense fluid, on account of the fact that the first-order transition line is shifted to higher pressure, and the confined water critical point is correlatively shifted to lower temperature. These molecular simulation studies suggest that the most important features of the intrusion/extrusion process can be understood in terms of equilibrium

  12. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    -chemical environment and seepage water alteration by reaction with intruded basalt. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the waste package pallet. The results of this model report will be used in TSPA for several parameters including (1) temperature of magma (used for the temperature of the waste form after an intrusion) (2) temperature increase in Zone 2 due to intrusion to evaluate impact to Zone 2 waste packages; (3) effects of exsolved gases reaching Zone 2 to evaluate impact to Zone 2 waste packages; and (4) pH and ionic strength of water reacted with basalt to be used in conjunction with ''Dissolved Concentration Limits of Radioactive Elements'' (BSC 2003 [DIRS: 163152]) to determine solubility of spent fuel within the basalt. Ionic strength will also be used in conjunction with ''Waste Form and In-Drift Colloids-Associated Radionuclide Concentrations: Abstraction and Summary'' (BSC 2003 [DIRS: 166845]) for stability of colloids

  13. Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM

    Directory of Open Access Journals (Sweden)

    Sumaiya Thaseen Ikram

    2016-06-01

    Full Text Available Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are many problems with traditional intrusion detection models (IDS such as low detection capability against unknown network attack, high false alarm rate and insufficient analysis capability. Hence the major scope of the research in this domain is to develop an intrusion detection model with improved accuracy and reduced training time. This paper proposes a hybrid intrusiondetection model by integrating the principal component analysis (PCA and support vector machine (SVM. The novelty of the paper is the optimization of kernel parameters of the SVM classifier using automatic parameter selection technique. This technique optimizes the punishment factor (C and kernel parameter gamma (γ, thereby improving the accuracy of the classifier and reducing the training and testing time. The experimental results obtained on the NSL KDD and gurekddcup dataset show that the proposed technique performs better with higher accuracy, faster convergence speed and better generalization. Minimum resources are consumed as the classifier input requires reduced feature set for optimum classification. A comparative analysis of hybrid models with the proposed model is also performed.

  14. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  15. Forecast, observation and modelling of a deep stratospheric intrusion event over Europe

    Directory of Open Access Journals (Sweden)

    P. Zanis

    2003-01-01

    Full Text Available A wide range of measurements was carried out in central and southeastern Europe within the framework of the EU project STACCATO (Influence of Stratosphere-Troposphere Exchange in a Changing Climate on Atmospheric Transport and Oxidation Capacity with the principle goal to create a comprehensive data set on stratospheric air intrusions into the troposphere along a rather frequently observed pathway over central Europe from the North Sea to the Mediterranean Sea. The measurements were based on predictions by suitable quasi-operational trajectory calculations using ECMWF forecast data. A predicted deep Stratosphere to Troposphere Transport (STT event, encountered during the STACCATO period on 20-21 June 2001, was followed by the measurements network almost from its inception. Observations provide evidence that the intrusion affected large parts of central and southeastern Europe. Especially, the ozone lidar observations on 20-21 June 2001 at Garmisch-Partenkirchen, Germany captured the evolution of two marked tongues of high ozone with the first one descending to nearly 2 km, thus providing an excellent data set for model intercomparisons and validation. In addition, for the first time to our knowledge concurrent surface measurements of the cosmogenic radionuclides 10Be and 7Be and their ratio 10Be/7Be are presented together as stratospheric tracers in a case study of a stratospheric intrusion. The ozone tracer columns calculated with the FLEXPART model were found to be in good agreement with water vapour satellite images, capturing the evolution of the observed dry streamers of stratospheric origin. Furthermore, the time-height cross section of ozone tracer simulated with FLEXPART over Garmisch-Partenkirchen captures many details of the evolution of the two observed high-ozone filaments measured with the IFU lidar, thus demonstrating the considerable progress in model simulations. Finally, the modelled ozone (operationally available since October

  16. Sea water intrusion model of Amchitka Island, Alaska

    International Nuclear Information System (INIS)

    Wheatcraft, S.W.

    1995-09-01

    During the 1960s and 1970s, Amchitka Island, Alaska, was the site of three underground nuclear tests, referred to as Milrow, Long Shot and Cannikin. Amchitka Island is located in the western part of the Aleutian Island chain, Alaska. The groundwater systems affected by the three underground nuclear tests at Amchitka Island are essentially unmonitored because all of the current monitoring wells are too shallow and not appropriately placed to detect migration from the cavities. The dynamics of the island's fresh water-sea water hydrologic system will control contaminant migration from the three event cavities, with migration expected in the direction of the Bering Sea from Long shot and Cannikin and the Pacific Ocean from Milrow. The hydrogeologic setting (actively flowing groundwater system to maintain a freshwater lens) suggests a significant possibility for relatively rapid contaminant migration from these sites, but also presents an opportunity to use projected flowpaths to a monitoring advantage. The purpose of this investigation is to develop a conceptual model of the Amchitka groundwater system and to produce computer model simulations that reflect the boundary conditions and hydraulic properties of the groundwater system. The simulations will be used to assess the validity of the proposed conceptual model and highlight the uncertainties in hydraulic properties of the aquifer. The uncertainties will be quantified by sensitivity analyses on various model parameters. Within the limitations of the conceptual model and the computer simulations, conclusions will be drawn regarding potential radionuclide migration from the three underground nuclear tests

  17. An Excel Macro to Plot the HFE-Diagram to Identify Sea Water Intrusion Phases.

    Science.gov (United States)

    Giménez-Forcada, Elena; Sánchez San Román, F Javier

    2015-01-01

    A hydrochemical facies evolution diagram (HFE-D) is a multirectangular diagram, which is a useful tool in the interpretation of sea water intrusion processes. This method note describes a simple method for generating an HFE-D plot using the spreadsheet software package, Microsoft Excel. The code was applied to groundwater from the alluvial coastal plain of Grosseto (Tuscany, Italy), which is characterized by a complex salinization process in which sea water mixes with sulfate or bicarbonate recharge water. © 2014, National GroundWater Association.

  18. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  19. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  20. Hysteretic behavior in seawater intrusion in response to discontinuous drought periods

    Science.gov (United States)

    Salandin, P.; Darvini, G.

    2017-12-01

    The seawater intrusion (SWI) represents a relevant problem for communities living in many coastal regions and in small islands, where the amount of fresh water available for human consumption or irrigation purposes depends on the equilibrium between the natural groundwater recharge from precipitations and the surrounding sea. This issue is exacerbated by climate changes, and, as a consequence, the reduction of natural groundwater recharge and the decrease the seaward flows of fresh water rather than sea level rise, as recently demonstrated by Ketabchi et al. (2016), leads to magnify the seawater intrusion into coastal aquifers. The temporal fluctuation of the fresh water table level are a natural consequence of the interaction of the aquifer with a water body or due to the seasonal replenishment of the water table. The severe and prolonged drought phenomena as that observed in last years in some areas of the Mediterranean, as over the central western Mediterranean basin, Italy and Spain, where a decreasing trend in total precipitation was detected (Alpert et al., 2002) in addition to the rise in temperature, enlarges the variation of the freshwater flux and can magnify the progression of the saline wedge. In the present study we demonstrate that the presence of varying boundary constraints or forcing factors may lead to hysteretic behavior in saltwater intrusion, showing dependence of the saline wedge on historic conditions. Therefore, the dynamic behavior of SWI may depend on both the present and past forcing conditions. To this aim different transient simulations supported by evidences deduced from a physical model are carried out to assess the presence of the hysteretic effects in the SWI phenomenon and to evaluate its influence in the management of the coastal aquifers for both the rational exploitation and the corrected management of water resources. About 70% of the world's population dwells in coastal zones. Therefore the optimal exploitation of fresh

  1. A model for the dynamics of crater-centered intrusion: Application to lunar floor-fractured craters

    Science.gov (United States)

    Thorey, Clément; Michaut, Chloé

    2014-01-01

    Lunar floor-fractured craters are a class of craters modified by post-impact mechanisms. They are defined by distinctive shallow floors that are convex or plate-like, sometimes with a wide floor moat bordering the wall region. Radial, concentric, and polygonal floor fractures suggest an endogenous process of modification. Two mechanisms have been proposed to account for such deformations: viscous relaxation and spreading of a magma intrusion at depth below the crater. To test the second assumption and bring more constraints on the intrusion process, we develop a model for the dynamics of magma spreading below an elastic overlying layer with a crater-like topography. As predicted in earlier more qualitative studies, the increase in lithostatic pressure at the crater wall zone prevents the intrusion from spreading laterally, leading to the thickening of the intrusion. Additionally, our model shows that the final crater floor appearance after the uplift, which can be convex or flat, with or without a circular moat bordering the wall zone, depends on the elastic thickness of the layer overlying the intrusion and on the crater size. Our model provides a simple formula to derive the elastic thickness of the overlying layer hence a minimum estimate for the intrusion depth. Finally, our model suggests that crust redistribution by cratering must have controlled magma ascent below most of these craters.

  2. THE TECTONICS STRESS AND STRAIN FIELD MODELING ADJUSTED FOR EVOLUTION OF GEOLOGICAL STRUCTURES (SAILAG INTRUSION, EASTERN SAYAN

    Directory of Open Access Journals (Sweden)

    V. N. Voytenko

    2013-01-01

    Full Text Available The article describes a tectonophysical model showing evolution of structures in the Sailag granodiorite massif in relation to its gold-bearing capacity. The model takes into account the load patterns according to geological data, accumulated deformation, and gravity stresses. This model provides for updating the structural-geological model showing development of the intrusion body and the ore field. Forecasted are destruction patterns in the apical and above-dome parts of the massif  in the intrusion and contraction phase, formation of the long-term shear zone at the steeply dipping slope of the intrusion body, and subvertical fractures associated with the long-term shear zone and vertical mechanical ‘layering’ of the intrusive body.  

  3. Effect of climate change on sea water intrusion in coastal aquifers

    Science.gov (United States)

    Sherif, Mohsen M.; Singh, Vijay P.

    1999-06-01

    There is increasing debate these days on climate change and its possible consequences. Much of this debate has focused in the context of surface water systems. In many arid areas of the world, rainfall is scarce and so is surface runoff. These areas rely heavily on groundwater. The consequences of climate change on groundwater are long term and can be far reaching. One of the more apparent consequences is the increased migration of salt water inland in coastal aquifers. Using two coastal aquifers, one in Egypt and the other in India, this study investigates the effect of likely climate change on sea water intrusion. Three realistic scenarios mimicking climate change are considered. Under these scenarios, the Nile Delta aquifer is found to be more vulnerable to climate change and sea level rise.

  4. A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    Directory of Open Access Journals (Sweden)

    Weijun Zhu

    2013-01-01

    Full Text Available The interval temporal logic (ITL model checking (MC technique enhances the power of intrusion detection systems (IDSs to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack. To address this problem, we formalize a novel real-time interval temporal logic—real-time attack signature logic (RASL. Based on such a new logic, we put forward a RASL model checking algorithm. Furthermore, we use RASL formulas to describe attack signatures and employ discrete timed automata to create an audit log. As a result, RASL model checking algorithm can be used to automatically verify whether the automata satisfy the formulas, that is, whether the audit log coincides with the attack signatures. The simulation experiments show that the new approach effectively enhances the detection power of the MC-based intrusion detection methods for a number of telnet attacks, p-trace attacks, and the other sixteen types of attacks. And these experiments indicate that the new algorithm can find several types of real-time attacks, whereas the existing MC-based intrusion detection approaches cannot do that.

  5. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  6. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    Science.gov (United States)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  7. Coastal Water Quality Modeling in Tidal Lake: Revisited with Groundwater Intrusion

    Science.gov (United States)

    Kim, C.

    2016-12-01

    A new method for predicting the temporal and spatial variation of water quality, with accounting for a groundwater effect, has been proposed and applied to a water body partially connected to macro-tidal coastal waters in Korea. The method consists of direct measurement of environmental parameters, and it indirectly incorporates a nutrients budget analysis to estimate the submarine groundwater fluxes. Three-dimensional numerical modeling of water quality has been used with the directly collected data and the indirectly estimated groundwater fluxes. The applied area is Saemangeum tidal lake that is enclosed by 33km-long sea dyke with tidal openings at two water gates. Many investigations of groundwater impact reveal that 10 50% of nutrient loading in coastal waters comes from submarine groundwater, particularly in the macro-tidal flat, as in the west coast of Korea. Long-term monitoring of coastal water quality signals the possibility of groundwater influence on salinity reversal and on the excess mass outbalancing the normal budget in Saemangeum tidal lake. In the present study, we analyze the observed data to examine the influence of submarine groundwater, and then a box model is demonstrated for quantifying the influx and efflux. A three-dimensional numerical model has been applied to reproduce the process of groundwater dispersal and its effect on the water quality of Saemangeum tidal lake. The results show that groundwater influx during the summer monsoon then contributes significantly, 20% more than during dry season, to water quality in the tidal lake.

  8. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis; Raitsos, Dionysios E.; Gittings, John; Krokos, George; Hoteit, Ibrahim

    2017-01-01

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin's shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  9. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms.

    Science.gov (United States)

    Dreano, Denis; Raitsos, Dionysios E; Gittings, John; Krokos, George; Hoteit, Ibrahim

    2016-01-01

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin's shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  10. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis

    2017-01-09

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin\\'s shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  11. A study on the intrusion model by physical modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Yul; Kim, Yoo Sung; Hyun, Hye Ja [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    In physical modeling, the actual phenomena of seismic wave propagation are directly measured like field survey and furthermore the structure and physical properties of subsurface can be known. So the measured datasets from physical modeling can be very desirable as input data to test the efficiency of various inversion algorithms. An underground structure formed by intrusion, which can be often seen in seismic section for oil exploration, is investigated by physical modeling. The model is characterized by various types of layer boundaries with steep dip angle. Therefore, this physical modeling data are very available not only to interpret seismic sections for oil exploration as a case history, but also to develop data processing techniques and estimate the capability of software such as migration, full waveform inversion. (author). 5 refs., 18 figs.

  12. Synergy of climate change and local pressures on saltwater intrusion in heterogeneous coastal aquifers

    Science.gov (United States)

    Abou Najm, M.; Safi, A.; El-Fadel, M.; Doummar, J.; Alameddine, I.

    2016-12-01

    The relative importance of climate change induced sea level rise on the salinization of a highly urbanized karstified coastal aquifers were compared with non-sustainable pumping. A 3D variable-density groundwater flow and solute transport model was used to predict the displacement of the saltwater-freshwater interface in a pilot aquifer located along the Eastern Mediterranean. The results showed that the influence of sea level rise was marginal when compared with the encroachment of salinity associated with anthropogenic abstraction. Model predictions of salinity mass and volumetric displacement of the interface corresponding to a long-term monthly transient model showed that the saltwater intrusion dynamic is highly sensitive to change in the abstraction rates which were estimated based on combinations of water consumption rates and population growth rates. Salinity encroachment, however, appeared to be more sensitive to water consumption rates in comparison to population growth rates, where a 50% increase in the rate of former led to four times more intrusion as compared to an equivalent increase in population growth rate over 20 years. Coupling both increase in population growth and increased consumption rates had a synergistic effect that aggravated the intrusion beyond the sum of the individual impacts. Adaptation strategies targeting a decrease in groundwater exploitation proved to be effective in retarding the intrusion.

  13. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  14. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  15. Identification of saline water intrusion in part of Cauvery deltaic region, Tamil Nadu, Southern India: using GIS and VES methods

    Science.gov (United States)

    Gnanachandrasamy, G.; Ramkumar, T.; Venkatramanan, S.; Chung, S. Y.; Vasudevan, S.

    2016-06-01

    We use electrical resistivity data arrayed in a 2715 km2 region with 30 locations to identify the saline water intrusion zone in part of Cauvery deltaic region, offshore Eastern India. From this dataset we are able to derive information on groundwater quality, thickness of aquifer zone, structural and stratigraphic conditions relevant to groundwater conditions, and permeability of aquifer systems. A total of 30 vertical electrode soundings (VES) were carried out by Schlumberger electrode arrangement to indicate complete lithology of this region using curve matching techniques. The electrical soundings exhibited that H and HK type curves were suitable for 16 shallow locations, and QH, KQ, K, KH, QQ, and HA curves were fit for other location. Low resistivity values suggested that saline water intrusion occurred in this region. According to final GIS map, most of the region was severely affected by seawater intrusion due to the use of over-exploitation of groundwater.The deteriorated groundwater resources in this coastal region should raise environmental and health concerns.

  16. Prototype of Intrusion Detection Model using UML 5.0 and Forward Engineering

    Directory of Open Access Journals (Sweden)

    Muthaiyan MADIAJAGAN,

    2011-01-01

    Full Text Available In this paper we are using UML (Unified Modeling Language which is the blueprint language between the programmers, analysts, and designer’s for easy representation of pictures or diagrammatic notation with some textual data. Here we are using UML 5.0 to show “prototype of the Intrusion Detection Model” and by explaining it by combining various parts by drawing various UML diagrams such as Use cases and Activity diagrams and Class Diagram using which we show forward engineering using the class diagram of the IDM( Intrusion Detection Model. IDM is a device or software that works on detecting malicious activities by unauthorized users that can cause breach to the security policy within a network.

  17. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    Science.gov (United States)

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  18. Managing saltwater intrusion in coastal arid regions and its societal implications for agriculture

    Directory of Open Access Journals (Sweden)

    J. Grundmann

    2016-05-01

    Full Text Available Coastal aquifers in arid and semiarid regions are particularly at risk due to intrusion of salty marine water. Since groundwater is predominantly used in irrigated agriculture, its excessive pumping – above the natural rate of replenishment – strengthen the intrusion process. Using this increasingly saline water for irrigation, leads to a destruction of valuable agricultural resources and the economic basis of farmers and their communities. The limitation of resources (water and soil in these regions requires a societal adaptation and change in behaviour as well as the development of appropriate management strategies for a transition towards stable and sustainable future hydrosystem states. Besides a description of the system dynamics and the spatial consequences of adaptation on the resources availability, the contribution combines results of an empirical survey with stakeholders and physically based modelling of the groundwater-agriculture hydrosystem interactions. This includes an analysis of stakeholders' (farmers and decision makers behaviour and opinions regarding several management interventions aiming on water demand and water resources management as well as the thinking of decision makers how farmers will behave. In this context, the technical counter measures to manage the saltwater intrusion by simulating different groundwater pumping strategies and scenarios are evaluated from the economic and social point of view and if the spatial variability of the aquifer's hydrogeology is taken into consideration. The study is exemplarily investigated for the south Batinah region in the Sultanate of Oman, which is affected by saltwater intrusion into a coastal aquifer system due to excessive groundwater withdrawal for irrigated agriculture.

  19. Impact of the bottom drag coefficient on saltwater intrusion in the extremely shallow estuary

    Science.gov (United States)

    Lyu, Hanghang; Zhu, Jianrong

    2018-02-01

    The interactions between the extremely shallow, funnel-shaped topography and dynamic processes in the North Branch (NB) of the Changjiang Estuary produce a particular type of saltwater intrusion, saltwater spillover (SSO), from the NB into the South Branch (SB). This dominant type of saltwater intrusion threatens the winter water supplies of reservoirs located in the estuary. Simulated SSO was weaker than actual SSO in previous studies, and this problem has not been solved until now. The improved ECOM-si model with the advection scheme HSIMT-TVD was applied in this study. Logarithmic and Chézy-Manning formulas of the bottom drag coefficient (BDC) were established in the model to investigate the associated effect on saltwater intrusion in the NB. Modeled data and data collected at eight measurement stations located in the NB from February 19 to March 1, 2017, were compared, and three skill assessment indicators, the correlation coefficient (CC), root-mean-square error (RMSE), and skill score (SS), of water velocity and salinity were used to quantitatively validate the model. The results indicated that the water velocities modeled using the Chézy-Manning formula of BDC were slightly more accurate than those based on the logarithmic BDC formula, but the salinities produced by the latter formula were more accurate than those of the former. The results showed that the BDC increases when water depth decreases during ebb tide, and the results based on the Chézy-Manning formula were smaller than those based on the logarithmic formula. Additionally, the landward net water flux in the upper reaches of the NB during spring tide increases based on the Chézy-Manning formula, and saltwater intrusion in the NB was enhanced, especially in the upper reaches of the NB. At a transect in the upper reaches of the NB, the net transect water flux (NTWF) is upstream in spring tide and downstream in neap tide, and the values produced by the Chézy-Manning formula are much larger than

  20. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  1. Water jet intrusion into hot melt concomitant with direct-contact boiling of water

    Energy Technology Data Exchange (ETDEWEB)

    Sibamoto, Yasuteru [Japan Atomic Energy Research Inst., Tokai Research Establishment, Tokai, Ibaraki (Japan)

    2005-08-01

    Boiling of water poured on surface of high-temperature melt (molten metal or metal oxide) provides an efficient means for heat exchange or cooling of melt. The heat transfer surface area can be extended by forcing water into melt. Objectives of the present study are to elucidate key factors of the thermal and hydrodynamic interactions for the water jet injection into melt (Coolant Injection mode). Proposed applications include in in-vessel heat exchangers for liquid metal reactor and emergency measures for cooling of molten core debris in severe accidents of light water reactor. Water penetration into melt may occurs also as a result of fuel-coolant interaction (FCI) in modes other than CI, it is anticipated that the present study contributes to understand the fundamental mechanism of the FCI process. The previous works have been limited on understanding the melt-water interaction phenomena in the water-injection mode because of difficulty in experimental measurement where boiling occurs in opaque invisible hot melt unlike the melt-injection mode. We conducted visualization and measurement of melt-water-vapor multiphase flow phenomena by using a high-frame-rate neutron radiography technique and newly-developed probes. Although limited knowledge, however, has been gained even such an approach, the experimental data were analyzed deeply by comparing with the knowledge obtained from relevant matters. As a result, we succeeded in revealing several key phenomena and validity in the conditions under which stable heat transfer is established. Moreover, a non-intrusive technique for measurement of the velocity and pressure fields adjacent to a moving free surface is developed. The technique is based on the measurement of fluid surface profile, which is useful for elucidation of flow mechanism accompanied by a free surface like the present phenomena. (author)

  2. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  3. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  4. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  5. A methodological framework to assess the environmental and economic effects of injection barriers against seawater intrusion.

    Science.gov (United States)

    Siarkos, Ilias; Latinopoulos, Dionysis; Mallios, Zisis; Latinopoulos, Pericles

    2017-05-15

    Seawater intrusion is responsible for the progressive deterioration of groundwater quality in numerous coastal aquifers worldwide. As a consequence, seawater intrusion may constitute a serious threat to local groundwater resources, as well as to the regional economy of coastal areas. To alleviate these negative effects, a number of well-designed protective measures could be implemented. The implementation of these measures is usually associated with significant benefits for the environment and the local economy. In this perspective, the present study investigates the particular case of constructing injection barriers for controlling seawater intrusion by developing a methodological framework that combines numerical modeling with spatial and cost-benefit analyses. To this task, we introduce a novel approach, which considers the socio-economic aspects of seawater intrusion in the modeling procedure, and at the same time focuses on the spatial and temporal relationships between water salinity and farmers' income. To test the proposed methodology two alternative artificial recharge scenarios - with different volumes of water used for injection - are assessed. According to the results of this analysis, both scenarios are likely to have a positive impact on groundwater quality, as well as, a net economic benefit to local society. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Modeling the influence of river discharge on salt intrusion and residual circulation in Danshuei River estuary, Taiwan

    Science.gov (United States)

    Liu, W.-C.; Chen, W.-B.; Cheng, R.T.; Hsu, M.-H.; Kuo, A.Y.

    2007-01-01

    A 3-D, time-dependent, baroclinic, hydrodynamic and salinity model was implemented and applied to the Danshuei River estuarine system and the adjacent coastal sea in Taiwan. The model forcing functions consist of tidal elevations along the open boundaries and freshwater inflows from the main stream and major tributaries in the Danshuei River estuarine system. The bottom friction coefficient was adjusted to achieve model calibration and verification in model simulations of barotropic and baroclinic flows. The turbulent diffusivities were ascertained through comparison of simulated salinity time series with observations. The model simulation results are in qualitative agreement with the available field data. The validated model was then used to investigate the influence of freshwater discharge on residual current and salinity intrusion under different freshwater inflow condition in the Danshuei River estuarine system. The model results reveal that the characteristic two-layered estuarine circulation prevails most of the time at Kuan-Du station near the river mouth. Comparing the estuarine circulation under low- and mean flow conditions, the circulation strengthens during low-flow period and its strength decreases at moderate river discharge. The river discharge is a dominating factor affecting the salinity intrusion in the estuarine system. A correlation between the distance of salt intrusion and freshwater discharge has been established allowing prediction of salt intrusion for different inflow conditions. ?? 2007 Elsevier Ltd. All rights reserved.

  7. Contextualising Water Use in Residential Settings: A Survey of Non-Intrusive Techniques and Approaches

    Directory of Open Access Journals (Sweden)

    Davide Carboni

    2016-05-01

    Full Text Available Water monitoring in households is important to ensure the sustainability of fresh water reserves on our planet. It provides stakeholders with the statistics required to formulate optimal strategies in residential water management. However, this should not be prohibitive and appliance-level water monitoring cannot practically be achieved by deploying sensors on every faucet or water-consuming device of interest due to the higher hardware costs and complexity, not to mention the risk of accidental leakages that can derive from the extra plumbing needed. Machine learning and data mining techniques are promising techniques to analyse monitored data to obtain non-intrusive water usage disaggregation. This is because they can discern water usage from the aggregated data acquired from a single point of observation. This paper provides an overview of water usage disaggregation systems and related techniques adopted for water event classification. The state-of-the art of algorithms and testbeds used for fixture recognition are reviewed and a discussion on the prominent challenges and future research are also included.

  8. Ensemble Kalman Filter Assimilation of ERT Data for Numerical Modeling of Seawater Intrusion in a Laboratory Experiment

    Directory of Open Access Journals (Sweden)

    Véronique Bouzaglou

    2018-03-01

    Full Text Available Seawater intrusion in coastal aquifers is a worldwide problem exacerbated by aquifer overexploitation and climate changes. To limit the deterioration of water quality caused by saline intrusion, research studies are needed to identify and assess the performance of possible countermeasures, e.g., underground barriers. Within this context, numerical models are fundamental to fully understand the process and for evaluating the effectiveness of the proposed solutions to contain the saltwater wedge; on the other hand, they are typically affected by uncertainty on hydrogeological parameters, as well as initial and boundary conditions. Data assimilation methods such as the ensemble Kalman filter (EnKF represent promising tools that can reduce such uncertainties. Here, we present an application of the EnKF to the numerical modeling of a laboratory experiment where seawater intrusion was reproduced in a specifically designed sandbox and continuously monitored with electrical resistivity tomography (ERT. Combining EnKF and the SUTRA model for the simulation of density-dependent flow and transport in porous media, we assimilated the collected ERT data by means of joint and sequential assimilation approaches. In the joint approach, raw ERT data (electrical resistances are assimilated to update both salt concentration and soil parameters, without the need for an electrical inversion. In the sequential approach, we assimilated electrical conductivities computed from a previously performed electrical inversion. Within both approaches, we suggest dual-step update strategies to minimize the effects of spurious correlations in parameter estimation. The results show that, in both cases, ERT data assimilation can reduce the uncertainty not only on the system state in terms of salt concentration, but also on the most relevant soil parameters, i.e., saturated hydraulic conductivity and longitudinal dispersivity. However, the sequential approach is more prone to

  9. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    Energy Technology Data Exchange (ETDEWEB)

    Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu

    2008-10-01

    One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water

  10. Delineation of Salt Water Intrusion through Use of Electromagnetic-Induction Logging: A Case Study in Southern Manhattan Island, New York

    Directory of Open Access Journals (Sweden)

    Frederick Stumm

    2017-08-01

    Full Text Available Groundwater with chloride concentrations up to 15,000 mg/L has intruded the freshwater aquifer underlying southern Manhattan Island, New York. Historical (1940–1950 chloride concentration data of glacial aquifer wells in the study area indicate the presence of four wedges of saltwater intrusion that may have been caused by industrial pumpage. The limited recharge capability of the aquifer, due to impervious surfaces and the 22.7 million liters per day (mld of reported industrial pumpage early in the 20th Century was probably the cause for the saltwater intrusion and the persistence of the historical saltwater intrusion wedges over time. Recent drilling of wells provided new information on the hydrogeology and extent of saltwater intrusion of the glacial aquifer overlying bedrock. The new observation wells provided ground-water level, chloride concentration, hydraulic conductivity, and borehole geophysical data of the glacial aquifer. The glacial sediments range in thickness from less than 0.3 m to more than 76.2 m within the study area. A linear relation between Electromagnetic-induction (EM conductivity log response and measured chloride concentration was determined. Using this relation, chloride concentration was estimated in parts of the glacial aquifer where sampling was not possible. EM logging is an effective tool to monitor changes in saltwater intrusion wedges.

  11. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    Science.gov (United States)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  12. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  13. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  14. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  15. Geophysical and Seawater intrusion models to distinguish Modern and Palaeo salinity in the Central Godvari Delta, Andhra Pradesh, India

    Science.gov (United States)

    Lagudu, S.; Nandan, M. J.; Durgaprasad, M.; Gurunadha Rao, V. V. S.

    2015-12-01

    Central Godavari Delta is located in the East coast of Andhra Pradesh along Bay of Bengal. Ample surface water is made available for irrigation and aqua culture through well distributed canals drawn from Godavari River since last 150 years. Groundwater in the area is highly saline though the groundwater levels are very shallow ranging from 1 to 3 m below ground level. Integrated Electrical Resistivity Tomograms (ERT), hydrochemical (pH, TDS, Ca2+, Mg2+, K+, F-, Cl-, SO42-, NO3-, HCO3- and CO3-), isotopic (Br- and δ18O ) and density dependant solute tranport (SEAWAT) modelling studies have been carried out for four years (2006, 2007, 2014 and 2015) to identify the salinity sources and to understand the possible extent of seawater intrusion. The integration of all these data sets revealed that coarse grained sands exhibits resistivity of 4-20 Ωm forming the surface layer, clay layer exhibits Na2++ K+) and (Ca2++Mg2+), (Na+-Cl- ) vs. Ca2++Mg2+-HCO3--SO42-)) and ionic ratios ( Na2+/Cl-, SO42-/Cl-, Mg2+/Ca2+, Mg2+/Cl- and Cl-/Br) and δ18O does not reflect any modern seawater signatures. These models indicated that salinity in the shallow wells is due to dissolution of evaporitic minerals and ion exchange processes. In the pumping wells the salinity is due to upconing of entrapped sea water that belongs to Palaeo origin and wells located near the coast and mudflats is due to physical mixing of marine water. The estimated regional groundwater balance using SEAWAT model indicate significant amount of submarine groundwater discharge as outfall to the Bay of Bengal. Assuming observed hydrological conditions, no considerable advance in seawater intrusion would be expected into the delta region.

  16. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  17. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  18. Numerical modeling and sensitivity analysis of seawater intrusion in a dual-permeability coastal karst aquifer with conduit networks

    Directory of Open Access Journals (Sweden)

    Z. Xu

    2018-01-01

    Full Text Available Long-distance seawater intrusion has been widely observed through the subsurface conduit system in coastal karst aquifers as a source of groundwater contaminant. In this study, seawater intrusion in a dual-permeability karst aquifer with conduit networks is studied by the two-dimensional density-dependent flow and transport SEAWAT model. Local and global sensitivity analyses are used to evaluate the impacts of boundary conditions and hydrological characteristics on modeling seawater intrusion in a karst aquifer, including hydraulic conductivity, effective porosity, specific storage, and dispersivity of the conduit network and of the porous medium. The local sensitivity analysis evaluates the parameters' sensitivities for modeling seawater intrusion, specifically in the Woodville Karst Plain (WKP. A more comprehensive interpretation of parameter sensitivities, including the nonlinear relationship between simulations and parameters, and/or parameter interactions, is addressed in the global sensitivity analysis. The conduit parameters and boundary conditions are important to the simulations in the porous medium because of the dynamical exchanges between the two systems. The sensitivity study indicates that salinity and head simulations in the karst features, such as the conduit system and submarine springs, are critical for understanding seawater intrusion in a coastal karst aquifer. The evaluation of hydraulic conductivity sensitivity in the continuum SEAWAT model may be biased since the conduit flow velocity is not accurately calculated by Darcy's equation as a function of head difference and hydraulic conductivity. In addition, dispersivity is no longer an important parameter in an advection-dominated karst aquifer with a conduit system, compared to the sensitivity results in a porous medium aquifer. In the end, the extents of seawater intrusion are quantitatively evaluated and measured under different scenarios with the variabilities of

  19. A synthetic study on constaining a 2D density-dependent saltwater intrusion model using electrical imaging data

    DEFF Research Database (Denmark)

    Antonsson, Arni Valur; Nguyen, Frederic; Engesgaard, Peter Knudegaard

    of the synthetic model, basically a salinity distribution in the coastal aquifer, was converted to resistivity distribution by assuming a certain petrophysical relation between water salinity and electrical conductivity. The obtained resistivity distribution was then used when electrical data acquisition...... was simulated. By applying an advanced inversion approach, electrical images of resistivity were obtained and based on the assumed petrophysical model the salinity distribution was derived. A number of different intrusion simulations were conducted with the aim of assessing the applicability of the method under....... Compared to conventional methods, which only give (few) point information, electrical images can give data over large spatial distances but that can be of great value for groundwater modeling purposes. The aim of this study is to investigate in a synthetic way, the applicability of using electrical images...

  20. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  1. Completing the ground-water model: ''We need more data''

    International Nuclear Information System (INIS)

    Rehmeyer, D.L.

    1995-01-01

    Computer modeling of geologic structures and groundwater flow has progressed from simple number crunching in the sixties to sophisticated and complex structure and flow models in the nineties (Hatheway, 1994). In the environmental field, a detailed knowledge of the subsurface geology is required and essential for successful ground-water remediation, planning, and investigations. Current options for determining shallow (0--400 ft) subsurface geology includes standard borings, cone penetrometer, ground penetrating radar (GPR), or resistivity surveys (RS). Standards borings are expensive coverage and the close spacing required for generating accurate model data. The cone penetrometer is less expensive and faster than conventional borings. However, both the cone penetrometer and borings are limited by access and are intrusive, providing additional paths for contaminant migration. While both standard GPR and RS are non-intrusive, they suffer from other limitations. A high conductivity soil (clay) will diminish the effectiveness of GPR. The signal is absorbed and dissipated in the first few inches of high conductivity soil. The depth of penetration of RS is better, but the vertical resolution for distinguishing between finely interbedded layers is much lower. An ideal system for subsurface geologic analysis would be non-intrusive, have the depth of penetration of RS, while offering the vertical resolution of GPR> Electromagnetic methods (EM) offer distinct advantages in helping to solve these problems: (a) they are non-intrusive, and (b) the technology to support EM probing-pulse generation, data collection--is well established. Quaternary Resource Investigations, Inc., (QRI) has developed such a system

  2. Towards Effective Network Intrusion Detection: A Hybrid Model Integrating Gini Index and GBDT with PSO

    Directory of Open Access Journals (Sweden)

    Longjie Li

    2018-01-01

    Full Text Available In order to protect computing systems from malicious attacks, network intrusion detection systems have become an important part in the security infrastructure. Recently, hybrid models that integrating several machine learning techniques have captured more attention of researchers. In this paper, a novel hybrid model was proposed with the purpose of detecting network intrusion effectively. In the proposed model, Gini index is used to select the optimal subset of features, the gradient boosted decision tree (GBDT algorithm is adopted to detect network attacks, and the particle swarm optimization (PSO algorithm is utilized to optimize the parameters of GBDT. The performance of the proposed model is experimentally evaluated in terms of accuracy, detection rate, precision, F1-score, and false alarm rate using the NSL-KDD dataset. Experimental results show that the proposed model is superior to the compared methods.

  3. Integrated approach for demarcating subsurface pollution and saline water intrusion zones in SIPCOT area: a case study from Cuddalore in Southern India.

    Science.gov (United States)

    Sankaran, S; Sonkamble, S; Krishnakumar, K; Mondal, N C

    2012-08-01

    This paper deals with a systematic hydrogeological, geophysical, and hydrochemical investigations carried out in SIPCOT area in Southern India to demarcate groundwater pollution and saline intrusion through Uppanar River, which flows parallel to sea coast with high salinity (average TDS 28, 870 mg/l) due to back waters as well as discharge of industrial and domestic effluents. Hydrogeological and geophysical investigations comprising topographic survey, self-potential, multi-electrode resistivity imaging, and water quality monitoring were found the extent of saline water intrusion in the south and pockets of subsurface pollution in the north of the study area. Since the area is beset with highly permeable unconfined quaternary alluvium forming potential aquifer at shallow depth, long-term excessive pumping and influence of the River have led to lowering of the water table and degradation of water quality through increased salinity there by generating reversal of hydraulic gradient in the south. The improper management of industrial wastes and left over chemicals by closed industries has led surface and subsurface pollution in the north of the study area.

  4. Intrusion of the Bay of Bengal water into the Arabian Sea during winter monsoon and associated chemical and biological response

    Digital Repository Service at National Institute of Oceanography (India)

    PrasannaKumar, S.; Narvekar, J.; Kumar, A.; Shaji, C.; Anand, P.; Sabu, P.; Rijomon, G.; Josia, J.; Jayaraj, K.A.; Radhika, A.; Nair, K.K.C.

    off. The hydrological imbalance thus created on an annual scale will have to be balanced by the inter-basin exchange. In winter this happens through the intrusion of Bay of Bengal waters into the Arabian Sea, when the southward flowing East India...

  5. Evaluation of the effects of sea-level change and coastal canal management on saltwater intrusion in the Biscayne aquifer of south Florida, USA

    Science.gov (United States)

    Hughes, J. D.; Sifuentes, D. F.; White, J.

    2015-12-01

    Sea-level increases are expected to have an effect on the position of the freshwater-saltwater interface in the Biscayne aquifer in south Florida as a result of the low topographic relief of the area and high rates of groundwater withdrawal from the aquifer. To study the effects that future sea-level increases will have on saltwater intrusion in the Biscayne aquifer in Broward County, Florida, a three-dimensional, variable-density, groundwater-flow and transport model was developed. The model was calibrated to observed groundwater heads and chloride concentrations for a 62-year period that includes historic increases in sea level, development of a surface-water management system to control flooding, and increases in groundwater withdrawals as the area transitioned from agricultural to urban land uses. Sensitivity analyses indicate that downward leakage of saltwater from coastal canals and creeks was the primary source of saltwater to the Biscayne aquifer during the last 62-years in areas where the surface-water system is not actively managed and is tidally influenced. In areas removed from the coastal canals and creeks or under active surface-water management, historic groundwater withdrawals were the primary cause of saltwater intrusion into the aquifer. Simulation of future conditions suggests that possible increases in sea level will result in additional saltwater intrusion. Model scenarios suggest that additional saltwater intrusion will be greatest in areas where coastal canals and creeks were historically the primary source of seawater. Future saltwater intrusion in those areas, however, may be reduced by relocation of salinity-control structures.

  6. Intrusion detection model using fusion of chi-square feature selection and multi class SVM

    Directory of Open Access Journals (Sweden)

    Ikram Sumaiya Thaseen

    2017-10-01

    Full Text Available Intrusion detection is a promising area of research in the domain of security with the rapid development of internet in everyday life. Many intrusion detection systems (IDS employ a sole classifier algorithm for classifying network traffic as normal or abnormal. Due to the large amount of data, these sole classifier models fail to achieve a high attack detection rate with reduced false alarm rate. However by applying dimensionality reduction, data can be efficiently reduced to an optimal set of attributes without loss of information and then classified accurately using a multi class modeling technique for identifying the different network attacks. In this paper, we propose an intrusion detection model using chi-square feature selection and multi class support vector machine (SVM. A parameter tuning technique is adopted for optimization of Radial Basis Function kernel parameter namely gamma represented by ‘ϒ’ and over fitting constant ‘C’. These are the two important parameters required for the SVM model. The main idea behind this model is to construct a multi class SVM which has not been adopted for IDS so far to decrease the training and testing time and increase the individual classification accuracy of the network attacks. The investigational results on NSL-KDD dataset which is an enhanced version of KDDCup 1999 dataset shows that our proposed approach results in a better detection rate and reduced false alarm rate. An experimentation on the computational time required for training and testing is also carried out for usage in time critical applications.

  7. Analysis of Salinity Intrusion in the San Francisco Bay-Delta Using a GA-Optimized Neural Net, and Application of the Model to Prediction in the Elkhorn Slough Habitat

    Science.gov (United States)

    Thompson, D. E.; Rajkumar, T.

    2002-12-01

    The San Francisco Bay Delta is a large hydrodynamic complex that incorporates the Sacramento and San Joaquin Estuaries, the Suisan Marsh, and the San Francisco Bay proper. Competition exists for the use of this extensive water system both from the fisheries industry, the agricultural industry, and from the marine and estuarine animal species within the Delta. As tidal fluctuations occur, more saline water pushes upstream allowing fish to migrate beyond the Suisan Marsh for breeding and habitat occupation. However, the agriculture industry does not want extensive salinity intrusion to impact water quality for human and plant consumption. The balance is regulated by pumping stations located along the estuaries and reservoirs whereby flushing of fresh water keeps the saline intrusion at bay. The pumping schedule is driven by data collected at various locations within the Bay Delta and by numerical models that predict the salinity intrusion as part of a larger model of the system. The Interagency Ecological Program (IEP) for the San Francisco Bay / Sacramento-San Joaquin Estuary collects, monitors, and archives the data, and the Department of Water Resources provides a numerical model simulation (DSM2) from which predictions are made that drive the pumping schedule. A problem with DSM2 is that the numerical simulation takes roughly 16 hours to complete a prediction. We have created a neural net, optimized with a genetic algorithm, that takes as input the archived data from multiple gauging stations and predicts stage, salinity, and flow at the Carquinez Straits (at the downstream end of the Suisan Marsh). This model seems to be robust in its predictions and operates much faster than the current numerical DSM2 model. Because the Bay-Delta is strongly tidally driven, we used both Principal Component Analysis and Fast Fourier Transforms to discover dominant features within the IEP data. We then filtered out the dominant tidal forcing to discover non-primary tidal effects

  8. Notes on saltwater intrusion and trace element distribution in Metro Manila groundwaters

    International Nuclear Information System (INIS)

    Santos, G. Jr.; Ramos, A.F.; Fernandez, L.G.; Almoneda, R.V.; Garcia, T.Y.; Cruz, C.C.; Petrache, C.A.; Andal, T.T.; Alcantara, E.

    1989-01-01

    Preliminary analyses of waters for uranium and other trace elements from deepwells operated by the Metropolitan Waterworks and Sewerage System (MWSS) in Metro Manila were performed. Uranium, which ranged from 0.2 ppb to 6 ppb, was correlated with saltwater intrusion. Values >=0.8 ppb for uranium were considered indicative of saline water intrusion in the aquifers. Saline water intrusions in Malabon, Navotas, Paranaque, Las Pinas, Bacoor, Imus, Kawit, Pasig, Antipolo, San Mateo, Taguig, Cainta, Taytay, Alabang and Muntinlupa were noted. Most of these areas were also identified by MWSS as being affected by saltwater intrusion. Tritium values ranged from 0 (below detection limits) to 44 tritium units. Except for one well in Muntinlupa, all the values obtained were below the lower limit of detection of 30.83 T.U. Mercury contents in six well locations had values above the maximum limit set by the National Standards for Drinking Water. Four wells exceeded the permissible level for manganese while two wells had iron concentrations greater than the National Standards. Other trace element concentrations such as Cr, Pb, Zn, Co and Ni either did not exceed their permissible levels or were not included in the National Standards. (Auth.). 6 refs.; 1 tab.; 3 figs

  9. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.

    Science.gov (United States)

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish-Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection.

  10. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    Science.gov (United States)

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  11. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  12. Reactive and multiphase modelling for the identification of monitoring parameters to detect CO2 intrusion into freshwater aquifers

    Science.gov (United States)

    Fahrner, S.; Schaefer, D.; Wiegers, C.; Köber, R.; Dahmke, A.

    2011-12-01

    A monitoring at geological CO2 storage sites has to meet environmental, regulative, financial and public demands and thus has to enable the detection of CO2 leakages. Current monitoring concepts for the detection of CO2 intrusion into freshwater aquifers located above saline storage formations in course of leakage events lack the identification of monitoring parameters. Their response to CO2 intrusion still has to be enlightened. Scenario simulations of CO2 intrusion in virtual synthetic aquifers are performed using the simulators PhreeqC and TOUGH2 to reveal relevant CO2-water-mineral interactions and multiphase behaviour on potential monitoring parameters. The focus is set on pH, total dissolved inorganic carbon (TIC) and the hydroelectric conductivity (EC). The study aims at identifying at which conditions the parameters react rapidly, durable and in a measurable degree. The depth of the aquifer, the mineralogy, the intrusion rates, the sorption specification and capacities, and groundwater flow velocities are varied in the course of the scenario modelling. All three parameters have been found suited in most scenarios. However, in case of a lack of calcite combined with low saturation of the water with respect to CO2 and shallow conditions, changes are close to the measurement resolution. Predicted changes in EC result from the interplay between carbonic acid production and its dissociation, and pH buffering by mineral dissolution. The formation of a discrete gas phase in cases of full saturation of the groundwater in confined aquifers illustrates the potential bipartite resistivity response: An increased hydroelectric conductivity at locations with dissolved CO2, and a high resistivity where the gas phase dominates the pore volume occupation. Increased hydrostatic pressure with depth and enhanced groundwater flow velocities enforce gas dissolution and diminish the formation of a discrete gas phase. Based on the results, a monitoring strategy is proposed which

  13. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  14. Why hasn't a seawater intrusion yet happened in the Kaluvelli-Pondicherry basin, Tamil Nadu, India?

    Science.gov (United States)

    Vincent, Aude; Violette, Sophie

    2016-04-01

    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is even bigger when those aquifers are overexploited, for example for irrigation, or when their recharge is low due to a semi-arid or arid climate. The sedimentary basin studied here presents both this characteristics, and water level records in the main aquifer can be as low as 30m below MSL. Though, no seawater intrusion has been monitored yet. To understand why, and because a good knowledge of a system hydrodynamic is a necessary step to an efficient water management strategy, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been implemented into a quasi-3D hydrogeological model performed with NEWSAM code. Recharge had been previously quantified through the intercomparison of hydrological models, based on surface flow field measurements. During the hydrogeological modelling, sensitivity tests on parameters, and on the nature of the boundary condition with the sea, led to the hypothesis of an offshore freshwater stock. Extension of this fresh groundwater stock has been calculated thanks to Groen approximation.

  15. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  16. Reanalysis of the consequences of a beyond-design based brine intrusion in the Schachtanlage Asse II. Further development of the radio-ecological modeling

    International Nuclear Information System (INIS)

    Kueppers, Christian; Ustohalova, Veronika; Steinhoff, Mathias

    2011-01-01

    The reanalysis of the consequences of a beyond-design based brine intrusion in the Schachtanlage Asse includes the following chapters: (1) Scope and introduction. (2) Overview on the methodology. (3) Modeling of the transport in the overlying rock and radiation exposure: Modeling of the radionuclide migration in the overlying rock considering the solubility limits and different retention and retarding effects; description of the used model for the radiation exposure calculations, quality assurance of the model and the calculations. (4) Results and reanalysis for the scenario I (GRS scenario). (5) Radiation exposure considering the solubility limits and transport calculations (scenario II). (6) Possibilities of monitoring in the Asse environment. (7) Estimation of collective doses as a consequence of contaminated water release into the biosphere and use as drinking water. (8) Discussion of the radiation exposure calculations in the former study of GRS (2009).

  17. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  18. Mapping saltwater intrusion in the Biscayne Aquifer, Miami-Dade County, Florida using transient electromagnetic sounding

    Science.gov (United States)

    Fitterman, David V.

    2014-01-01

    Saltwater intrusion in southern Florida poses a potential threat to the public drinking-water supply that is typically monitored using water samples and electromagnetic induction logs collected from a network of wells. Transient electromagnetic (TEM) soundings are a complementary addition to the monitoring program because of their ease of use, low cost, and ability to fill in data gaps between wells. TEM soundings have been used to map saltwater intrusion in the Biscayne aquifer over a large part of south Florida including eastern Miami-Dade County and the Everglades. These two areas are very different with one being urban and the other undeveloped. Each poses different conditions that affect data collection and data quality. In the developed areas, finding sites large enough to make soundings is difficult. The presence of underground pipes further restricts useable locations. Electromagnetic noise, which reduces data quality, is also an issue. In the Everglades, access to field sites is difficult and working in water-covered terrain is challenging. Nonetheless, TEM soundings are an effective tool for mapping saltwater intrusion. Direct estimates of water quality can be obtained from the inverted TEM data using a formation factor determined for the Biscayne aquifer. This formation factor is remarkably constant over Miami-Dade County owing to the uniformity of the aquifer and the absence of clay. Thirty-six TEM soundings were collected in the Model Land area of southeast Miami-Dade County to aid in calibration of a helicopter electromagnetic (HEM) survey. The soundings and HEM survey revealed an area of saltwater intrusion aligned with canals and drainage ditches along U.S. Highway 1 and the Card Sound Road. These canals and ditches likely reduced freshwater levels through unregulated drainage and provided pathways for seawater to flow at least 12.4 km inland.

  19. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  20. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  1. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  2. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  3. Analytical and numerical study of the salinity intrusion in the Sebou river estuary (Morocco) - effect of the "Super Blood Moon" (total lunar eclipse) of 2015

    Science.gov (United States)

    Haddout, Soufiane; Igouzal, Mohammed; Maslouhi, Abdellatif

    2016-09-01

    The longitudinal variation of salinity and the maximum salinity intrusion length in an alluvial estuary are important environmental concerns for policy makers and managers since they influence water quality, water utilization and agricultural development in estuarine environments and the potential use of water resources in general. The supermoon total lunar eclipse is a rare event. According to NASA, they have only occurred 5 times in the 1900s - in 1910, 1928, 1946, 1964 and 1982. After the 28 September 2015 total lunar eclipse, a Super Blood Moon eclipse will not recur before 8 October 2033. In this paper, for the first time, the impact of the combination of a supermoon and a total lunar eclipse on the salinity intrusion along an estuary is studied. The 28 September 2015 supermoon total lunar eclipse is the focus of this study and the Sebou river estuary (Morocco) is used as an application area. The Sebou estuary is an area with high agricultural potential, is becoming one of the most important industrial zones in Morocco and it is experiencing a salt intrusion problem. Hydrodynamic equations for tidal wave propagation coupled with the Savenije theory and a numerical salinity transport model (HEC-RAS software "Hydrologic Engineering Center River Analysis System") are applied to study the impact of the supermoon total lunar eclipse on the salinity intrusion. Intensive salinity measurements during this extreme event were recorded along the Sebou estuary. Measurements showed a modification of the shape of axial salinity profiles and a notable water elevation rise, compared with normal situations. The two optimization parameters (Van der Burgh's and dispersion coefficients) of the analytical model are estimated based on the Levenberg-Marquardt's algorithm (i.e., solving nonlinear least-squares problems). The salinity transport model was calibrated and validated using field data. The results show that the two models described very well the salt intrusion during the

  4. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  5. Silicate geothermometry as an indicator of water-rock interaction processes in the serpentinized mafic-ultramafic intrusion of Ylivieska

    International Nuclear Information System (INIS)

    Ruskeeniemi, T.; Blomqvist, R.; Vuorela, P.; Frape, S.K.; Blyth, A.

    1996-01-01

    The aim of the study was to use oxygen and hydrogen isotopes to examine the origin of different generations of serpentine. Of special interest was the study of low-temperature generations that may be correlated with the present meteoric waters. The research was commenced with drill core logging in order to obtain insight into the fracture minerals and their distribution in a mafic-ultramafic intrusion. (39 refs., 17 figs., 5 tabs.)

  6. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  7. The impact of river water intrusion on trace metal cycling in karst aquifers: an example from the Floridan aquifer system at Madison Blue Spring, Florida

    Science.gov (United States)

    Brown, A. L.; Martin, J. B.; Screaton, E.; Spellman, P.; Gulley, J.

    2011-12-01

    Springs located adjacent to rivers can serve as recharge points for aquifers when allogenic runoff increases river stage above the hydraulic head of the spring, forcing river water into the spring vent. Depending on relative compositions of the recharged water and groundwater, the recharged river water could be a source of dissolved trace metals to the aquifer, could mobilize solid phases such as metal oxide coatings, or both. Whether metals are mobilized or precipitated should depend on changes in redox and pH conditions as dissolved oxygen and organic carbon react following intrusion of the river water. To assess how river intrusion events affect metal cycling in springs, we monitored a small recharge event in April 2011 into Madison Blue Spring, which discharges to the Withlacoochee River in north-central Florida. Madison Blue Spring is the entrance to a phreatic cave system that includes over 7.8 km of surveyed conduits. During the event, river stage increased over base flow conditions for approximately 25 days by a maximum of 8%. Intrusion of the river water was monitored with conductivity, temperature and depth sensors that were installed within the cave system and adjacent wells. Decreased specific conductivity within the cave system occurred for approximately 20 days, reflecting the length of time that river water was present in the cave system. During this time, grab samples were collected seven times over a period of 34 days for measurements of major ion and trace metal concentrations at the spring vent and at Martz sink, a karst window connected to the conduit system approximately 150 meters from the spring vent. Relative fractions of surface water and groundwater were estimated based on Cl concentrations of the samples, assuming conservative two end-member mixing during the event. This mixing model indicates that maximum river water contribution to the groundwater system was approximately 20%. River water had concentrations of iron, manganese, and other

  8. Why seawater intrusion has not yet occurred in the Kaluvelli-Pondicherry basin, Tamil Nadu, India

    Science.gov (United States)

    Vincent, Aude; Violette, Sophie

    2017-09-01

    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is greatest when aquifers are overexploited or when recharge is low due to a semi-arid or arid climate. The Kaluvelli-Pondicherry sedimentary basin in Tamil Nadu (India) presents both these characteristics. Groundwater levels in the Vanur aquifer can reach 50 m below sea level at less than 20 km inland. This groundwater depletion is due to an exponential increase in extraction for irrigation over 35 years. No seawater intrusion has yet been detected, but a sulphate-rich mineralization is observed, the result of upward vertical leakage from the underlying Ramanathapuram aquifer. To characterize the mechanisms involved, and to facilitate effective water management, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been applied to a quasi-3D hydrogeological model, NEWSAM. Recharge had been previously quantified through the inter-comparison of hydrological models, based on climatological and surface-flow field measurements. Sensitivity tests on parameters and boundary conditions associated with the sea were performed. The resulting water balances for each aquifer led to hypotheses of (1) an offshore fresh groundwater stock, and (2) a reversal and increase of the upward leakage from the Ramanathapuram aquifer, thus corroborating the hypothesis proposed to explain geochemical results of the previous study, and denying a seawater intrusion. Palaeo-climate review supports the existence of favourable hydro-climatological conditions to replenish an offshore groundwater stock of the Vanur aquifer in the past. The extent of this fresh groundwater stock was calculated using the Kooi and Groen method.

  9. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    Science.gov (United States)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    Observations during recent decades show that there is a greater near surface warming occurring in the Arctic, particularly during winter, than at lower latitudes. Understanding the mechanisms controlling surface temperature in the Arctic is therefore an important priority in climate research. The surface energy budget is a key proximate control on Arctic surface temperature. During winter, insolation is low or absent and the atmospheric boundary layer is typically very stable, limiting turbulent hear exchange, so that the surface energy budget is almost entirely governed by longwave radiation. The net surface longwave radiation (NetLW) at this time has a strikingly bimodal distribution: conditions oscillate between a 'radiatively clear' state with rapid surface heat loss and a "moist cloudy" state with NetLW ˜ 0 W m-2. Each state can persist for days or weeks at a time but transitions between them happen in a matter of hours. This distribution of NetLW has important implications for the Arctic climate, as even a small shift in the frequency of occupancy of each state would be enough to significantly affect the overall surface energy budget and thus winter sea ice thickness. The clear and cloudy states typically occur during periods of relatively high and low surface pressure respectively, suggesting a link with synoptic-scale dynamics. This suggestion is consistent with previous studies indicating that the formation of low-level and mid-level clouds over the Arctic Ocean is typically associated with cyclonic activity and passing frontal systems . More recent work has shown that intense filamentary moisture intrusion events are a common feature in the Arctic and can induce large episodic increases of longwave radiation into the surface. The poleward transport of water vapor across 70N during boreal winter is examined in the ERA-Interim reanalysis product and 16 of the Coupled Model Intercomparison Project Phase 5 (CMIP5) models, focusing on intense moisture

  10. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  11. Assessing the impact of sea level rise due to climate change on seawater intrusion in Mekong Delta, Vietnam.

    Science.gov (United States)

    Vu, D T; Yamada, T; Ishidaira, H

    2018-03-01

    In the context of climate change, salinity intrusion into rivers has been, and will be, one of the most important issues for coastal water resources management. A combination of changes, including increased temperature, change in regional rainfall, especially sea level rise (SLR) related to climate change, will have significant impacts on this phenomenon. This paper presents the outcomes of a study conducted in the Mekong Delta of Vietnam (MKD) for evaluating the effect of sea water intrusion under a new SLR scenario. Salinity intrusion was simulated by one-dimensional (1D) modeling. The relative sea level projection was constructed corresponding to the RCP 6.0 emission scenario for MKD based on the statistical downscaling method. The sea level in 2050 is projected to increase from 25 cm to 30 cm compared to the baseline period (in 2000). Furthermore, the simulated results suggested that salinity greater than 4 g/l, which affects rice yield, will intrude up to 50-60 km into the river. Approximately 30,000 ha of agricultural area will be affected if the sea level rise is 30 cm.

  12. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  13. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  14. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  15. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  16. Effects of climate variability on saltwater intrusions in coastal aquifers in Southern Denmark

    Science.gov (United States)

    Meyer, Rena; Sonnenborg, Torben; Engesgaard, Peter; Høyer, Anne-Sophie; Jørgensen, Flemming; Hisnby, Klaus; Hansen, Birgitte; Jensen, Jørn Bo; Piotrowski, Jan A.

    2016-04-01

    As in many other regions of the world fresh water supply in Denmark is based on groundwater resources. Aquifers in the low-lying areas in the south-west of Jutland are particularly vulnerable to saltwater intrusions which are likely to intensify due to relative sea level rise. To understand the dynamics and development of this complex flow system, the initial hydrodynamic conditions imposed by the last Scandinavian Ice Sheet (SIS) must be taken into account. The whole region has undergone changes in climatic and hydraulic conditions within the last 15000 years that may show influence on the present flow conditions. It is likely that the groundwater-flow dynamics, driven by the postglacial hydraulic head drop and the relative sea level rise are not yet equilibrated. Enhanced by the potential future sea level rise due to climate change, contamination of fresh-water aquifers will continue. The 2800-km2 - large coast-to-coast study area located in the southern part of Jutland was partly overridden by the Weichselian ice sheet. Geophysical and geological mapping shows salt water intrusions up to 20 km inland from the present coast. Based on a geological voxel model spanning Miocene through Quaternary deposits a large-scale 3D numerical groundwater flow and salt water transport model has been developed. It includes density-driven flow and simulates the distribution of the current saltwater intrusions and their evolution during the last 15000 years. Particle tracking and direct age simulations are performed to identify recharge areas and constrain groundwater ages. The simulated ages are compared to ages derived from isotope analysis of groundwater samples both from Miocene and Quaternary aquifers. The origin of the groundwater is determined based on isotopic and chemical composition. Additionally, heavy noble gas analysis is carried out to estimate recharge temperatures and mechanisms at locations where groundwater recharge during the last glaciation is indicated. This

  17. Effects of an Unusual Cold-Water Intrusion in 2008 on the Catch of Coastal Fishing Methods around Penghu Islands, Taiwan

    Directory of Open Access Journals (Sweden)

    Ming-An Lee

    2014-01-01

    Full Text Available Based upon long-term observations (1993 - 2010 of satellite-derived winter sea surface temperature (SST data, an exceptional cold-water intrusion into the southern Taiwan Strait (TS was noted in February 2008. In the winter of 2008, La Niña caused a strong and continuous northeasterly wind that drove the cold ocean current, the China Coastal Current, more southward to penetrate the southern TS north of the Chang-Yuen Ridge. A portion of this current turned eastward to the south of Penghu Islands (PHI. The low-SST event significantly impeded local marine aquaculture and wild fish, causing the death of more than 73 tons of fish around PHI. Comparing variations of the first quarterly catches in 2008 with the long-term averages from 1993 to 2010 (excluding 2008, we noted a 50 to 80% decrease in catches from pole-and-line, long-line, and gill-net fishery. Non-migratory species dominated the composition of the catches. We also noted a greater than 230% increase in the catches from set-net fishery, with the majority being migratory species. These results illustrate the positive and negative effects of cold-water intrusion on several fish communities and species.

  18. Oxygen intrusion into anoxic fjords leads to increased methylmercury availability

    Science.gov (United States)

    Veiteberg Braaten, Hans Fredrik; Pakhomova, Svetlana; Yakushev, Evgeniy

    2013-04-01

    Mercury (Hg) appears in the oxic surface waters of the oceans at low levels (sub ng/L). Because inorganic Hg can be methylated into the toxic and bioaccumulative specie methylmercury (MeHg) levels can be high at the top of the marine food chain. Even though marine sea food is considered the main risk driver for MeHg exposure to people most research up to date has focused on Hg methylation processes in freshwater systems. This study identifies the mechanisms driving formation of MeHg during oxygen depletion in fjords, and shows how MeHg is made available in the surface water during oxygen intrusion. Studies of the biogeochemical structure in the water column of the Norwegian fjord Hunnbunn were performed in 2009, 2011 and 2012. In autumn of 2011 mixing flushing events were observed and lead to both positive and negative effects on the ecosystem state in the fjord. The oxygenated water intrusions lead to a decrease of the deep layer concentrations of hydrogen sulfide (H2S), ammonia and phosphate. On the other hand the intrusion also raised the H2S boundary from 8 m to a shallower depth of just 4 m. Following the intrusion was also observed an increase at shallower depths of nutrients combined with a decrease of pH. Before flushing events were observed concentrations of total Hg (TotHg) increased from 1.3 - 1.7 ng/L in the surface layer of the fjord to concentrations ranging from 5.2 ng/L to 6.4 ng/L in the anoxic zone. MeHg increased regularly from 0.04 ng/L in the surface water to a maximum concentration of 5.2 ng/L in the deeper layers. This corresponds to an amount of TotHg present as MeHg ranging from 2.1 % to 99 %. The higher concentrations of MeHg in the deeper layer corresponds to an area where no oxygen is present and concentrations of H2S exceeds 500 µM, suggesting a production of MeHg in the anoxic area as a result of sulphate reducing bacteria activity. After flushing the concentrations of TotHg showed a similar pattern ranging from 0.6 ng/L in the

  19. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  20. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  1. Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic

    Directory of Open Access Journals (Sweden)

    Amit Kleinmann

    2014-09-01

    Full Text Available The Siemens S7 protocol is commonly used in SCADA systems for communications between a Human Machine Interface (HMI and the Programmable Logic Controllers (PLCs. This paper presents a model-based Intrusion Detection Systems (IDS designed for S7 networks. The approach is based on the key observation that S7 traffic to and from a specific PLC is highly periodic; as a result, each HMI-PLC channel can be modeled using its own unique Deterministic Finite Automaton (DFA. The resulting DFA-based IDS is very sensitive and is able to flag anomalies such as a message appearing out of its position in the normal sequence or a message referring to a single unexpected bit. The intrusion detection approach was evaluated on traffic from two production systems. Despite its high sensitivity, the system had a very low false positive rate - over 99.82% of the traffic was identified as normal.

  2. Community Based Educational Model on Water Conservation Program

    Science.gov (United States)

    Sudiajeng, L.; Parwita, I. G. L.; Wiraga, I. W.; Mudhina, M.

    2018-01-01

    The previous research showed that there were indicators of water crisis in the northern and eastern part of Denpasar city and most of coastal area experienced on seawater intrusion. The recommended water conservation programs were rainwater harvesting and educate the community to develop a water saving and environmentally conscious culture. This research was conducted to built the community based educational model on water conservation program through ergonomics SHIP approach which placed the human aspect as the first consideration, besides the economic and technically aspects. The stakeholders involved in the program started from the problem analyses to the implementation and the maintenance as well. The model was built through three main steps, included determination of accepted design; building the recharge wells by involving local communities; guidance and assistance in developing a water saving and environmentally conscious culture for early childhood, elementary and junior high school students, community and industry. The program was implemented based on the “TRIHITA KARANA” concept, which means the relationship between human to God, human-to-human, and human to environment. Through the development of the model, it is expected to grow a sense of belonging and awareness from the community to maintain the sustainability of the program.

  3. Floor-fractured craters on the Moon: an evidence of past intrusive magmatic activity

    Science.gov (United States)

    Thorey, C.; Michaut, C.

    2012-12-01

    Floor-fractured lunar craters (FFC's) are a class of craters modified by post impact mechanisms. They are defined by distinctive shallow, often plate-like or convex floors, wide floor moats and radial, concentric and polygonal floor-fractures, suggesting an endogenous process of modification. Two main mechanisms have been proposed to account for such observations : 1) viscous relaxation and 2) spreading of magmatic intrusions at depth below the crater. Here, we propose to test the case of magmatic intrusions. We develop a model for the dynamics of magma spreading below an elastic crust with a crater-like topography and above a rigid horizontal surface. Results show first that the lithostatic pressure increase at the crater rim prevents the intrusion from spreading horizontally giving rise to intrusion thickening and to an uplift of the crater floor. Second, the deformation of the overlying crust exerts a strong control on the intrusion shape, and hence, on the nature of the crater floor uplift. As the deformation can only occur over a minimum flexural wavelength noted Λ, the intrusion shape shows a bell-shaped geometry for crater radius smaller than 3Λ, or a flat top with smooth edges for crater radius larger than 3Λ. For given crustal elastic properties, the crust flexural wavelength increases with the intrusion depth. Therefore, for a large intrusion depth or small crater size, we observe a convex uplift of the crater floor. On the contrary, for a small intrusion depth or large crater size, the crater floor undergoes a piston-like uplift and a circular moat forms just before the rim. The depth of the moat is controlled by the thickening of the crust at the crater rim. On the contrary to viscous relaxation models, our model is thus able to reproduce most of the features of FFC's, including small-scale features. Spreading of a magmatic intrusion at depth can thus be considered as the main endogenous mechanism at the origin of the deformations observed at FFC

  4. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  5. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    Science.gov (United States)

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  6. Spatial variability analysis of combining the water quality and groundwater flow model to plan groundwater and surface water management in the Pingtung plain

    Science.gov (United States)

    Chen, Ching-Fang; Chen, Jui-Sheng; Jang, Cheng-Shin

    2014-05-01

    As a result of rapid economic growth in the Pingtung Plain, the use of groundwater resources has changed dramatically. The groundwater is quite rich in the Pingtung plain and the most important water sources. During the several decades, a substantial amount of groundwater has been pumped for the drinking, irrigation and aquaculture water supplies. However, because the sustainable use concept of groundwater resources is lack, excessive pumping of groundwater causes the occurrence of serious land subsidence and sea water intrusion. Thus, the management and conservation of groundwater resources in the Pingtung plain are considerably critical. This study aims to assess the conjunct use effect of groundwater and surface water in the Pingtung plain on recharge by reducing the amount of groundwater extraction. The groundwater quality variability and groundwater flow models are combined to spatially analyze potential zones of groundwater used for multi-purpose in the Pingtung Plain. First, multivariate indicator kriging (MVIK) is used to analyze spatial variability of groundwater quality based on drinking, aquaculture and irrigation water quality standards, and probabilistically delineate suitable zones in the study area. Then, the groundwater flow model, Processing MODFLOW (PMWIN), is adopted to simulate groundwater flow. The groundwater flow model must be conducted by the calibration and verification processes, and the regional groundwater recovery is discussed when specified water rights are replaced by surface water in the Pingtung plain. Finally, the most suitable zones of reducing groundwater use are determined for multi-purpose according to combining groundwater quality and quantity. The study results can establish a sound and low-impact management plan of groundwater resources utilization for the multi-purpose groundwater use, and prevent decreasing ground water tables, and the occurrence of land subsidence and sea water intrusion in the Pingtung plain.

  7. Carbonatite and alkaline intrusion-related rare earth element deposits–A deposit model

    Science.gov (United States)

    Verplanck, Philip L.; Van Gosen, Bradley S.

    2011-01-01

    The rare earth elements are not as rare in nature as their name implies, but economic deposits with these elements are not common and few deposits have been large producers. In the past 25 years, demand for rare earth elements has increased dramatically because of their wide and diverse use in high-technology applications. Yet, presently the global production and supply of rare earth elements come from only a few sources. China produces more than 95 percent of the world's supply of rare earth elements. Because of China's decision to restrict exports of these elements, the price of rare earth elements has increased and industrial countries are concerned about supply shortages. As a result, understanding the distribution and origin of rare earth elements deposits, and identifying and quantifying our nation's rare earth elements resources have become priorities. Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. The general mineral deposit model summarized here is part of an effort by the U.S. Geological Survey's Mineral Resources Program to update existing models and develop new descriptive mineral deposit models to supplement previously published models for use in mineral-resource and mineral-environmental assessments. Carbonatite and alkaline intrusion-related REE deposits are discussed together because of their spatial association, common enrichment in incompatible elements, and similarities in genesis. A wide variety of commodities have been exploited from carbonatites and alkaline igneous rocks, such as rare earth elements, niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other enrichments include manganese, strontium, tantalum, thorium, vanadium, and uranium.

  8. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  9. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  10. The electrical self-potential method is a non-intrusive snow-hydrological sensor

    Science.gov (United States)

    Thompson, S. S.; Kulessa, B.; Essery, R. L. H.; Lüthi, M. P.

    2015-08-01

    Our ability to measure, quantify and assimilate hydrological properties and processes of snow in operational models is disproportionally poor compared to the significance of seasonal snowmelt as a global water resource and major risk factor in flood and avalanche forecasting. Encouraged by recent theoretical, modelling and laboratory work, we show here that the diurnal evolution of aerially-distributed self-potential magnitudes closely track those of bulk meltwater fluxes in melting in-situ snowpacks at Rhone and Jungfraujoch glaciers, Switzerland. Numerical modelling infers temporally-evolving liquid water contents in the snowpacks on successive days in close agreement with snow-pit measurements. Muting previous concerns, the governing physical and chemical properties of snow and meltwater became temporally invariant for modelling purposes. Because measurement procedure is straightforward and readily automated for continuous monitoring over significant spatial scales, we conclude that the self-potential geophysical method is a highly-promising non-intrusive snow-hydrological sensor for measurement practice, modelling and operational snow forecasting.

  11. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    Science.gov (United States)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  12. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  13. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  14. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  15. Geophysical characterization of saltwater intrusion in a coastal aquifer: The case of Martil-Alila plain (North Morocco)

    Science.gov (United States)

    Himi, Mahjoub; Tapias, Josefiina; Benabdelouahab, Sara; Salhi, Adil; Rivero, Luis; Elgettafi, Mohamed; El Mandour, Abdenabi; Stitou, Jamal; Casas, Albert

    2017-02-01

    Several factors can affect the quantity and the quality of groundwater resources, but in coastal aquifers seawater intrusion is often the most significant issue regarding freshwater supply. Further, saltwater intrusion is a worldwide issue because about seventy percent of the world's population lives in coastal regions. Generally, fresh groundwater not affected by saltwater intrusion is characterized by low salinity and therefore low electrical conductivity (EC) values. Consequently, high values of EC in groundwater along the coastline are usually associated to seawater intrusion. This effect is amplified if the coastal aquifer is overexploited with a subsequent gradual displacement of the freshwater-saltwater interface towards the continent. Delineation of marine intrusion in coastal aquifers has traditionally relied upon observation wells and collection of water samples. This approach may miss important hydrologic features related to saltwater intrusion in areas where access is difficult and where wells are widely spaced. Consequently, the scarcity of sampling points and sometimes their total absence makes the number of data available limited and most of the time not representative for mapping the spatial and temporal variability of groundwater salinity. In this study, we use a series of geophysical methods for characterizing the aquifer geometry and the extension of saltwater intrusion in the Martil-Alila coastal region (Morocco) as a complement to geological and hydrogeochemical data. For this reason, we carried out three geophysical surveys: Gravity, Electrical Resistivity and Frequency Domain Electromagnetic. The geometry of the basin has been determined from the interpretation of a detailed gravity survey. Electrical resistivity models derived from vertical electrical soundings allowed to characterize the vertical and the lateral extensions of aquifer formations. Finally, frequency domain electromagnetic methods allowed delineating the extension of the

  16. Single-process versus multiple-strategy models of decision making: evidence from an information intrusion paradigm.

    Science.gov (United States)

    Söllner, Anke; Bröder, Arndt; Glöckner, Andreas; Betsch, Tilmann

    2014-02-01

    When decision makers are confronted with different problems and situations, do they use a uniform mechanism as assumed by single-process models (SPMs) or do they choose adaptively from a set of available decision strategies as multiple-strategy models (MSMs) imply? Both frameworks of decision making have gathered a lot of support, but only rarely have they been contrasted with each other. Employing an information intrusion paradigm for multi-attribute decisions from givens, SPM and MSM predictions on information search, decision outcomes, attention, and confidence judgments were derived and tested against each other in two experiments. The results consistently support the SPM view: Participants seemingly using a "take-the-best" (TTB) strategy do not ignore TTB-irrelevant information as MSMs would predict, but adapt the amount of information searched, choose alternative choice options, and show varying confidence judgments contingent on the quality of the "irrelevant" information. The uniformity of these findings underlines the adequacy of the novel information intrusion paradigm and comprehensively promotes the notion of a uniform decision making mechanism as assumed by single-process models. Copyright © 2013 The Authors. Published by Elsevier B.V. All rights reserved.

  17. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  18. Non-intrusive Packet-Layer Model for Monitoring Video Quality of IPTV Services

    Science.gov (United States)

    Yamagishi, Kazuhisa; Hayashi, Takanori

    Developing a non-intrusive packet-layer model is required to passively monitor the quality of experience (QoE) during service. We propose a packet-layer model that can be used to estimate the video quality of IPTV using quality parameters derived from transmitted packet headers. The computational load of the model is lighter than that of the model that takes video signals and/or video-related bitstream information such as motion vectors as input. This model is applicable even if the transmitted bitstream information is encrypted because it uses transmitted packet headers rather than bitstream information. For developing the model, we conducted three extensive subjective quality assessments for different encoders and decoders (codecs), and video content. Then, we modeled the subjective video quality assessment characteristics based on objective features affected by coding and packet loss. Finally, we verified the model's validity by applying our model to unknown data sets different from training data sets used above.

  19. Isotope and Hydrochemical Study of Seawater Intrusion into the Aquifers of a Coastal Zone in Cuba

    Energy Technology Data Exchange (ETDEWEB)

    Dapena, C.; Panarello, H. O.; Ducos, E. I.; Marban, L. [Instituto de Geocronologia y Geologia Isotopica (INGEIS, CONICET -UBA), Buenos Aires (Argentina); Peralta Vital, J. L.; Gil Castillo, R.; Leyva Bombuse, D. [Centro de Proteccion e Higiene de las Radiaciones (CPHR), La Habana (Cuba); Valdez, L. [Empresa de Investigaciones y Proyectos Hidraulicos Habana, La Habana (Cuba); Olivera Acosta, J. [Instituto de Geofisica y Astronomia. La Habana (Cuba)

    2013-07-15

    The Artemisa-Quivican Basin is located in the southern sector of the province of Havana, Cuba. This basin contains the most important aquifer of Havana province. It has a length of nearly 120 km and is 25 km in width. Recharge depends on the precipitation regime and rain infiltrates in a considerable proportion due to the intense development of karstic features. This aquifer is used for water supply to population, industry, and irrigation and is affected by over-exploitation and risk of contamination by saline sea intrusion. The main objective of this study is the isotope and chemical characterization of the aquifer and the delimitation of the area influenced by saline intrusion. Groundwater and river water are of the calcium bicarbonate type except those with evidence of mixture with saline water. Groundwater exhibits a variable proportion of mixture with seawater, indicating the presence of the saline intrusion. (author)

  20. Numerical simulations of hydrothermal circulation resulting from basalt intrusions in a buried spreading center

    Science.gov (United States)

    Fisher, A.T.; Narasimhan, T.N.

    1991-01-01

    A two-dimensional, one by two-kilometer section through the seafloor was simulated with a numerical model to investigate coupled fluid and heat flow resulting from basalt intrusions in a buried spreading center. Boundary and initial conditions and physical properties of both sediments and basalt were constrained by field surveys and drilling in the Guaymas Basin, central Gulf of California. Parametric variations in these studies included sediment and basalt permeability, anisotropy in sediment permeability, and the size of heat sources. Faults were introduced through new intrusions both before and after cooling.Background heat input caused fluid convection at velocities ≤ 3 cm a−1 through shallow sediments. Eighty to ninety percent of the heat introduced at the base of the simulations exited through the upper, horizontal surface, even when the vertical boundaries were made permeable to fluid flow. The simulated injection of a 25–50 m thick basalt intrusion at a depth of 250 m resulted in about 10 yr of pore-fluid expulsion through the sea-floor in all cases, leaving the sediments above the intrusions strongly underpressured. A longer period of fluid recharge followed, sometimes accompanied by reductions in total seafloor heat output of 10% in comparison to pre-intrusion values. Additional discharge-recharge events were dispersed chaotically through the duration of the cooling period. These cycles in heat and fluid flow resulted from the response of the simulated system to a thermodynamic shock, the sudden emplacement of a large heat source, and not from mechanical displacement of sediments and pore fluids, which was not simulated.Water/rock mass ratios calculated from numerical simulations are in good agreement with geochemical estimates from materials recovered from the Guaymas Basin, assuming a bulk basalt permeability value of at least 10−17 m2/(10−2 mD). The addition of faults through intrusions and sediments in these simulations did not facilitate

  1. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  2. 3D modeling of a dolerite intrusion from the photogrammetric and geophysical data integration.

    Science.gov (United States)

    Duarte, João; Machadinho, Ana; Figueiredo, Fernando; Mira, Maria

    2015-04-01

    The aims of this study is create a methodology based on the integration of data obtained from various available technologies, which allow a credible and complete evaluation of rock masses. In this particular case of a dolerite intrusion, which deployed an exploration of aggregates and belongs to the Jobasaltos - Extracção e Britagem. S.A.. Dolerite intrusion is situated in the volcanic complex of Serra de Todo-o-Mundo, Casais Gaiola, intruded in Jurassic sandstones. The integration of the surface and subsurface mapping, obtained by technology UAVs (Drone) and geophysical surveys (Electromagnetic Method - TEM 48 FAST), allows the construction of 2D and 3D models of the study local. The combination of the 3D point clouds produced from two distinct processes, modeling of photogrammetric and geophysical data, will be the basis for the construction of a single model of set. The rock masses in an integral perspective being visible their development above the surface and subsurface. The presentation of 2D and 3D models will give a perspective of structures, fracturation, lithology and their spatial correlations contributing to a better local knowledge, as well as its potential for the intended purpose. From these local models it will be possible to characterize and quantify the geological structures. These models will have its importance as a tool to assist in the analysis and drafting of regional models. The qualitative improvement in geological/structural modeling, seeks to reduce the value of characterization/cost ratio, in phase of prospecting, improving the investment/benefit ratio. This methodology helps to assess more accurately the economic viability of the projects.

  3. Global assessment of coastal aquifer state and its vulnerability respect to Sea Water Intrusion. Application to several Mediterranean Coastal Aquifers.

    Science.gov (United States)

    Baena, Leticia; Pulido-Velazquez, David; Renau-Pruñonosa, Arianna; Morell, Ignacio

    2017-04-01

    In this research we propose a method for a global assessment of coastal aquifer state and its vulnerability to Sea Water Intrusion (SWI). It is based on two indices, the MART index, which summarize the global significance of the SWI phenomenon, and the L_GALDIT for a lumped assessment of the vulnerability to SWI. Both of them can be useful as a tool to assess coastal groundwater bodies in risk of not achieving good status in accordance with the Water Framework Directive (WFD, 2000) and to identify possible management alternative to reduce existing impacts. They can be obtained even from a reduced number of data (in the MART case only depend on the geometry and available aquifer state data) with simple calculations, which have been implemented in a general GIS tool that can be easily applied to other case studies. The MART index in an aquifer is related with the total mass of chloride in the aquifer due to sea water intrusion and can be obtained by simple linear operations of volume and concentrations that can be deduced from a schematic conceptual cross-section approach (orthogonal to the shore line) defined to summarize the intrusion volume in the aquifer. At a certain historical time, this representative aquifer cross-section can be defined in a systhematic way from the aquifer geometry, the specific yield, and the hydraulic head and chloride concentration fields that can be deduced from the available information by using appropriate interpolation methods. Following the proposed procedure we will finally obtain a summary of the historical significance of the SWI in an aquifer at different spatial resolution: 3D salinity concentration maps, 2D representative conceptual cross-section of intrusion and the MART lumped significance index. The historical evolution of the MART can be employed to perform a global assessment of the resilience and trends of global significance of the SWI in an aquifer. It can be useful to compare the significance of intrusion problems in

  4. A numerical investigation of vapor intrusion--the dynamic response of contaminant vapors to rainfall events.

    Science.gov (United States)

    Shen, Rui; Pennell, Kelly G; Suuberg, Eric M

    2012-10-15

    The U.S. government and various agencies have published guidelines for field investigation of vapor intrusion, most of which suggest soil gas sampling as an integral part of the investigation. Contaminant soil gas data are often relatively more stable than indoor air vapor concentration measurements, but meteorological conditions might influence soil gas values. Although a few field and numerical studies have considered some temporal effects on soil gas vapor transport, a full explanation of the contaminant vapor concentration response to rainfall events is not available. This manuscript seeks to demonstrate the effects on soil vapor transport during and after different rainfall events, by applying a coupled numerical model of fluid flow and vapor transport. Both a single rainfall event and seasonal rainfall events were modeled. For the single rainfall event models, the vapor response process could be divided into three steps: namely, infiltration, water redistribution, and establishment of a water lens atop the groundwater source. In the infiltration step, rainfall intensity was found to determine the speed of the wetting front and wash-out effect on the vapor. The passage of the wetting front led to an increase of the vapor concentration in both the infiltration and water redistribution steps and this effect is noted at soil probes located 1m below the ground surface. When the mixing of groundwater with infiltrated water was not allowed, a clean water lens accumulated above the groundwater source and led to a capping effect which can reduce diffusion rates of contaminant from the source. Seasonal rainfall with short time intervals involved superposition of the individual rainfall events. This modeling results indicated that for relatively deeper soil that the infiltration wetting front could not flood, the effects were damped out in less than a month after rain; while in the long term (years), possible formation of a water lens played a larger role in determining

  5. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  6. The Torres del Paine intrusion as a model for a shallow magma chamber

    Science.gov (United States)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  7. Intrusion Pattern of the Offshore Kuroshio Branch Current and Its Effects on Nutrient Contributions in the East China Sea

    Science.gov (United States)

    Wang, Wentao; Yu, Zhiming; Song, Xiuxian; Yuan, Yongquan; Wu, Zaixing; Zhou, Peng; Cao, Xihua

    2018-03-01

    During the autumn season of 2014 (October-November), nutrient samples and nitrogen and oxygen isotope samples from the East China Sea (ECS) were collected and analyzed, and auxiliary physical parameters were determined. Distinctive high-salinity water column conditions with significant haloclines and pycnoclines similar to those observed during the spring were detected at the bottom of the ECS during the autumn. These water column conditions were attributed to the intrusion of the Kuroshio Subsurface Water (KSSW), which then separated into two currents, including the Offshore Kuroshio Branch Current (OKBC). Compared with spring, this intrusion transported higher phosphorus (P) concentrations onto the ECS continental shelf in autumn. However, according to multiple analyses, biogeochemical nitrogen processes are unable to explain the variations in the P concentrations (increase) while assuming that each distinctive water column is consistent. Identifying the water columns by their salinities and P concentrations revealed that the northern ECS water column was similar to the deep KSSW while the southern ECS water column was similar to the shallow KSSW. Therefore, we speculate that the distinctions among the seasonal variations of P-enriched water masses were attributable to the different intrusion positions of the Kuroshio. The shift of the KSSW intrusion location moved toward the northeast during the autumn relative to the spring. This shift, which was proved by the oceanic vortex data, caused the deeper KSSW water upwelled to the ECS and formed the OKBC, thereby supplying additional P during the autumn.

  8. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  9. Intrusions of Kuroshio and Shelf Waters on Northern Slope of South China Sea in Summer 2015

    Science.gov (United States)

    Li, Denghui; Zhou, Meng; Zhang, Zhaoru; Zhong, Yisen; Zhu, Yiwu; Yang, Chenghao; Xu, Mingquan; Xu, Dongfeng; Hu, Ziyuan

    2018-06-01

    The northern slope region of the South China Sea (SCS) is a biological hot spot characterized by high primary productivity and biomasses transported by cross-shelf currents, which support the spawning and growth of commercially and ecologically important fish species. To understand the physical and biogeochemical processes that promote the high primary production of this region, we conducted a cruise from June 10 and July 2, 2015. In this study, we used fuzzy cluster analysis and optimum multiparameter analysis methods to analyze the hydrographic data collected during the cruise to determine the compositions of the upper 55-m water masses on the SCS northern slope and thereby elucidate the cross-slope transport of shelf water (SHW) and the intrusions of Kuroshio water (KW). We also analyzed the geostrophic currents derived from acoustic Doppler current profiler measurements and satellite data. The results reveal the surface waters on the northern slope of the SCS to be primarily composed of waters originating from South China Sea water (SCSW), KW, and SHW. The SCSW dominated a majority of the study region at percentages ranging between 60% and 100%. We found a strong cross-slope current with speeds greater than 50 cm s-1 to have carried SHW into and through the surveyed slope area, and KW to have intruded onto the slope via mesoscale eddies, thereby dominating the southwestern section of the study area.

  10. Mechanical intrusion models and their implications for the possibility of magma-driven swarms in NW Bohemia region

    Czech Academy of Sciences Publication Activity Database

    Dahm, T.; Fischer, Tomáš; Hainzl, S.

    2008-01-01

    Roč. 52, č. 4 (2008), s. 529-548 ISSN 0039-3169 Institutional research plan: CEZ:AV0Z30120515 Keywords : earthquake swarm * seismicity * magma tic intrusion * fracture model Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.770, year: 2008

  11. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    Science.gov (United States)

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  12. Provide a model to improve the performance of intrusion detection systems in the cloud

    OpenAIRE

    Foroogh Sedighi

    2016-01-01

    High availability of tools and service providers in cloud computing and the fact that cloud computing services are provided by internet and deal with public, have caused important challenges for new computing model. Cloud computing faces problems and challenges such as user privacy, data security, data ownership, availability of services, and recovery after breaking down, performance, scalability, programmability. So far, many different methods are presented for detection of intrusion in clou...

  13. Assessment of Water Salinity Model Using Hydrodynamic Numerical Modelling in Estuary of Selangor River, Malaysia

    International Nuclear Information System (INIS)

    Mohd Ekhwan Toriman; Mohd Ekhwan Toriman; Norbaya Hashim; Mohd Khairul Amri Kamarudin; Abdul Jalil Hassan; Ayaari Muhamad; Nor Azlina Abd Aziz

    2015-01-01

    Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (author)

  14. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  15. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    moving upwards and laterally through the cumulate pile. The Rum layered intrusion is an open intrusive complex, composed of individual partially molten zones, evolving independently. The Rum layered intrusion offers a direct overview of processes taking place in shallow intra-plate and ridge magma chambers. Intrusion of hot magma into a pre-existing cumulate pile results in the modification both the incoming liquid and the host-rock cumulates. Our study highlights the necessity of considering this type of process when modelling the geochemistry of lavas erupted from magma chambers subject to repeated replenishment.

  16. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    KAUST Repository

    Picone, Sara

    2012-03-30

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion. © 2012 SETAC.

  17. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  18. Inverse modeling for seawater intrusion in coastal aquifers: Insights about parameter sensitivities, variances, correlations and estimation procedures derived from the Henry problem

    Science.gov (United States)

    Sanz, E.; Voss, C.I.

    2006-01-01

    Inverse modeling studies employing data collected from the classic Henry seawater intrusion problem give insight into several important aspects of inverse modeling of seawater intrusion problems and effective measurement strategies for estimation of parameters for seawater intrusion. Despite the simplicity of the Henry problem, it embodies the behavior of a typical seawater intrusion situation in a single aquifer. Data collected from the numerical problem solution are employed without added noise in order to focus on the aspects of inverse modeling strategies dictated by the physics of variable-density flow and solute transport during seawater intrusion. Covariances of model parameters that can be estimated are strongly dependent on the physics. The insights gained from this type of analysis may be directly applied to field problems in the presence of data errors, using standard inverse modeling approaches to deal with uncertainty in data. Covariance analysis of the Henry problem indicates that in order to generally reduce variance of parameter estimates, the ideal places to measure pressure are as far away from the coast as possible, at any depth, and the ideal places to measure concentration are near the bottom of the aquifer between the center of the transition zone and its inland fringe. These observations are located in and near high-sensitivity regions of system parameters, which may be identified in a sensitivity analysis with respect to several parameters. However, both the form of error distribution in the observations and the observation weights impact the spatial sensitivity distributions, and different choices for error distributions or weights can result in significantly different regions of high sensitivity. Thus, in order to design effective sampling networks, the error form and weights must be carefully considered. For the Henry problem, permeability and freshwater inflow can be estimated with low estimation variance from only pressure or only

  19. Development and testing af a model for the supergene distribution of uranium and accompanying elements around a known uranium deposit associated with an alkaline intrusion

    International Nuclear Information System (INIS)

    Rose-Hansen, J.; Soerensen, H.

    1983-01-01

    The Ilimaussaq intrusion may be characterized as a geochemically abnormal region, since its rocks are strongly enriched in a number of rare elements, including elements which accompany uranium in deposits in other parts of the world. Examples are the rare earth metals, Nb, Ta, Be, Li, and metals as Cu, Pb, Zn, Mo and Sn. It was proposed to develop and test a model for the supergene distribution of uranium and accompanying elements around a known uranium deposit associated with an alkaline intrusion. The most promising results are those obtained by the PCA technique. For a more preliminary study of a region fjord and river sediments might be the sampling target. These sediments were found to be mixtures in which the proportion of material from the Ilimaussaq U-deposit could be evaluated by the PCA technique involving a distance function related to the loadings in the first principal dimen- sion of the elements characterizing the Ilimaussaq Intrusion. One of the major features of the material sampled in this study is the general high degree of preservation in the sub-arctic environment of the primary igneous mineralogy in the sediments, and in other areas, the structure of data should be investigated in order to test them in this respect. One obvious way is X-ray diffraction analysis. It was indicated that uranium is selectively absorbed on the organic material in lakes and is able to reflect the concentration of U in the lake waters, informing the ultimate potential of the drainage areas in question. It is however yet to be established whether the correlation of uranium and the organic material of the lake sediments actually reflects the long term U concentrations of the lake water. The use of the cluster analysis and discriminant analysis techniques proved to be of lesser value in this project. (author)

  20. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  1. Non-intrusive low-rank separated approximation of high-dimensional stochastic models

    KAUST Repository

    Doostan, Alireza; Validi, AbdoulAhad; Iaccarino, Gianluca

    2013-01-01

    This work proposes a sampling-based (non-intrusive) approach within the context of low-. rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs. © 2013 Elsevier B.V.

  2. Non-intrusive low-rank separated approximation of high-dimensional stochastic models

    KAUST Repository

    Doostan, Alireza

    2013-08-01

    This work proposes a sampling-based (non-intrusive) approach within the context of low-. rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs. © 2013 Elsevier B.V.

  3. Impact of chemical lateral boundary conditions in a regional air quality forecast model on surface ozone predictions during stratospheric intrusions

    Science.gov (United States)

    Pendlebury, Diane; Gravel, Sylvie; Moran, Michael D.; Lupu, Alexandru

    2018-02-01

    A regional air quality forecast model, GEM-MACH, is used to examine the conditions under which a limited-area air quality model can accurately forecast near-surface ozone concentrations during stratospheric intrusions. Periods in 2010 and 2014 with known stratospheric intrusions over North America were modelled using four different ozone lateral boundary conditions obtained from a seasonal climatology, a dynamically-interpolated monthly climatology, global air quality forecasts, and global air quality reanalyses. It is shown that the mean bias and correlation in surface ozone over the course of a season can be improved by using time-varying ozone lateral boundary conditions, particularly through the correct assignment of stratospheric vs. tropospheric ozone along the western lateral boundary (for North America). Part of the improvement in surface ozone forecasts results from improvements in the characterization of near-surface ozone along the lateral boundaries that then directly impact surface locations near the boundaries. However, there is an additional benefit from the correct characterization of the location of the tropopause along the western lateral boundary such that the model can correctly simulate stratospheric intrusions and their associated exchange of ozone from stratosphere to troposphere. Over a three-month period in spring 2010, the mean bias was seen to improve by as much as 5 ppbv and the correlation by 0.1 depending on location, and on the form of the chemical lateral boundary condition.

  4. A Numerical Investigation of Vapor Intrusion — the Dynamic Response of Contaminant Vapors to Rainfall Events

    Science.gov (United States)

    Shen, Rui; Pennell, Kelly G.; Suuberg, Eric M.

    2013-01-01

    The U.S. government and various agencies have published guidelines for field investigation of vapor intrusion, most of which suggest soil gas sampling as an integral part of the investigation. Contaminant soil gas data are often relatively more stable than indoor air vapor concentration measurements, but meteorological conditions might influence soil gas values. Although a few field and numerical studies have considered some temporal effects on soil gas vapor transport, a full explanation of the contaminant vapor concentration response to rainfall events is not available. This manuscript seeks to demonstrate the effects on soil vapor transport during and after different rainfall events, by applying a coupled numerical model of fluid flow and vapor transport. Both a single rainfall event and seasonal rainfall events were modeled. For the single rainfall event models, the vapor response process could be divided into three steps: namely, infiltration, water redistribution, and establishment of a water lens atop the groundwater source. In the infiltration step, rainfall intensity was found to determine the speed of the wetting front and wash-out effect on the vapor. The passage of the wetting front led to an increase of the vapor concentration in both the infiltration and water redistribution steps and this effect is noted at soil probes located 1 m below the ground surface. When the mixing of groundwater with infiltrated water was not allowed, a clean water lens accumulated above the groundwater source and led to a capping effect which can reduce diffusion rates of contaminant from the source. Seasonal rainfall with short time intervals involved superposition of the individual rainfall events. This modeling results indicated that for relatively deeper soil that the infiltration wetting front could not flood, the effects were damped out in less than a month after rain; while in the long term (years), possible formation of a water lens played a larger role in

  5. Combining urbanization and hydrodynamics data to evaluate sea level rise impacts on coastal water resources

    Science.gov (United States)

    Young, C. R.; Martin, J. B.

    2016-02-01

    Assessments of the potential for salt water intrusion due to sea level rise require consideration of both coastal hydrodynamic and human activity thresholds. In siliciclastic systems, sea level rise may cause salt intrusion to coastal aquifers at annual or decadal scales, whereas in karst systems salt intrudes at the tidal scalse. In both cases, human activity impacts the freshwater portion of the system by altering the water demand on the aquifer. We combine physicochemical and human activity data to evaluate impact of sea level rise on salt intrusion to siliclastic (Indian River Lagoon, Fl, USA) and karst (Puerto Morelos, Yucatan, Mexico) systems under different sea level rise rate scenarios. Two hydrodynamic modeling scenarios are considered; flux controlled and head controlled. Under a flux controlled system hydraulic head gradients remain constant during sea level rise while under a head controlled system hydraulic graidents diminish, allowing saltwater intrusion. Our model contains three key terms; aquifer recharge, groundwater discharge and hydraulic conductivity. Groundwater discharge and hydraulic conductivity were calculated based on high frequency (karst system) and decadal (siliciclastic system) field measurements. Aquifer recharge is defined as precipitation less evapotranspiration and water demand was evaluated based on urban planning data that provided the regional water demand. Water demand includes agricultural area, toursim, traffic patterns, garbage collection and total population. Water demand was initially estimated using a partial leaset squares regression based on these variables. Our model indicates that water demand depends most on agricultural area, which has changed significantly over the last 30 years. In both systems, additional water demand creates a head controlled scenario, thus increaseing the protential fo salt intrusion with projected sea level rise.

  6. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  7. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  8. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    Directory of Open Access Journals (Sweden)

    José M. Alcalá

    2017-02-01

    Full Text Available The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs, which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM, is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  9. A Comprehensive evaluation of groundwater vulnerability to saltwater up-coning and sea water intrusion in a coastal aquifer (case study: Ghaemshahr-juybar aquifer)

    Science.gov (United States)

    Motevalli, Alireza; Moradi, Hamid Reza; Javadi, Saman

    2018-02-01

    Aquifer salinization has recently increased significantly due to human activity and has caused irreparable environmental and economic effects. In this research, a new method is proposed for modeling the vulnerability to salinity for the Ghaemshahr-juybar aquifer. Specifically, the GALDIT (Sea water intrusion) and TAWLBIC (Saltwater up-coning) indices were combined to produce a map of vulnerability (Comprehensive Salinity Index or CSI) to seawater intrusion of a region near the coast and saltwater up-coning away from the coast, respectively. Single parameter and removal layer sensitivity analysis were performed in order to identify the sensitive parameters and achieve optimal weights (through the single-parameter method) of contributing factors in all three methods. The three optimized methods produced were GALDIT-Opt, TAWLBIC-Opt and CSI-Opt. To assess the accuracy of the original maps and optimal ones, the Pearson correlation was used. Results indicated that the Pearson correlation of the optimized GALDIT, TAWLBIC and CSI model was better than GALDIT, TAWLBIC and CSI. The results show that the increase in correlation between EC (Electrical Conductivity), TDS (Total Dissolved Solids) and SAR (Sodium Adsorption Ratio) from the GALDIT model to the CSI-Opt model from values of 0.64, 0.56 and 0.68 has improved to values of 0.81, 0.88 and 0.91, respectively. The highest concentration of EC, with a value of 7050 μs/cm, is sampled in the areas of the east and northwest of the Ghaemshahr-juybar aquifer, which are classified in the CSI-Opt model as high and very high vulnerability levels. The highest concentration of TDS and SAR has been found in the east, northwest and northeast of the Ghaemshahr-juybar aquifer with a value of 4724 ppm for TDS and 14 mg/l for SAR that have been modeled in the CSI-Opt index as highly vulnerable areas. Eventually, CSI mapping can be used as an efficient tool in prioritizing in terms of the vulnerability to aquifer salinity, carrying out

  10. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. The use of data-mining techniques for developing effective decisionsupport systems: A case study of simulating the effects ofclimate change on coastal salinity intrusion

    Science.gov (United States)

    Conrads, Paul; Edwin Roehl, Jr.

    2017-01-01

    Natural-resource managers and stakeholders face difficult challenges when managing interactions between natural and societal systems. Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. The availability of freshwater in coastal streams can be threatened by saltwater intrusion. Even though the collective interests and computer skills of the community of managers, scientists and other stakeholders are quite varied, there is an overarching need for equal access by all to the scientific knowledge needed to make the best possible decisions. This paper describes a decision support system, PRISM-2, developed to evaluate salinity intrusion due to potential climate change along the South Carolina coast in southeastern USA. The decision support system is disseminated as a spreadsheet application and integrates the output of global circulation models, watershed models and salinity intrusion models with real-time databases for simulation, graphical user interfaces, and streaming displays of results. The results from PRISM-2 showed that a 31-cm and 62-cm increase in sea level reduced the daily availability of freshwater supply to a coastal municipal intake by 4% and 12% of the time, respectively. Future climate change projections by a global circulation model showed a seasonal change in salinity intrusion events from the summer to the fall for the majority of events.

  12. Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2015-01-01

    Full Text Available According to the problems of current distributed architecture intrusion detection systems (DIDS, a new online distributed intrusion detection model based on cellular neural network (CNN was proposed, in which discrete-time CNN (DTCNN was used as weak classifier in each local node and state-controlled CNN (SCCNN was used as global detection method, respectively. We further proposed a new method for design template parameters of SCCNN via solving Linear Matrix Inequality. Experimental results based on KDD CUP 99 dataset show its feasibility and effectiveness. Emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation which allows the distributed intrusion detection to be performed better.

  13. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  14. Coupling of hydrogeological models with hydrogeophysical data to characterize seawater intrusion and shallow geothermal systems

    Science.gov (United States)

    Beaujean, J.; Kemna, A.; Engesgaard, P. K.; Hermans, T.; Vandenbohede, A.; Nguyen, F.

    2013-12-01

    While coastal aquifers are being stressed due to climate changes and excessive groundwater withdrawals require characterizing efficiently seawater intrusion (SWI) dynamics, production of geothermal energy is increasingly being used to hinder global warming. To study these issues, we need both robust measuring technologies and reliable predictions based on numerical models. SWI models are currently calibrated using borehole observations. Similarly, geothermal models depend mainly on the temperature field at few locations. Electrical resistivity tomography (ERT) can be used to improve these models given its high sensitivity to TDS and temperature and its relatively high lateral resolution. Inherent geophysical limitations, such as the resolution loss, can affect the overall quality of the ERT images and also prevent the correct recovery of the desired hydrochemical property. We present an uncoupled and coupled hydrogeophysical inversion to calibrate SWI and thermohydrogeologic models using ERT. In the SWI models, we demonstrate with two synthetic benchmarks (homogeneous and heterogeneous coastal aquifers) the ability of cumulative sensitivity-filtered ERT images using surface-only data to recover the hydraulic conductivity. Filtering of ERT-derived data at depth, where resolution is poorer, and the model errors make the dispersivity more difficult to estimate. In the coupled approach, we showed that parameter estimation is significantly improved because regularization bias is replaced by forward modeling only. Our efforts are currently focusing on applying the uncoupled/coupled approaches on a real life case study using field data from the site of Almeria, SE Spain. In the thermohydrogeologic models, the most sensitive hydrologic parameters responsible for heat transport are estimated from surface ERT-derived temperatures and ERT resistance data. A real life geothermal experiment that took place on the Campus De Sterre of Ghent University, Belgium and a synthetic

  15. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  16. Monitoring and Assessment of Saltwater Intrusion using Geographic Information Systems (GIS), Remote Sensing and Geophysical measurements of Guimaras Island, Philippines

    Science.gov (United States)

    Hernandez, B. C. B.

    2015-12-01

    Degrading groundwater quality due to saltwater intrusion is one of the key challenges affecting many island aquifers. These islands hold limited capacity for groundwater storage and highly dependent on recharge due to precipitation. But its ease of use, natural storage and accessibility make it more vulnerable to exploitation and more susceptible to encroachment from its surrounding oceanic waters. Estimating the extent of saltwater intrusion and the state of groundwater resources are important in predicting and managing water supply options for the community. In Guimaras island, central Philippines, increasing settlements, agriculture and tourism are causing stresses on its groundwater resource. Indications of saltwater intrusion have already been found at various coastal areas in the island. A Geographic Information Systems (GIS)-based approach using the GALDIT index was carried out. This includes six parameters assessing the seawater intrusion vulnerability of each hydrogeologic setting: Groundwater occurrence, Aquifer hydraulic conductivity, Groundwater Level above sea, Distance to shore, Impact of existing intrusion and Thickness of Aquifer. To further determine the extent of intrusion, Landsat images of various thematic layers were stacked and processed for unsupervised classification and electrical resistivity tomography using a 28-electrode system with array lengths of 150 and 300 meters was conducted. The GIS index showed where the vulnerable areas are located, while the geophysical measurements and images revealed extent of seawater encroachment along the monitoring wells. These results are further confirmed by the measurements collected from the monitoring wells. This study presents baseline information on the state of groundwater resources and increase understanding of saltwater intrusion dynamics in island ecosystems by providing a guideline for better water resource management in the Philippines.

  17. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  18. On the Salt Water Intrusion into the Durusu Lake, Istanbul: A Joint Central Loop TEM And Multi-Electrode ERT Field Survey

    Science.gov (United States)

    Ardali, Ayça Sultan; Tezkan, Bülent; Gürer, Aysan

    2018-02-01

    Durusu Lake is the biggest and most important freshwater source supplying drinking water to the European side of Istanbul. In this study, electrical resistivity tomography (ERT) and transient electromagnetic (TEM) measurements were applied to detect a possible salt water intrusion into the lake and to delineate the subsurface structure in the north of Durusu Lake. The ERT and TEM measurements were carried out along six parallel profiles extending from the sea coast to the lake shore on the dune barrier. TEM data were interpreted using different 1-D inversion methods such as Occam, Marquardt, and laterally constrained inversion (LCI). ERT data were interpreted using 2-D inversion techniques. The inversion results of ERT and TEM data were shown as resistivity depth sections including topography. The sand layer spreading over the basin has a resistivity of 150-400 Ωm with a thickness of 5-10 m. The sandy layer with clay, silt, and gravel has a resistivity of 15-100 Ωm and a thickness of 10-40 m followed by a clay layer of a resistivity below 10 Ωm. When the inversion of these data is interpreted along with the hydrogeology of the area, it is concluded that the salt water intrusion along the dune barrier is not common and occurs at a particular area where the distance between lake and sea is very close. Using information from boreholes around the lake, it was verified that the common conductive region at depths of 30 m or more consists of clay layers and clay lenses.

  19. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    Science.gov (United States)

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  20. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  1. Volcanic source inversion using a genetic algorithm and an elastic-gravitational layered earth model for magmatic intrusions

    Science.gov (United States)

    Tiampo, K. F.; Fernández, J.; Jentzsch, G.; Charco, M.; Rundle, J. B.

    2004-11-01

    Here we present an inversion methodology using the combination of a genetic algorithm (GA) inversion program, and an elastic-gravitational earth model to determine the parameters of a volcanic intrusion. Results from the integration of the elastic-gravitational model, a suite of FORTRAN 77 programs developed to compute the displacements due to volcanic loading, with the GA inversion code, written in the C programming language, are presented. These codes allow for the calculation of displacements (horizontal and vertical), tilt, vertical strain and potential and gravity changes on the surface of an elastic-gravitational layered Earth model due to the magmatic intrusion. We detail the appropriate methodology for examining the sensitivity of the model to variation in the constituent parameters using the GA, and present, for the first time, a Monte Carlo technique for evaluating the propagation of error through the GA inversion process. One application example is given at Mayon volcano, Philippines, for the inversion program, the sensitivity analysis, and the error evaluation. The integration of the GA with the complex elastic-gravitational model is a blueprint for an efficient nonlinear inversion methodology and its implementation into an effective tool for the evaluation of parameter sensitivity. Finally, the extension of this inversion algorithm and the error assessment methodology has important implications to the modeling and data assimilation of a number of other nonlinear applications in the field of geosciences.

  2. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  3. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  4. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  5. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  6. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    Science.gov (United States)

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  7. Stratigraphic controls on saltwater intrusion in the Dominguez Gap area of coastal Los Angeles

    Science.gov (United States)

    Edwards, B.D.; Ehman, K.D.; Ponti, D.J.; Reichard, E.G.; Tinsley, J.C.; Rosenbauer, R.J.; Land, M.

    2009-01-01

    The Los Angeles Basin is a densely populated coastal area that significantly depends on groundwater. A part of this groundwater supply is at risk from saltwater intrusion-the impetus for this study. High-resolution seismic-reflection data collected from the Los Angeles-Long Beach Harbor Complex have been combined with borehole geophysical and descriptive geological data from four nearby ??400-m-deep continuously cored wells and with borehole geophysical data from adjacent water and oil wells to characterize the Pliocene to Holocene stratigraphy of the Dominguez Gap coastal aquifer system. The new data are shown as a north-south, two- dimensional, sequence-stratigraphic model that is compared to existing lithostratigraphic models of the Los Angeles Basin in an attempt to better understand pathways of saltwater intrusion into coastal aquifers. Intrusion of saltwater into the coastal aquifer system generally is attributed to over-pumping that caused the hydraulic gradient to reverse during the mid-1920s. Local water managers have used the existing lithostratigraphic model to site closely spaced injection wells of freshwater (barrier projects) attempting to hydraulically control the saltwater intrusion. Improved understanding of the stratigraphic relationships can guide modifications to barrier design that will allow more efficient operation. Allostratigraphic nomenclature is used to define a new sequence-stratigraphic model for the area because the existing lithostratigraphic correlations that have been used to define aquifer systems are shown not to be time-correlative. The youngest sequence, the Holocene Dominguez sequence, contains the Gaspur aquifer at its base. The Gaspur aquifer is intruded with saltwater and consists of essentially flat-lying gravelly sands deposited by the ancestral Los Angeles River as broad channels that occupied a paleovalley incised into the coastal plain during the last glacio-eustatic highstand. The underlying sequences are deformed into

  8. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  9. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  10. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  11. assessment of Seawater Intrusion in Concrete by Measuring Chlorine Concentration

    International Nuclear Information System (INIS)

    Abdel-Monem, A.M.; Kansouh, W.A.; Osman, A.M.; Bashter, I.I.

    2011-01-01

    The object of this work is to measure water intrusion in concrete using a new methodology based on neutron activation technique. The applied method depends on measuring the activated gamma energy lines emitted from 38 Cl using a gamma spectrometer with Ge(Li) and HPGe detectors. Concrete samples with different percentages of silica fume (SF), up to 20 % submerged in seawater for different period of time were used to perform the investigation. Samples of concrete taken from different positions along the direction of water intrusion in concrete block were irradiated by thermal neutrons using the irradiation cell of 252 Cf neutron source and one of the vertical channels of search reactor at Delft University. The measured 38 Cl concentrations of the irradiated samples were used to plot groups of water profiles distribution in concrete samples with different SF % and submerged in seawater for different periods. These profiles were compared with the others which use here measured by neutron back emitted method where a satisfactory agreement was observed between the two. Further, the displayed measured results; show that the diffusivity for all water contents decreases with increasing the silica fume percentage up to 15 %. However, for concrete samples with silica fume 20 % the observed phenomenon is reversed due to the deterioration of concrete physical and mechanical properties

  12. VOC SAMPLING IN THE WATER TABLE/CAPILLARY FRINGE AREA FOR ASSESSING IMPACT ON VAPOR INTRUSION AND INDOOR AIR QUALITY

    Science.gov (United States)

    Vapor intrusion has been determined to be a major pathway for increased indoor air contamination from volatile organic contaminants (VOCs) at certain contaminated sites. In order to properly assess vapor intrusion, it is important to adequately evaluate VOC concentrations in the...

  13. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  14. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  15. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  16. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  17. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    Science.gov (United States)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  18. The National Danish Water Resources Model - using an integrated groundwater - surface water model for decision support and WFD implementation in a changing climate

    Science.gov (United States)

    Lajer Hojberg, Anker; Hinsby, Klaus; Jørgen Henriksen, Hans; Troldborg, Lars

    2014-05-01

    Integrated and sustainable water resources management and development of river basin management plans according to the Water Framework Directive is getting increasingly complex especially when taking projected climate change into account. Furthermore, uncertainty in future developments and incomplete knowledge of the physical system introduces a high degree of uncertainty in the decision making process. Knowledge based decision making is therefore vital for formulation of robust management plans and to allow assessment of the inherent uncertainties. The Department of Hydrology at the Geological Survey of Denmark and Greenland started in 1996 to develop a mechanistically, transient and spatially distributed groundwater-surface water model - the DK-model - for the assessment of groundwater quantitative status accounting for interactions with surface water and anthropogenic changes, such as extraction strategies and land use, as well as climate change. The model has been subject to continuous update building on hydrogeological knowledge established by the regional water authorities and other national research institutes. With the on-going improvement of the DK-model it is now increasingly applied both by research projects and for decision support e.g. in implementation of the Water Framework Directive or to support other decisions related to protection of water resources (quantitative and chemical status), ecosystems and the built environment. At present, the DK-model constitutes the backbone of a strategic modelling project funded by the Danish Environmental Protection Agency, with the aim of developing a modelling complex that will provide the foundation of the implementation of the Water Framework Directive. Since 2003 the DK-model has been used in more than 25 scientific papers and even more public reports. In the poster and the related review paper we describe the most important applications in both science and policy, where the DK-model has been used either

  19. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  20. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    Science.gov (United States)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  1. Consequences of CO2-rich water intrusion into the Critical Zone

    Science.gov (United States)

    Gal, Frédérick; Lions, Julie

    2017-04-01

    From a geochemical point of view, the sensitivity of the Critical Zone to hazards is not only linked to its proximity to the surface. It may also be linked to - albeit less common - intrusion of upward migrating fluids. One of the hazard scenarios to observe these pathways in surface environments is the occurrence of CO2-rich fluid leakage from deeper horizons and especially leakage from reservoir in the case of underground storage such as Carbon Storage applications. Much effort is done to prevent this risk but it necessary to consider the mitigation of this leak to insure safe storage. Numerous active or planned CO2 storage sites belong to large sedimentary basins. In that perspective, a CO2 injection has been performed in a multi-layered - carbonated aquifer (Beauce aquifer) from the Paris basin as this basin has been considered for such applications. The aquifer mineralogy of the targeted site is dominated by calcite (95 to 98%) with traces of quartz and clay minerals. Around 10,000 liters of CO2 were injected at 50 m depth during a series of gaseous pulsed injections for 5 days. After 3 days of incubation in the aquifer, the groundwater was pumped during 5 days allowing the recovery of 140 m3 of backward water. Physico-chemical parameters, major and trace elements concentrations and dissolved CO2 concentrations were monitored to evaluate water-rock interactions occurring within the aquifer and impacts onto water quality. Main changes that were observed during the CO2 release are in good agreement with results from previous experiments performed worldwide. A strong decrease of the pH value (2 units), a rise of the electrical conductivity (2 fold) and changes in the redox conditions (from oxidising to less oxidising) are monitored few hours after the initiation of the pumping. The dissolution of CO2 induces a drop of pH that favours water-rock interaction processes. The kinetic of reactions appears to be dominated by the dissolution of carbonate, mainly calcite

  2. The Innovative Structure Solution for Preventing Salt Intrusion and Retaining Freshwater In Mekong Delta VietNam

    NARCIS (Netherlands)

    Hong, S.T.; Vrijling, J.K.; Stive, M.J.F.

    2013-01-01

    In the Mekong Delta Vietnam, the construction of sluices with the purpose of retaining fresh water and preventing salt water intrusion potentially plays a very important role. However, the structures constructed in small rivers according to local or traditional technology revealed many disadvantages

  3. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    Science.gov (United States)

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  4. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  5. Deep Seawater Intrusion Enhanced by Geothermal Through Deep Faults in Xinzhou Geothermal Field in Guangdong, China

    Science.gov (United States)

    Lu, G.; Ou, H.; Hu, B. X.; Wang, X.

    2017-12-01

    This study investigates abnormal sea water intrusion from deep depth, riding an inland-ward deep groundwater flow, which is enhanced by deep faults and geothermal processes. The study site Xinzhou geothermal field is 20 km from the coast line. It is in southern China's Guangdong coast, a part of China's long coastal geothermal belt. The geothermal water is salty, having fueled an speculation that it was ancient sea water retained. However, the perpetual "pumping" of the self-flowing outflow of geothermal waters might alter the deep underground flow to favor large-scale or long distant sea water intrusion. We studied geochemical characteristics of the geothermal water and found it as a mixture of the sea water with rain water or pore water, with no indication of dilution involved. And we conducted numerical studies of the buoyancy-driven geothermal flow in the deep ground and find that deep down in thousand meters there is favorable hydraulic gradient favoring inland-ward groundwater flow, allowing seawater intrude inland for an unusually long tens of kilometers in a granitic groundwater flow system. This work formed the first in understanding geo-environment for deep ground water flow.

  6. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    Science.gov (United States)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  7. Assessing the pollution risk of a groundwater source field at western Laizhou Bay under seawater intrusion

    International Nuclear Information System (INIS)

    Zeng, Xiankui; Wu, Jichun; Wang, Dong; Zhu, Xiaobin

    2016-01-01

    Coastal areas have great significance for human living, economy and society development in the world. With the rapid increase of pressures from human activities and climate change, the safety of groundwater resource is under the threat of seawater intrusion in coastal areas. The area of Laizhou Bay is one of the most serious seawater intruded areas in China, since seawater intrusion phenomenon was firstly recognized in the middle of 1970s. This study assessed the pollution risk of a groundwater source filed of western Laizhou Bay area by inferring the probability distribution of groundwater Cl − concentration. The numerical model of seawater intrusion process is built by using SEAWAT4. The parameter uncertainty of this model is evaluated by Markov Chain Monte Carlo (MCMC) simulation, and DREAM (ZS) is used as sampling algorithm. Then, the predictive distribution of Cl - concentration at groundwater source field is inferred by using the samples of model parameters obtained from MCMC. After that, the pollution risk of groundwater source filed is assessed by the predictive quantiles of Cl - concentration. The results of model calibration and verification demonstrate that the DREAM (ZS) based MCMC is efficient and reliable to estimate model parameters under current observation. Under the condition of 95% confidence level, the groundwater source point will not be polluted by seawater intrusion in future five years (2015–2019). In addition, the 2.5% and 97.5% predictive quantiles show that the Cl − concentration of groundwater source field always vary between 175 mg/l and 200 mg/l. - Highlights: • The parameter uncertainty of seawater intrusion model is evaluated by MCMC. • Groundwater source field won’t be polluted by seawater intrusion in future 5 years. • The pollution risk is assessed by the predictive quantiles of Cl − concentration

  8. Assessing the pollution risk of a groundwater source field at western Laizhou Bay under seawater intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Zeng, Xiankui; Wu, Jichun; Wang, Dong, E-mail: wangdong@nju.edu.cn; Zhu, Xiaobin

    2016-07-15

    Coastal areas have great significance for human living, economy and society development in the world. With the rapid increase of pressures from human activities and climate change, the safety of groundwater resource is under the threat of seawater intrusion in coastal areas. The area of Laizhou Bay is one of the most serious seawater intruded areas in China, since seawater intrusion phenomenon was firstly recognized in the middle of 1970s. This study assessed the pollution risk of a groundwater source filed of western Laizhou Bay area by inferring the probability distribution of groundwater Cl{sup −} concentration. The numerical model of seawater intrusion process is built by using SEAWAT4. The parameter uncertainty of this model is evaluated by Markov Chain Monte Carlo (MCMC) simulation, and DREAM{sub (ZS)} is used as sampling algorithm. Then, the predictive distribution of Cl{sup -} concentration at groundwater source field is inferred by using the samples of model parameters obtained from MCMC. After that, the pollution risk of groundwater source filed is assessed by the predictive quantiles of Cl{sup -} concentration. The results of model calibration and verification demonstrate that the DREAM{sub (ZS)} based MCMC is efficient and reliable to estimate model parameters under current observation. Under the condition of 95% confidence level, the groundwater source point will not be polluted by seawater intrusion in future five years (2015–2019). In addition, the 2.5% and 97.5% predictive quantiles show that the Cl{sup −} concentration of groundwater source field always vary between 175 mg/l and 200 mg/l. - Highlights: • The parameter uncertainty of seawater intrusion model is evaluated by MCMC. • Groundwater source field won’t be polluted by seawater intrusion in future 5 years. • The pollution risk is assessed by the predictive quantiles of Cl{sup −} concentration.

  9. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  10. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  11. Orthodontic intrusion of maxillary incisors: a 3D finite element method study

    Directory of Open Access Journals (Sweden)

    Armando Yukio Saga

    2016-02-01

    Full Text Available Objective: In orthodontic treatment, intrusion movement of maxillary incisors is often necessary. Therefore, the objective of this investigation is to evaluate the initial distribution patterns and magnitude of compressive stress in the periodontal ligament (PDL in a simulation of orthodontic intrusion of maxillary incisors, considering the points of force application. Methods: Anatomic 3D models reconstructed from cone-beam computed tomography scans were used to simulate maxillary incisors intrusion loading. The points of force application selected were: centered between central incisors brackets (LOAD 1; bilaterally between the brackets of central and lateral incisors (LOAD 2; bilaterally distal to the brackets of lateral incisors (LOAD 3; bilaterally 7 mm distal to the center of brackets of lateral incisors (LOAD 4. Results and Conclusions: Stress concentrated at the PDL apex region, irrespective of the point of orthodontic force application. The four load models showed distinct contour plots and compressive stress values over the midsagittal reference line. The contour plots of central and lateral incisors were not similar in the same load model. LOAD 3 resulted in more balanced compressive stress distribution.

  12. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    Basant Subba

    2016-06-01

    Full Text Available Present Intrusion Detection Systems (IDSs for MANETs require continuous monitoring which leads to rapid depletion of a node's battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS. The cluster leader election process uses the Vickrey–Clarke–Groves mechanism to elect the cluster leader which provides the intrusion detection service. The hybrid IDS comprises a threshold based lightweight module and a powerful anomaly based heavyweight module. Initially, only the lightweight module is activated. The decision to activate the heavyweight module is taken by modeling the intrusion detection process as an incomplete information non-cooperative game between the elected leader node and the potential malicious node. Simulation results show that the proposed scheme significantly reduces the IDS traffic and overall power consumption in addition to maintaining a high detection rate and accuracy.

  13. Seawater intrusion barrier and artificial recharge in the deltaic Llobregat aquifer (Barcelona, Spain); La barrera hidraulica contra la intrusion marina y la recarga artificial en el acuifero del Llobregat (Barcelona, Espana)

    Energy Technology Data Exchange (ETDEWEB)

    Ortuno Gobern, F.; Ninerola Pla, J. M.; Armenter Ferrando, J. L.; Molinero Huguet, J.

    2009-07-01

    The main aquifer of the Llobregat Delta (Barcelona, Spain) is affected by seawater intrusion processes since 1970. The Catalan Water Agency is currently promoting several actions of enhanced aquifer recharge, including the construction of a positive hydraulic barrier in order to stop the advance of the seawater intrusion. Such a positive hydraulic barrier works by injecting reclaimed water in 14 wells. This is the first time that a project of this type is performed in Spain, and it is also pioneer in Europe. The positive hydraulic barrier produces the rise of the groundwater head near the coast and avoids seawater penetration inland. The injected reclaimed water comes from the WWTP of the Baix Llobregat after passing through several treatments (ultrafiltration, osmosis and disinfection). The pilot phase of the project has been working during the last 2 years, showing highly positive results. Substantial improvement of the groundwater quality has been observed in wells surrounding the injection points and no clogging has been appeared. The second phase of the project is currently under construction. (Author) 13 refs.

  14. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  15. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  16. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  17. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  18. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    Science.gov (United States)

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  19. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida

    Science.gov (United States)

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett

    2016-08-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  20. The Electrical Self-Potential Method as a Non-Intrusive Snow-Hydrological Sensor

    Science.gov (United States)

    Kulessa, B.; Thompson, S. S.; Luethi, M. P.; Essery, R.

    2015-12-01

    Building on growing momentum in the application of geophysical techniques to snow problems and, specifically, on new theory and an electrical geophysical snow hydrological model published recently; we demonstrate for the first time that the electrical self-potential geophysical technique can sense in-situ bulk meltwater fluxes. This has broad and immediate implications for snow measurement practice, modelling and operational snow forecasting. Our ability to measure, quantify and assimilate hydrological properties and processes of snow in operational models is disproportionally poor compared to the significance of seasonal snowmelt as a global water resource and major risk factor in flood and avalanche forecasting. Encouraged by recent theoretical, modelling and laboratory work, we show here that the diurnal evolution of aerially-distributed self-potential magnitudes closely track those of bulk meltwater fluxes in melting in-situ snowpacks at Rhone and Jungfraujoch glaciers, Switzerland. Numerical modelling infers temporally-evolving liquid water contents in the snowpacks on successive days in close agreement with snow-pit measurements. Muting previous concerns, the governing physical and chemical properties of snow and meltwater became temporally invariant for modelling purposes. Because measurement procedure is straightforward and readily automated for continuous monitoring over significant spatial scales, we conclude that the self-potential geophysical method is a highly-promising non-intrusive snow-hydrological sensor for measurement practice, modelling and operational snow forecasting.

  1. A deposit model for carbonatite and peralkaline intrusion-related rare earth element deposits: Chapter J in Mineral deposit models for resource assessment

    Science.gov (United States)

    Verplanck, Philip L.; Van Gosen, Bradley S.; Seal, Robert R.; McCafferty, Anne E.

    2014-01-01

    Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. A wide variety of other commodities have been exploited from carbonatites and alkaline igneous rocks including niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other elements enriched in these deposits include manganese, strontium, tantalum, thorium, vanadium, and uranium. Carbonatite and peralkaline intrusion-related rare earth element deposits are presented together in this report because of the spatial, and potentially genetic, association between carbonatite and alkaline rocks. Although these rock types occur together at many locations, carbonatite and peralkaline intrusion-related rare earth element deposits are not generally found together.

  2. Effect of water impurities on stress corrosion cracking in a boiling water reactor

    International Nuclear Information System (INIS)

    Ljungbery, L.G.; Cubicciotti, D

    1985-01-01

    A series of stress corrosion tests, including corrosion potential and water chemistry measurements, has been performed in the Swedish Ringhals-1 boiling water reactor. Tests have been run under reactor start-up and reactor power operation with normal reactor water conditions and with alternate water chemistry in which hydrogen is added to the feedwater to suppress stress corrosion cracking. During one alternate water chemistry test, there was significant intergranular corrosion cracking of sensitized stainless specimens. It is shown that nitrate and sulfate, arising from an accidental resin intrusion, are likely causes. Nitrate increases the oxidizing power of the water, and sulfate enhances cracking under oxidizing conditions. During another test under start-up conditions, enhanced transgranular stress corrosion cracking in low alloy steels and possibly initiation of cracking in a nickel base alloy was observed as a result of resin intrusion into the reactor water. The intrusion produced acid and sulfate, which are believed to enhance hydrogen cracking conditions

  3. Predicting salt intrusion into freshwater aquifers resulting from CO2 injection – A study on the influence of conservative assumptions

    DEFF Research Database (Denmark)

    Walter, Lena; Binning, Philip John; Class, Holger

    2013-01-01

    . A crucial task is to choose an appropriate conceptual model and relevant scenarios. Overly conservative assumptions may lead to estimation of unacceptably high risks, and thus prevent the implementation of a CO2 storage project unnecessarily. On the other hand, risk assessment should not lead...... to an underestimation of hazards. This study compares two conceptual model approaches for the numerical simulation of brine-migration scenarios through a vertical fault and salt intrusion into a fresh water aquifer. The first approach calculates salt discharge into freshwater using an immiscible two-phase model...... with constant salinity in the brine phase. The second approach takes compositional effects into account and considers salinity as a variable parameter in the water phase. A spatial model coupling is introduced to adapt the increased model complexity to the required complexity of the physics. The immiscible two...

  4. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  5. Effects of climate change on saltwater intrusion at Hilton Head Island, SC. U.S.A.

    Science.gov (United States)

    Payne, Dorothy F.

    2010-01-01

    Sea‐level rise and changes in precipitation patterns may contribute to the occurrence and affect the rate of saltwater contamination in the Hilton Head Island, South Carolina area. To address the effects of climate change on saltwater intrusion, a threedimensional, finite‐element, variable‐density, solute‐transport model was developed to simulate different rates of sea‐level rise and variation in onshore freshwater recharge. Model simulation showed that the greatest effect on the existing saltwater plume occurred from reducing recharge, suggesting recharge may be a more important consideration in saltwater intrusion management than estimated rates of sea‐level rise. Saltwater intrusion management would benefit from improved constraints on recharge rates by using model‐independent, local precipitation and evapotranspiration data, and improving estimates of confining unit hydraulic properties.

  6. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  7. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    International Nuclear Information System (INIS)

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is credible as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required

  8. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  9. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  10. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  11. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  12. Non-intrusive reduced order modeling of nonlinear problems using neural networks

    Science.gov (United States)

    Hesthaven, J. S.; Ubbiali, S.

    2018-06-01

    We develop a non-intrusive reduced basis (RB) method for parametrized steady-state partial differential equations (PDEs). The method extracts a reduced basis from a collection of high-fidelity solutions via a proper orthogonal decomposition (POD) and employs artificial neural networks (ANNs), particularly multi-layer perceptrons (MLPs), to accurately approximate the coefficients of the reduced model. The search for the optimal number of neurons and the minimum amount of training samples to avoid overfitting is carried out in the offline phase through an automatic routine, relying upon a joint use of the Latin hypercube sampling (LHS) and the Levenberg-Marquardt (LM) training algorithm. This guarantees a complete offline-online decoupling, leading to an efficient RB method - referred to as POD-NN - suitable also for general nonlinear problems with a non-affine parametric dependence. Numerical studies are presented for the nonlinear Poisson equation and for driven cavity viscous flows, modeled through the steady incompressible Navier-Stokes equations. Both physical and geometrical parametrizations are considered. Several results confirm the accuracy of the POD-NN method and show the substantial speed-up enabled at the online stage as compared to a traditional RB strategy.

  13. Using state-of-the-art technology to evaluate saltwater intrusion in the Biscayne aquifer of Miami-Dade County, Florida

    Science.gov (United States)

    Prinos, Scott T.

    2014-01-01

    The fresh groundwater supplies of many communities have been adversely affected or limited by saltwater intrusion. An insufficient understanding of the origin of intruded saltwater may lead to inefficient or ineffective water-resource management. A 2008–2012 cooperative U.S. Geological Survey (USGS) and Miami-Dade County study of saltwater intrusion describes state-of-the art technology used to evaluate the origin and distribution of this saltwater.

  14. The relationship between loss of parents in the holocaust, intrusive memories, and distress among child survivors.

    Science.gov (United States)

    Letzter-Pouw, Sonia; Werner, Perla

    2012-04-01

    The prevalence of intrusive memories of the Holocaust and their relationship to distress was examined among 272 child survivors in Israel. Using attachment theory as a conceptual framework, the authors also examined the effects of type of experience and loss of parents in the Holocaust, psychological resources, other life events, and sociodemographic characteristics on distress and symptomatic behavior. Eighty five percent of the participants reported suffering from intrusive memories. Structural equation modeling showed that survivors who lost one or both parents in the Holocaust suffered more distress because of more intrusive memories. These findings suggest that intrusive memories may be part of unfinished mourning processes related to the loss of parents in the Holocaust. © 2012 American Orthopsychiatric Association.

  15. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  16. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  17. Mandibular canine intrusion with the segmented arch technique: A finite element method study.

    Science.gov (United States)

    Caballero, Giselle Milagros; Carvalho Filho, Osvaldo Abadia de; Hargreaves, Bernardo Oliveira; Brito, Hélio Henrique de Araújo; Magalhães Júnior, Pedro Américo Almeida; Oliveira, Dauro Douglas

    2015-06-01

    Mandibular canines are anatomically extruded in approximately half of the patients with a deepbite. Although simultaneous orthodontic intrusion of the 6 mandibular anterior teeth is not recommended, a few studies have evaluated individual canine intrusion. Our objectives were to use the finite element method to simulate the segmented intrusion of mandibular canines with a cantilever and to evaluate the effects of different compensatory buccolingual activations. A finite element study of the right quadrant of the mandibular dental arch together with periodontal structures was modeled using SolidWorks software (Dassault Systèmes Americas, Waltham, Mass). After all bony, dental, and periodontal ligament structures from the second molar to the canine were graphically represented, brackets and molar tubes were modeled. Subsequently, a 0.021 × 0.025-in base wire was modeled with stainless steel properties and inserted into the brackets and tubes of the 4 posterior teeth to simulate an anchorage unit. Finally, a 0.017 × 0.025-in cantilever was modeled with titanium-molybdenum alloy properties and inserted into the first molar auxiliary tube. Discretization and boundary conditions of all anatomic structures tested were determined with HyperMesh software (Altair Engineering, Milwaukee, Wis), and compensatory toe-ins of 0°, 4°, 6°, and 8° were simulated with Abaqus software (Dassault Systèmes Americas). The 6° toe-in produced pure intrusion of the canine. The highest amounts of periodontal ligament stress in the anchor segment were observed around the first molar roots. This tooth showed a slight tendency for extrusion and distal crown tipping. Moreover, the different compensatory toe-ins tested did not significantly affect the other posterior teeth. The segmented mechanics simulated in this study may achieve pure mandibular canine intrusion when an adequate amount of compensatory toe-in (6°) is incorporated into the cantilever to prevent buccal and lingual crown

  18. Mental Imagery and Posttraumatic Stress Disorder: a neuroimaging and experimental psychopathology approach to intrusive memories of trauma

    Directory of Open Access Journals (Sweden)

    Ian A Clark

    2015-07-01

    Full Text Available This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of Posttraumatic Stress Disorder. However, key questions, including those involving aetiology remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma memory, involuntary recall, negative emotions, attention hijacking and mental imagery. Each component part is considered in turn, both behaviourally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them.

  19. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  20. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  1. Effect of intrusive and retraction forces in labial and lingual orthodontics: A finite element study

    Directory of Open Access Journals (Sweden)

    Rohan Mascarenhas

    2014-01-01

    Full Text Available Objectives: Lingual orthodontics differs in biomechanics as compared to labial system and has biomechanical advantages. Although theoretical approaches have explained the differences between labial and lingual orthodontics, the finite element method (FEM may be better suited to analyze these differences. This study analyzes the effect of vertical and horizontal forces together on the tooth using FEM. Materials and Methods: An extracted right maxillary central incisor was radiographed and was used to create a solid model using ANSYS. The geometric model was converted into a finite element model with the help of ANSYS software. The model consists of 27,000 elements and 30,000 nodes. Two force vectors (vertical and horizontal were applied labially and lingually at 3 different heights- 4 mm, 5 mm and 6 mm from the incisal edge. Results: In the labial system, the net force vector passes through the center of resistance (CR and brings about intrusion. The net force vector in lingual orthodontics does not pass through the center of resistance and produces lingual tipping of the incisors. Conclusion: Intrusion and retraction forces bring about tipping of incisors in lingual orthodontics. The same amount of intrusion and retraction forces brings about intrusion of incisors in labial orthodontics. Therefore, direction and amount of forces should be carefully and judiciously applied after taking into consideration the resultant biomechanical differences.

  2. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  3. Computational benefits using artificial intelligent methodologies for the solution of an environmental design problem: saltwater intrusion.

    Science.gov (United States)

    Papadopoulou, Maria P; Nikolos, Ioannis K; Karatzas, George P

    2010-01-01

    Artificial Neural Networks (ANNs) comprise a powerful tool to approximate the complicated behavior and response of physical systems allowing considerable reduction in computation time during time-consuming optimization runs. In this work, a Radial Basis Function Artificial Neural Network (RBFN) is combined with a Differential Evolution (DE) algorithm to solve a water resources management problem, using an optimization procedure. The objective of the optimization scheme is to cover the daily water demand on the coastal aquifer east of the city of Heraklion, Crete, without reducing the subsurface water quality due to seawater intrusion. The RBFN is utilized as an on-line surrogate model to approximate the behavior of the aquifer and to replace some of the costly evaluations of an accurate numerical simulation model which solves the subsurface water flow differential equations. The RBFN is used as a local approximation model in such a way as to maintain the robustness of the DE algorithm. The results of this procedure are compared to the corresponding results obtained by using the Simplex method and by using the DE procedure without the surrogate model. As it is demonstrated, the use of the surrogate model accelerates the convergence of the DE optimization procedure and additionally provides a better solution at the same number of exact evaluations, compared to the original DE algorithm.

  4. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  5. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  6. The potential for health risks from intrusion of contaminants into the distribution system from pressure transients.

    Science.gov (United States)

    LeChevallier, Mark W; Gullick, Richard W; Karim, Mohammad R; Friedman, Melinda; Funk, James E

    2003-03-01

    The potential for public health risks associated with intrusion of contaminants into water supply distribution systems resulting from transient low or negative pressures is assessed. It is shown that transient pressure events occur in distribution systems; that during these negative pressure events pipeline leaks provide a potential portal for entry of groundwater into treated drinking water; and that faecal indicators and culturable human viruses are present in the soil and water exterior to the distribution system. To date, all observed negative pressure events have been related to power outages or other pump shutdowns. Although there are insufficient data to indicate whether pressure transients are a substantial source of risk to water quality in the distribution system, mitigation techniques can be implemented, principally the maintenance of an effective disinfectant residual throughout the distribution system, leak control, redesign of air relief venting, and more rigorous application of existing engineering standards. Use of high-speed pressure data loggers and surge modelling may have some merit, but more research is needed.

  7. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion

    Directory of Open Access Journals (Sweden)

    Luca Vettorello

    2015-11-01

    Full Text Available A Feflow thermohaline model has been implemented in order to study borehole heat exchangers (BHEs activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region. The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes. The main purpose of numerical modeling was to forecast thermal plume extension in groundwater after a long period of heat exchange, calculating temperature trends in observation points during a 10 years transport simulation. The complex geological structure, including calcarenites, fractured limestones and a deep karst aquifer, has been translated into a multilayered model, with a depth-related parameter distribution, assigning different values of hydraulic, thermal and chemical properties to each layer. In particular saltwater concentration has been taken into account, considering the influence of seawater intrusion on the heat transport density-dependent model. Parameters assignment was based on experimental datasets collected during initial field investigations, including thermal characterization of soil samples and GRTs, together with historical hydrogeological and hydrochemical measures and previous groundwater surveys. After model structure configuration and aquifers parameterization, a sensitivity analysis on porosity and heat dispersivity has been conducted, to evaluate their influence on thermal transport phenomena with a multiple scenarios approach, considering in particular the uncertainty related to secondary porosity in karst systems. Feflow simulation represented the first step in environmental compatibility evaluation for the BHE plant, waiting for the necessary model calibration with groundwater temperature monitoring trends.

  8. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  9. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  10. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  11. Imaging Saltwater Intrusion Along the Coast of Monterey Bay Using Long-Offset Electrical Resistivity Tomography

    Science.gov (United States)

    Goebel, M.; Knight, R. J.; Pidlisecky, A.

    2016-12-01

    Coastal regions represent a complex dynamic interface where saltwater intrusion moves seawater landward and groundwater discharge moves freshwater seaward. These processes can have a dramatic impact on water quality, affecting both humans and coastal ecosystems. The ability to map the subsurface distribution of fresh and salt water is a critical step in predicting and managing water quality in coastal regions. This is commonly accomplished using wells, which are expensive and provide point information, which may fail to capture the spatial complexity in subsurface conditions. We present an alternate method for acquiring data, long-offset Electrical Resistivity Tomography (ERT), which is non-invasive, cost effective, and can address the problem of poor spatial sampling. This geophysical method can produce continuous profiles of subsurface electrical resistivity to a depth of 300 m, with spatial resolution on the order of tens of meters. Our research focuses on the Monterey Bay region, where sustained groundwater extraction over the past century has led to significant saltwater intrusion. ERT was acquired along 40 kilometers of the coast using the roll along method, allowing for continuous overlap in data acquisition. Electrodes were spaced every 22.2 m, with a total of 81 electrodes along the 1.8 km active cable length. The data show a complex distribution of fresh and salt water, influenced by geology, groundwater pumping, recharge, and land-use. While the inverted ERT resistivity profiles correspond well with existing data sets and geologic interpretations in the region, the spatial complexity revealed through the ERT data goes beyond what is known from traditional data sources alone. This leads us to conclude that this form of data can be extremely useful in informing and calibrating groundwater flow models, making targeted management decisions, and monitoring changes in subsurface salinities over time.

  12. Consequences of Groundwater Development on Water Resources of Hawai`i

    Science.gov (United States)

    Rotzoll, K.; Izuka, S. K.; El-Kadi, A. I.

    2017-12-01

    The availability of fresh groundwater for human use is limited by whether the impacts of withdrawals are deemed acceptable by community stakeholders and water-resource managers. Quantifying the island-wide hydrologic impacts of withdrawal—saltwater intrusion, water-table decline, and reduction of groundwater discharge to streams, nearshore environments and downgradient groundwater bodies—is thus a key step for assessing fresh groundwater availability in Hawai`i. Groundwater-flow models of the individual islands of Kaua`i, O`ahu, and Maui were constructed using MODFLOW 2005 with the Seawater-Intrusion Package (SWI2). Consistent model construction among the islands, calibration, and analysis were streamlined using Python scripts. Results of simulating historical withdrawals from Hawai`i's volcanic aquifers show that the types and magnitudes of impacts that can limit fresh groundwater availability vary among each islands' unique hydrogeologic settings. In high-permeability freshwater-lens aquifers, saltwater intrusion and reductions in coastal groundwater discharge are the principal consequences of withdrawals that can limit groundwater availability. In dike-impounded groundwater and thickly saturated low-permeability aquifers, reduced groundwater discharge to streams, water-table decline, or reduced flows to adjacent freshwater-lens aquifers can limit fresh groundwater availability. The numerical models are used to quantify and delineate the spatial distribution of these impacts for the three islands. The models were also used to examine how anticipated changes in groundwater recharge and withdrawals will affect fresh groundwater availability in the future.

  13. Trace element modelling of magma evolution in the Fongen-Hyllingen Intrusion, Trondheim region, Norway

    International Nuclear Information System (INIS)

    Mohamed A Abu El-Rus

    2003-01-01

    The trace element evolution of the Fongen-Hyllingen Intrusion has been studied on the basis of ICPMS analyses of 21 whole rocks and 12 plagioclase separates. Emphasis has been placed on Stage IV of the intrusion that crystallized essentially after magma addition had ceased. Whereas the compositions of minerals and rocks in Stage IV exhibit strong normal fractionation trends, crustal contamination is evident in a wide range of incompatible element ratios that should be relatively constant if simple fractional crystallization prevailed. Crustal contamination in Stage IV is confirmed by isotopic studies. The distribution of incompatible elements in Stage IV can be successfully explained by AFC modelling. Olivine compositions and isotopic ratios in the most primitive cumulates together with the slight LREE-enrichment in their coexisting melts suggest that the FHI parental magma was subjected to at least olivine fractionation during ascent to the magma chamber. This resulted in a decrease in the Mg-number of the melt without changing its isotopic ratio and incompatible trace element ratios. The slight enrichment in LREE and relatively low Zr/Y ratios in the melt coexisting with the most primitive cumulates imply that the FHI primary melt was derived from garnet-free mantle. The relative abundance of incompatible elements in the most primitive calculated melts, geochemically similar to low-Ti continental flood basalts, suggest that a subcontinental mantle source was most probable for the parental melt for FHI. (author)

  14. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    Science.gov (United States)

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  15. Intrusive images and voluntary memory for affective pictures: contextualization and dual-task interference.

    Science.gov (United States)

    Krans, Julie; Langner, Oliver; Reinecke, Andrea; Pearson, David G

    2013-12-01

    The present study addressed the role of context information and dual-task interference during the encoding of negative pictures on intrusion development and voluntary recall. Healthy participants were shown negative pictures with or without context information. Pictures were either viewed alone or concurrently with a visuospatial or verbal task. Participants reported their intrusive images of the pictures in a diary. At follow-up, perceptual and contextual memory was tested. Participants in the context group reported more intrusive images and perceptual voluntary memory than participants in the no context group. No effects of the concurrent tasks were found on intrusive image frequency, but perceptual and contextual memory was affected according to the cognitive load of the task. The analogue method cannot be generalized to real-life trauma and the secondary tasks may differ in cognitive load. The findings challenge a dual memory model of PTSD but support an account in which retrieval strategy, rather than encoding processes, accounts for the experience of involuntary versus voluntary recall. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  17. An assessment of the radiological impact of human intrusion at the UK Low Level Waste Repository (LLWR) - 59356

    International Nuclear Information System (INIS)

    Hicks, Tim; Baldwin, Tamara; Cummings, Richard; Sumerling, Trevor

    2012-01-01

    The UK Low Level Waste Repository Ltd submitted an Environmental Safety Case for the disposal of low-level waste (LLW) to the Environment Agency on the 1 May 2011. The Environmental Safety Case (ESC) presents a complete case for the environmental safety of the Low Level Waste Repository (LLWR) both during operations and in the long term (Cummings et al, in these proceedings). This includes an assessment of the long-term radiological safety of the facility, including an assessment of the potential consequences of human intrusion at the site. The human intrusion assessment is based on a cautiously realistic approach in defining intrusion cases and parameter values. A range of possible human intrusion events was considered based on present-day technologies and credible future uses of the site. This process resulted in the identification of geotechnical investigations, a housing development and a smallholding as requiring quantitative assessment. A particular feature of the site is that, because of its proximity to the coast and in view of expected global sea-level rise, it is vulnerable to coastal erosion. During such erosion, wastes and engineered barrier materials will be exposed, and could become targets for investigation or recovery. Therefore, human intrusion events have been included that are associated with such activities. A radiological assessment model has been developed to analyse the impacts of potential human intrusion at the site. A key feature of the model is the representation of the spatial layout of the disposal site, including the engineered cap design and the large-scale spatial heterogeneity of radionuclide concentrations within the repository. The model has been used to calculate the radiation dose to intruders and to others following intrusion at different times and at different locations across the site, for the each of the selected intrusion events, considering all relevant exposure modes. Potential doses due to radon and its daughters in

  18. Geophysical detection of marine intrusions in Black Sea coastal areas (Romania) using VES and ERT data

    OpenAIRE

    CHITEA, Florina; GEORGESCU, Paul; IOANE, Dumitru

    2011-01-01

    Abstract. Communities living in coastal areas depend in a great extent on the fresh water resources exploited from aquifers which are usually in a natural hydrodynamic equilibrium with the sea water. The contamination of fresh water with marine saltwater determines a significant increase in the aquifers electric conductivity, allowing an efficient application of resistivity methods in detecting and monitoring the marine intrusions. We present case studies from Romania (Costinesti and Vama Vec...

  19. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  20. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  1. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  2. Hydrogeology, water quality, and saltwater intrusion in the Upper Floridan Aquifer in the offshore area near Hilton Head Island, South Carolina, and Tybee Island, Georgia, 1999-2002

    Science.gov (United States)

    Falls, W. Fred; Ransom, Camille; Landmeyer, James E.; Reuber, Eric J.; Edwards, Lucy E.

    2005-01-01

    To assess the hydrogeology, water quality, and the potential for saltwater intrusion in the offshore Upper Floridan aquifer, a scientific investigation was conducted near Tybee Island, Georgia, and Hilton Head Island, South Carolina. Four temporary wells were drilled at 7, 8, 10, and 15 miles to the northeast of Tybee Island, and one temporary well was drilled in Calibogue Sound west of Hilton Head Island. The Upper Floridan aquifer at the offshore and Calibogue sites includes the unconsolidated calcareous quartz sand, calcareous quartz sandstone, and sandy limestone of the Oligocene Lazaretto Creek and Tiger Leap Formations, and the limestone of the late Eocene Ocala Limestone and middle Avon Park Formation. At the 7-, 10-, and 15-mile sites, the upper confining unit between the Upper Floridan and surficial aquifers correlates to the Miocene Marks Head Formation. Paleochannel incisions have completely removed the upper confining unit at the Calibogue site and all but a 0.8-foot-thick interval of the confining unit at the 8-mile site, raising concern about the potential for saltwater intrusion through the paleochannel-fill sediments at these two sites. The paleochannel incisions at the Calibogue and 8-mile sites are filled with fine- and coarse-grained sediments, respectively. The hydrogeologic setting and the vertical hydraulic gradients at the 7- and 10-mile sites favored the absence of saltwater intrusion during predevelopment. After decades of onshore water use in Georgia and South Carolina, the 0-foot contour in the regional cone of depression of the Upper Floridan aquifer is estimated to have been at the general location of the 7- and 10-mile sites by the mid-1950s and at or past the 15-mile site by the 1980s. The upward vertical hydraulic gradient reversed, but the presence of more than 17 feet of upper confining unit impeded the downward movement of saltwater from the surficial aquifer to the Upper Floridan aquifer at the 7- and 10-mile sites. At the 10

  3. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  4. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  5. Torque Control During Intrusion on Upper Central Incisor in Labial and Lingual bracket System - A 3D Finite Element Study.

    Science.gov (United States)

    Pol, Tejas R; Vandekar, Meghna; Patil, Anuradha; Desai, Sanjana; Shetty, Vikram; Hazarika, Saptarshi

    2018-01-01

    The aim of present study was to investigate the difference of torque control during intrusive force on upper central incisors with normal, under and high torque in lingual and labial orthodontic systems through 3D finite element analysis. Six 3D models of an upper right central incisor with different torque were designed in Solid Works 2006. Software ANSYS Version 16.0 was used to evaluate intrusive force on upper central incisor model . An intrusive force of 0.15 N was applied to the bracket slot in different torque models and the displacements along a path of nodes in the upper central incisor was assessed. On application of Intrusive force on under torqued upper central incisor in Labial system produce labial crown movement but in Lingual system caused lingual movement in the apical and incisal parts. The same intrusive force in normal-torqued central incisor led to a palatal movement in apical and labial displacement of incisal edge in Lingual system and a palatal displacement in apical area and a labial movement in the incisal edge in Labial systemin. In overtorqued upper central incisor, the labial crown displacement in Labial system is more than Lingual system. In labial and lingual system on application of the same forces in upper central incisor with different inclinations showed different responses. The magnitudes of torque Loss during intrusive loads in incisors with normal, under and over-torque were higher in Labial system than Lingual orthodontic appliances. Key words: FEM, lingual orthodontics, intrusion, torque control, labial bracket systems.

  6. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth

    Science.gov (United States)

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.

    2013-01-01

    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  7. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  8. Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In July1996, BN transmitted Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site to the United States Department of Energy, under Contract DE-AC08-91NV10833. The 1996 paper had a limited distribution and was not reviewed for public release. In 2007, National Security Technologies LLC (NSTec) made minor revisions to conform to current editorial standards of the NNSA/NSO and to meet current security requirements for public release. The primary purpose of this study was to identify types of engineered passive barriers that could deter future intrusion into buried low-level radioactive waste, particularly intrusion by drilling water wells. The study considered drilling technology, many natural and man-made materials, and both underground and above-ground barriers. Based on cost and effectiveness, the report recommended underground barriers consisting of a layer of rubble or tires. An aboveground barrier mound might also prove effective, but would cost more, and may become an attractive nuisance (e.g., might, after their purpose has been forgotten, encourage exploration for the sake of satisfying curiosity). Advances in drilling technology could render any engineered barriers ineffective if there is motivation to penetrate the barriers

  9. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated

  10. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    depending on the model parameters) and then decreases over time during the intrusion. However, if we consider the effect of the cooling of magma, with the temperature which decreases with time and the viscosity that increases, we'll find that the stress in the rock above the sill gradually increases with time and becomes higher than in isothermal case. In order to investigate the role of the physical properties of magma and rock above the sill in the generation of the stress field we have carried out different simulations by varying the viscosity of magma and the rigidity of the rock and found that high viscosity magma produces a relatively high stress intensity, as well as a high rock rigidity does.

  12. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island.

    Science.gov (United States)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen

    2017-04-01

    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  13. A post audit and inverse modeling in reactive transport: 50 years of artificial recharge in the Amsterdam Water Supply Dunes

    Science.gov (United States)

    Karlsen, R. H.; Smits, F. J. C.; Stuyfzand, P. J.; Olsthoorn, T. N.; van Breukelen, B. M.

    2012-08-01

    SummaryThis article describes the post audit and inverse modeling of a 1-D forward reactive transport model. The model simulates the changes in water quality following artificial recharge of pre-treated water from the river Rhine in the Amsterdam Water Supply Dunes using the PHREEQC-2 numerical code. One observation dataset is used for model calibration, and another dataset for validation of model predictions. The total simulation time of the model is 50 years, from 1957 to 2007, with recharge composition varying on a monthly basis and the post audit is performed 26 years after the former model simulation period. The post audit revealed that the original model could reasonably predict conservative transport and kinetic redox reactions (oxygen and nitrate reduction coupled to the oxidation of soil organic carbon), but showed discrepancies in the simulation of cation exchange. Conceptualizations of the former model were inadequate to accurately simulate water quality changes controlled by cation exchange, especially concerning the breakthrough of potassium and magnesium fronts. Changes in conceptualization and model design, including the addition of five flow paths, to a total of six, and the use of parameter estimation software (PEST), resulted in a better model to measurement fit and system representation. No unique parameter set could be found for the model, primarily due to high parameter correlations, and an assessment of the predictive error was made using a calibration constrained Monte-Carlo method, and evaluated against field observations. The predictive error was found to be low for Na+ and Ca2+, except for greater travel times, while the K+ and Mg2+ error was restricted to the exchange fronts at some of the flow paths. Optimized cation exchange coefficients were relatively high, especially for potassium, but still within the observed range in literature. The exchange coefficient for potassium agrees with strong fixation on illite, a main clay mineral in

  14. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  15. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  16. A hypnotically mediated guided imagery intervention for intrusive imagery: creating ground for figure.

    Science.gov (United States)

    Appel, P R

    1999-04-01

    Intrusive imagery can be seen as a cognitive dysfunction in the assimilation and accommodation of the psychological material represented by those images. From a gestalt psychological perspective, the intrusive image represents a figure without a ground that can provide meaning and context. Hypnotically mediated guided imagery interventions can be used to create a ground for the rogue image that metaphorically is an unassimilated figure; and thus allow for the creation of a new cognitive scheme. Four case examples are presented as well as a model for the intervention.

  17. Hydraulic barrier against seawater intrusion in the main aquifer of Delta del Llobregat; Barrera hidraulica contra la intrusion marina en el acuifero principal del Delta del Llobregat

    Energy Technology Data Exchange (ETDEWEB)

    Ortuno Gobern, F.; Ninerola Pla, J. M.; Fraile, J.; Juarez, I.; Molinero Huguet, J.; Arcos, D.; Pitarch, J. L.

    2009-07-01

    The main aquifer of Delta del Llobregat (Barcelona, Spain) is affected by seawater intrusion from 1970. For stopping its advance, the Catalan Water Agency is carrying out the construction of a positive hydraulic barrier through the injection of water in 14 wells. This is the first project of these characteristic that it is carried out in Spain and pioneer in Europe. The barrier elevates the groundwater level of the aquifer near the coast and avoids that the seawater penetrates inland, using reclaimed water of Baix Llobregat WWTP with several treatments. The first phase brings already more than 2 years of functioning, with highly positive results since a substantial improvement of the quality of the groundwater has been observed. The second phase is at present under construction. (Author)

  18. Assessing the pollution risk of a groundwater source field at western Laizhou Bay under seawater intrusion.

    Science.gov (United States)

    Zeng, Xiankui; Wu, Jichun; Wang, Dong; Zhu, Xiaobin

    2016-07-01

    Coastal areas have great significance for human living, economy and society development in the world. With the rapid increase of pressures from human activities and climate change, the safety of groundwater resource is under the threat of seawater intrusion in coastal areas. The area of Laizhou Bay is one of the most serious seawater intruded areas in China, since seawater intrusion phenomenon was firstly recognized in the middle of 1970s. This study assessed the pollution risk of a groundwater source filed of western Laizhou Bay area by inferring the probability distribution of groundwater Cl(-) concentration. The numerical model of seawater intrusion process is built by using SEAWAT4. The parameter uncertainty of this model is evaluated by Markov Chain Monte Carlo (MCMC) simulation, and DREAM(ZS) is used as sampling algorithm. Then, the predictive distribution of Cl(-) concentration at groundwater source field is inferred by using the samples of model parameters obtained from MCMC. After that, the pollution risk of groundwater source filed is assessed by the predictive quantiles of Cl(-) concentration. The results of model calibration and verification demonstrate that the DREAM(ZS) based MCMC is efficient and reliable to estimate model parameters under current observation. Under the condition of 95% confidence level, the groundwater source point will not be polluted by seawater intrusion in future five years (2015-2019). In addition, the 2.5% and 97.5% predictive quantiles show that the Cl(-) concentration of groundwater source field always vary between 175mg/l and 200mg/l. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  20. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  1. The Partitioning of Carbon Biomass among the Pico- and Nano-plankton Community in the South Brazilian Bight during a Strong Summer Intrusion of South Atlantic Central Water

    Directory of Open Access Journals (Sweden)

    Natascha M. Bergo

    2017-07-01

    Full Text Available To investigate how pico- and nano-plankton respond to oceanographic conditions in the Southwestern Atlantic Ocean, we assessed the influence of a summer intrusion of the South Atlantic Central Water (SACW on the spatial and vertical dynamics of planktonic abundance and carbon biomass across environmental gradients. Seawater samples were collected from six depths within the euphotic zone at nine oceanographic stations in a transect on the Brazilian continental shelf in January 2013. The abundance of pico- and nano-plankton populations was determined by flow cytometry, and carbon biomass was calculated based on conversion factors from the literature. The autotrophic Synechococcus spp., picoeukaryotes, and nanoeukaryotes were more abundant in the surface layers of the innermost stations influenced by Coastal Water (maximum of 1.19 × 105, 1.5 × 104, and 8.61 × 103 cell·mL−1, respectively, whereas Prochlorococcus spp. dominated (max. of 6.57 × 104 cell·mL−1 at the outermost stations influenced by Tropical Water and in the uplifting layers of the SACW around a depth of 100 m. Numerically, heterotrophic bacterial populations were predominant, with maximum concentrations (2.11 × 106 cell·mL−1 recorded in the surface layers of the inner and mid shelves in Coastal Water and the upper limits of the SACW. Nutrient-rich (high silicate and phosphate and relatively less saline waters enhanced the picoeukaryotic biomass, while Synechococcus and heterotrophic bacteria were linked to higher temperatures, lower salinities, and higher inputs of ammonia and dissolved organic carbon. The relative importance of each group to carbon biomass partitioning under upwelling conditions is led by heterotrophic bacteria, followed by picoeukaryotes, Synechococcus and Prochlorococcus, and when the SACW is not as influential, the relative contribution of each phytoplanktonic group is more evenly distributed. In addition to habitat preferences, the physical structure

  2. Mechanical, Thermal, and Electrical Energy Storage in a Single Working Body: Electrification and Thermal Effects upon Pressure-Induced Water Intrusion-Extrusion in Nanoporous Solids.

    Science.gov (United States)

    Grosu, Yaroslav; Mierzwa, Michał; Eroshenko, Valentine A; Pawlus, Sebastian; Chorażewski, Mirosław; Nedelec, Jean-Marie; Grolier, Jean-Pierre E

    2017-03-01

    This paper presents the first experimental evidence of pronounced electrification effects upon reversible cycle of forced water intrusion-extrusion in nanoporous hydrophobic materials. Recorded generation of electricity combined with high-pressure calorimetric measurements improves the energy balance of {nanoporous solid + nonwetting liquid} systems by compensating mechanical and thermal energy hysteresis in the cycle. Revealed phenomena provide a novel way of "mechanical to electrical" and/or "thermal to electrical" energy transformation with unprecedented efficiency and additionally open a perspective to increase the efficiency of numerous energy applications based on such systems taking advantage of electricity generation during operational cycle.

  3. Externalizing symptoms, effortful control, and intrusive parenting: A test of bidirectional longitudinal relations during early childhood.

    Science.gov (United States)

    Eisenberg, Nancy; Taylor, Zoe E; Widaman, Keith F; Spinrad, Tracy L

    2015-11-01

    At approximately 30, 42, and 54 months of age (N = 231), the relations among children's externalizing symptoms, intrusive maternal parenting, and children's effortful control (EC) were examined. Both intrusive parenting and low EC have been related to psychopathology, but children's externalizing problems and low EC might affect the quality of parenting and one another. Mothers' intrusive behavior with their children was assessed with observations, children's EC was measured with mothers' and caregivers' reports, and children's externalizing symptoms were assessed with mothers', fathers', and caregivers' reports. In a structural equation panel model, bidirectional relations between intrusive parenting and EC were found: EC at 30 and 42 months predicted low levels of intrusive parenting a year later, controlling for prior levels of parenting and vice versa. Moreover, high levels of children's externalizing problems at both 30 and 42 months negatively predicted EC a year later, controlling for prior levels of EC. Although externalizing problems positively predicted high EC over time, this appeared to be a suppression effect because these variables had a strong negative pattern in the zero-order correlations. Moreover, when controlling for the stability of intrusive parenting, EC, and externalizing (all exhibited significant stability across time) and the aforementioned cross-lagged predictive paths, EC and externalizing problems were still negatively related within the 54-month assessment. The findings are consistent with the view that children's externalizing behavior undermines their EC and contributes to intrusive mothering and that relations between intrusive parenting and EC are bidirectional across time. Thus, interventions that focus on modifying children's externalizing problems (as well as the quality of parenting) might affect the quality of parenting they receive and, hence, subsequent problems with adjustment.

  4. Analysis of projected water availability with current basin management plan, Pajaro Valley, California

    Science.gov (United States)

    Hanson, R. T.; Lockwood, B.; Schmid, Wolfgang

    2014-11-01

    The projection and analysis of the Pajaro Valley Hydrologic Model (PVHM) 34 years into the future using MODFLOW with the Farm Process (MF-FMP) facilitates assessment of potential future water availability. The projection is facilitated by the integrated hydrologic model, MF-FMP that fully couples the simulation of the use and movement of water from precipitation, streamflow, runoff, groundwater flow, and consumption by natural and agricultural vegetation throughout the hydrologic system at all times. MF-FMP allows for more complete analysis of conjunctive-use water-resource systems than previously possible with MODFLOW by combining relevant aspects of the landscape with the groundwater and surface-water components. This analysis is accomplished using distributed cell-by-cell supply-constrained and demand-driven components across the landscape within ;water-balance subregions; (WBS) comprised of one or more model cells that can represent a single farm, a group of farms, watersheds, or other hydrologic or geopolitical entities. Analysis of conjunctive use would be difficult without embedding the fully coupled supply-and-demand into a fully coupled simulation, and are difficult to estimate a priori. The analysis of projected supply and demand for the Pajaro Valley indicate that the current water supply facilities constructed to provide alternative local sources of supplemental water to replace coastal groundwater pumpage, but may not completely eliminate additional overdraft. The simulation of the coastal distribution system (CDS) replicates: 20 miles of conveyance pipeline, managed aquifer recharge and recovery (MARR) system that captures local runoff, and recycled-water treatment facility (RWF) from urban wastewater, along with the use of other blend water supplies, provide partial relief and substitution for coastal pumpage (aka in-lieu recharge). The effects of these Basin Management Plan (BMP) projects were analyzed subject to historical climate variations and

  5. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  6. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  7. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  8. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  9. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  10. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  11. Assessment of groundwater vulnerability to anthropogenic pollution and seawater intrusion in a small tropical island using index-based methods.

    Science.gov (United States)

    Kura, Nura Umar; Ramli, Mohammad Firuz; Ibrahim, Shaharin; Sulaiman, Wan Nor Azmin; Aris, Ahmad Zaharin; Tanko, Adamu Idris; Zaudi, Muhammad Amar

    2015-01-01

    In this work, the DRASTIC and GALDIT models were employed to determine the groundwater vulnerability to contamination from anthropogenic activities and seawater intrusion in Kapas Island. In addition, the work also utilized sensitivity analysis to evaluate the influence of each individual parameter used in developing the final models. Based on these effects and variation indices of the said parameters, new effective weights were determined and were used to create modified DRASTIC and GALDIT models. The final DRASTIC model classified the island into five vulnerability classes: no risk (110-140), low (140-160), moderate (160-180), high (180-200), and very high (>200), covering 4, 26, 59, 4, and 7 % of the island, respectively. Likewise, for seawater intrusion, the modified GALDIT model delineates the island into four vulnerability classes: very low (130) covering 39, 33, 18, and 9 % of the island, respectively. Both models show that the areas that are likely to be affected by anthropogenic pollution and seawater intrusion are within the alluvial deposit at the western part of the island. Pearson correlation was used to verify the reliability of the two models in predicting their respective contaminants. The correlation matrix showed a good relationship between DRASTIC model and nitrate (r = 0.58). In a similar development, the correlation also reveals a very strong negative relationship between GALDIT model and seawater contaminant indicator (resistivity Ωm) values (r = -0.86) suggesting that the model predicts more than 86 % of seawater intrusion. In order to facilitate management strategy, suitable areas for artificial recharge were identified through modeling. The result suggested some areas within the alluvial deposit at the western part of the island as suitable for artificial recharge. This work can serve as a guide for a full vulnerability assessment to anthropogenic pollution and seawater intrusion in small islands and will help policy maker and

  12. A Neuro-genetic Based Short-term Forecasting Framework for Network Intrusion Prediction System

    Institute of Scientific and Technical Information of China (English)

    Siva S. Sivatha Sindhu; S. Geetha; M. Marikannan; A. Kannan

    2009-01-01

    Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately traced. Because the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. An intrusion detection system (IDS) is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current IDS depends on the system operators in working out the tuning solution and in integrating it into the detection model. Furthermore, an extensive effort is required to tackle the newly evolving attacks and a deep study is necessary to categorize it into the respective classes. To reduce this dependence, an automatically evolving anomaly IDS using neuro-genetic algorithm is presented. The proposed system automatically tunes the detection model on the fly according to the feedback provided by the system operator when false predictions are encountered. The system has been evaluated using the Knowledge Discovery in Databases Conference (KDD 2009) intrusion detection dataset. Genetic paradigm is employed to choose the predominant features, which reveal the occurrence of intrusions. The neuro-genetic IDS (NGIDS) involves calculation of weightage value for each of the categorical attributes so that data of uniform representation can be processed by the neuro-genetic algorithm. In this system unauthorized invasion of a user are identified and newer types of attacks are sensed and classified respectively by the neuro-genetic algorithm. The experimental results obtained in this

  13. A fuzzy multicriteria categorization of the GALDIT method to assess seawater intrusion vulnerability of coastal aquifers.

    Science.gov (United States)

    Kazakis, Nerantzis; Spiliotis, Mike; Voudouris, Konstantinos; Pliakas, Fotios-Konstantinos; Papadopoulos, Basil

    2018-04-15

    Groundwater constitutes the primary source of fresh water for >1.2 billion people living in coastal zones. However, the threat of seawater intrusion is widespread in coastal aquifers mainly due to overexploitation of groundwater. In the present study, a modified fuzzy multicriteria categorization into non-ordered categories method was developed in order to modify the standard GALDIT method and assess seawater intrusion vulnerability in a coastal aquifer of northern Greece. The method is based on six parameters: groundwater occurrence, aquifer hydraulic conductivity, groundwater level, distance from the shore, impact of the existing status of seawater intrusion, and aquifer thickness. Initially, the original method was applied and revealed a zone of high vulnerability running parallel to the coastline and covering an area of 8.6km 2 . The modified GALDIT-F method achieved higher discretization of vulnerability zones which is essential to build a rational management plan to prevent seawater intrusion. The GALDIT-F approach also distinguished an area of the aquifer that is influenced by geothermal fluids. In total, twenty-five categories were produced corresponding to different vulnerability degrees according to the initial method (High, Moderate, Low) as well as the area influenced by geothermal fluids. Finally, a road map was developed in order to adapt management strategies to GALDIT-F categories and prevent and mitigate seawater intrusion. The proposed management strategies of the coastal aquifer include managed aquifer recharge (MAR) implementation, reallocation of existing wells, optimization of pumping rates during the hydrological year, and a detailed monitoring plan. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  15. Differences in clinical intrusive thoughts between obsessive-compulsive disorder, generalized anxiety disorder, and hypochondria.

    Science.gov (United States)

    Romero-Sanchiz, Pablo; Nogueira-Arjona, Raquel; Godoy-Ávila, Antonio; Gavino-Lázaro, Aurora; Freeston, Mark H

    2017-11-01

    Differences and similarities between intrusive thoughts typical of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis are relevant for their differential diagnosis, formulation, and psychological treatment. Previous research in non-clinical samples pointed out the relevance of some process variables, such as responsibility, guilt, or neutralization strategies. This research is aimed to investigate the differences and similarities between clinical obsessions, worries, and illness intrusions in some of these process variables. A second aim is to identify models based on these variables that could reliably differentiate between them. Three groups of patients with obsessive-compulsive disorder (n = 35; 60% women, mean age 38.57), generalized anxiety disorder (n = 36; 61.1% women, mean age 41.50), and hypochondriasis (n = 34; 70.6% women, mean age 31.59) were evaluated using the Cognitive Intrusions Questionnaire-Transdiagnostic Version (Romero-Sanchiz, Nogueira-Arjona, Godoy-Ávila, Gavino-Lázaro, & Freeston, ). The results showed that some appraisals (e.g., responsibility or egodystonicity), emotions (e.g., guilt or insecurity), neutralization strategies, and other variables (e.g., verbal content or trigger from body sensation) are relevant for the discrimination between obsessions, worries, and illness intrusions. The results also showed 3 stable models based on these variables for the discrimination between these thoughts. The implication of these results in the diagnosis, formulation, and psychological treatment of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis is discussed. Copyright © 2017 John Wiley & Sons, Ltd.

  16. New device to measure dynamic intrusion/extrusion cycles of lyophobic heterogeneous systems.

    Science.gov (United States)

    Guillemot, Ludivine; Galarneau, Anne; Vigier, Gérard; Abensur, Thierry; Charlaix, Élisabeth

    2012-10-01

    Lyophobic heterogeneous systems (LHS) are made of mesoporous materials immersed in a non-wetting liquid. One application of LHS is the nonlinear damping of high frequency vibrations. The behaviour of LHS is characterized by P - ΔV cycles, where P is the pressure applied to the system, and ΔV its volume change due to the intrusion of the liquid into the pores of the material, or its extrusion out of the pores. Very few dynamic studies of LHS have been performed until now. We describe here a new apparatus that allows us to carry out dynamic intrusion/extrusion cycles with various liquid/porous material systems, controlling the temperature from ambient to 120 °C and the frequency from 0.01 to 20 Hz. We show that for two LHS: water/MTS and Galinstan/CPG, the energy dissipated during one cycle depends very weakly on the cycle frequency, in strong contrast to conventional dampers.

  17. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  18. Automatic Extraction and Coordination of Audit Data and Features for Intrusion and Damage Assessment

    National Research Council Canada - National Science Library

    Ye, Nong

    2006-01-01

    .... We create a new attack-norm separation approach to developing detection models for building cyber sensors monitoring and identifying intrusion data characteristics at various points along the path...

  19. Feature selection for anomaly–based network intrusion detection using cluster validity indices

    CSIR Research Space (South Africa)

    Naidoo, T

    2015-09-01

    Full Text Available for Anomaly–Based Network Intrusion Detection Using Cluster Validity Indices Tyrone Naidoo_, Jules–Raymond Tapamoy, Andre McDonald_ Modelling and Digital Science, Council for Scientific and Industrial Research, South Africa 1tnaidoo2@csir.co.za 3...

  20. One-Water Hydrologic Flow Model (MODFLOW-OWHM)

    Science.gov (United States)

    Hanson, Randall T.; Boyce, Scott E.; Schmid, Wolfgang; Hughes, Joseph D.; Mehl, Steffen W.; Leake, Stanley A.; Maddock, Thomas; Niswonger, Richard G.

    2014-01-01

    The One-Water Hydrologic Flow Model (MF-OWHM) is a MODFLOW-based integrated hydrologic flow model (IHM) that is the most complete version, to date, of the MODFLOW family of hydrologic simulators needed for the analysis of a broad range of conjunctive-use issues. Conjunctive use is the combined use of groundwater and surface water. MF-OWHM allows the simulation, analysis, and management of nearly all components of human and natural water movement and use in a physically-based supply-and-demand framework. MF-OWHM is based on the Farm Process for MODFLOW-2005 (MF-FMP2) combined with Local Grid Refinement (LGR) for embedded models to allow use of the Farm Process (FMP) and Streamflow Routing (SFR) within embedded grids. MF-OWHM also includes new features such as the Surface-water Routing Process (SWR), Seawater Intrusion (SWI), and Riparian Evapotrasnpiration (RIP-ET), and new solvers such as Newton-Raphson (NWT) and nonlinear preconditioned conjugate gradient (PCGN). This IHM also includes new connectivities to expand the linkages for deformation-, flow-, and head-dependent flows. Deformation-dependent flows are simulated through the optional linkage to simulated land subsidence with a vertically deforming mesh. Flow-dependent flows now include linkages between the new SWR with SFR and FMP, as well as connectivity with embedded models for SFR and FMP through LGR. Head-dependent flows now include a modified Hydrologic Flow Barrier Package (HFB) that allows optional transient HFB capabilities, and the flow between any two layers that are adjacent along a depositional or erosional boundary or displaced along a fault. MF-OWHM represents a complete operational hydrologic model that fully links the movement and use of groundwater, surface water, and imported water for consumption by irrigated agriculture, but also of water used in urban areas and by natural vegetation. Supply and demand components of water use are analyzed under demand-driven and supply

  1. Toddler inhibited temperament, maternal cortisol reactivity and embarrassment, and intrusive parenting.

    Science.gov (United States)

    Kiel, Elizabeth J; Buss, Kristin A

    2013-06-01

    The relevance of parenting behavior to toddlers' development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers' inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multimethod approach would acknowledge that several levels of processes determine mothers' experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers' inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-old toddlers and their mothers. Toddlers' inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  2. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  3. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  4. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  5. Death Valley regional ground-water flow system, Nevada and California -- hydrogeologic framework and transient ground-water flow model

    Science.gov (United States)

    Belcher, Wayne R.

    2004-01-01

    A numerical three-dimensional (3D) transient ground-water flow model of the Death Valley region was developed by the U.S. Geological Survey for the U.S. Department of Energy programs at the Nevada Test Site and at Yucca Mountain, Nevada. Decades of study of aspects of the ground-water flow system and previous less extensive ground-water flow models were incorporated and reevaluated together with new data to provide greater detail for the complex, digital model. A 3D digital hydrogeologic framework model (HFM) was developed from digital elevation models, geologic maps, borehole information, geologic and hydrogeologic cross sections, and other 3D models to represent the geometry of the hydrogeologic units (HGUs). Structural features, such as faults and fractures, that affect ground-water flow also were added. The HFM represents Precambrian and Paleozoic crystalline and sedimentary rocks, Mesozoic sedimentary rocks, Mesozoic to Cenozoic intrusive rocks, Cenozoic volcanic tuffs and lavas, and late Cenozoic sedimentary deposits of the Death Valley Regional Ground-Water Flow System (DVRFS) region in 27 HGUs. Information from a series of investigations was compiled to conceptualize and quantify hydrologic components of the ground-water flow system within the DVRFS model domain and to provide hydraulic-property and head-observation data used in the calibration of the transient-flow model. These studies reevaluated natural ground-water discharge occurring through evapotranspiration and spring flow; the history of ground-water pumping from 1913 through 1998; ground-water recharge simulated as net infiltration; model boundary inflows and outflows based on regional hydraulic gradients and water budgets of surrounding areas; hydraulic conductivity and its relation to depth; and water levels appropriate for regional simulation of prepumped and pumped conditions within the DVRFS model domain. Simulation results appropriate for the regional extent and scale of the model were

  6. Multi-year composite view of ozone enhancements and stratosphere-to-troposphere transport in dry intrusions of northern hemisphere extratropical cyclones

    Science.gov (United States)

    Jaegle, L.; Wood, R.; Wargan, K.

    2017-12-01

    We examine the role of extratropical cyclones in stratosphere-to-troposphere (STT) exchange by using cyclone-centric composites of O3 retrievals from the Microwave Limb Sounder (MLS) and the Tropospheric Emission Spectrometer (TES) onboard the Aura satellite and contrasting them to composites obtained with Modern-Era Retrospective-analysis for Research and Applications (MERRA and MERRA-2) as well as with the GEOS-Chem chemical transport model. MERRA sea level pressure fields are used to identify 15,978 extratropical cyclones in the northern hemisphere (NH) between 2005 and 2012. The lowermost stratosphere (261 hPa) and middle troposphere (424 hPa) composites of these cyclones feature a distinct 1,000 km wide O3 enhancement in the dry intrusion to the southwest of the cyclone center, coinciding with a lowered tropopause, enhanced potential vorticity, and decreased water vapor. In the lowermost stratosphere, MLS composites show that the dry intrusion O3 enhancements reach a 210 ppbv maximum in April. In the middle troposphere, TES composites display dry intrusion maximum O3 enhancements of 27 ppbv in May. The magnitude and seasonality of these enhancements are captured by MERRA and MERRA-2, but GEOS-Chem is a factor of two too low. The MERRA-2 composites show that the O3-rich dry intrusion forms a coherent and vertically aligned structure between 300 and 800 hPa, wrapping cyclonically with the warm conveyor belt. In winter and spring dry intrusions, O3 is enhanced by 100 pbbv or 100-130% relative to background conditions at 300 hPa, with a significant contribution reaching pressure altitudes below 500 hPa (6-20 ppbv or 15-30% enhancement). We calculate that extratropical cyclones result in a STT flux of 119 Tg O3 yr-1, accounting for 42% of the annual NH O3 extratropical STT flux. The STT flux in cyclones is highest in spring and displays a strong dependence on westerly 300 hPa wind speeds.

  7. Assessment of Managed Aquifer Recharge Site Suitability Using a GIS and Modeling.

    Science.gov (United States)

    Russo, Tess A; Fisher, Andrew T; Lockwood, Brian S

    2015-01-01

    We completed a two-step regional analysis of a coastal groundwater basin to (1) assess regional suitability for managed aquifer recharge (MAR), and (2) quantify the relative impact of MAR activities on groundwater levels and sea water intrusion. The first step comprised an analysis of surface and subsurface hydrologic properties and conditions, using a geographic information system (GIS). Surface and subsurface data coverages were compiled, georeferenced, reclassified, and integrated (including novel approaches for combining related datasets) to derive a spatial distribution of MAR suitability values. In the second step, results from the GIS analysis were used with a regional groundwater model to assess the hydrologic impact of potential MAR placement and operating scenarios. For the region evaluated in this study, the Pajaro Valley Groundwater Basin, California, GIS results suggest that about 7% (15 km2) of the basin may be highly suitable for MAR. Modeling suggests that simulated MAR projects placed near the coast help to reduce sea water intrusion more rapidly, but these projects also result in increased groundwater flows to the ocean. In contrast, projects placed farther inland result in more long-term reduction in sea water intrusion and less groundwater flowing to the ocean. This work shows how combined GIS analysis and modeling can assist with regional water supply planning, including evaluation of options for enhancing groundwater resources. © 2014, National Ground Water Association.

  8. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  9. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  10. Vulnerability and Risk of Agro-ecosystems Facing Increased Salinity Intrusion in the Mekong Delta, Viet Nam

    Science.gov (United States)

    Renaud, F.; Sebesvari, Z.; Nguyen, M. T.; Hagenlocher, M.

    2016-12-01

    The Vietnamese portion of the Mekong Delta increasingly suffers from salinity intrusion in its freshwater system, as exemplified by the historically high salinity levels recorded during the 2016 dry season. Although this exceptional situation was linked to the El Niño phenomena, many factors contribute to an increasing salinization of coastal areas. Salinity intrusion is a natural process in this tidal area but its extent is increasing and projected to worsen due to increased demand for water, diversion/storage of water flows in the Mekong river and its tributaries, land subsidence linked to groundwater over-abstraction, changes in land use and water management in coastal areas, and sea level rise. The Mekong Delta remains predominantly an agricultural landscape which contributes the majority of the rice, aquaculture, and fruit production of the country. These systems will need to be adapted to increased salinity levels. We will present results from two research projects, DeltAdapt and DELTAS, which were designed to allow understanding of, respectively (1) the main drivers of change of agro-ecosystems in coastal areas of the delta and (2) the relative vulnerabilities and risks deltaic social-ecological systems face with respect to various environmental hazards. We used the Global Delta Vulnerability Index developed within the DELTAS project to characterize the vulnerabilities and risks faced by coastal provinces of the delta with respect to salinity intrusion. The analysis allows us to understand which social, economic, and ecological variables index explain the relative vulnerability of the provinces. In addition, drivers of change (e.g. policy, economic, social, environmental) of coastal agro-ecosystems were systematically analyzed through 80 interviews and 7 focus group discussions in the provinces of Kien Giang and Soc Trang within the DeltAdapt project. This was combined with the analysis of Vietnamese policies to determine which are the important drivers of

  11. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  12. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  13. Modeling Thermal Pressurization Around Shallow Dikes Using Temperature-Dependent Hydraulic Properties: Implications for Deformation Around Intrusions

    Science.gov (United States)

    Townsend, Meredith R.

    2018-01-01

    Pressurization and flow of groundwater around igneous intrusions depend in part on the hydraulic diffusivity of the host rocks and processes that enhance diffusivity, such as fracturing, or decrease diffusivity, such as mineral precipitation during chemical alteration. Characterizing and quantifying the coupled effects of alteration, pore pressurization, and deformation have significant implications for deformation around intrusions, geothermal energy, contact metamorphism, and heat transfer at mid-ocean ridges. Fractures around dikes at Ship Rock, New Mexico, indicate that pore pressures in the host rocks exceeded hydrostatic conditions by at least 15 MPa following dike emplacement. Hydraulic measurements and petrographic analysis indicate that mineral precipitation clogged the pores of the host rock, reducing porosity from 0.25 to reducing permeability by 5 orders of magnitude. Field data from Ship Rock are used to motivate and constrain numerical models for thermal pore fluid pressurization adjacent to a meter-scale dike, using temperature-dependent hydraulic properties in the host rock as a proxy for porosity loss by mineral precipitation during chemical alteration. Reduction in permeability by chemical alteration has a negligible effect on pressurization. However, reduction in porosity by mineral precipitation increases fluid pressure by constricting pore volume and is identified as a potentially significant source of pressure. A scaling relationship is derived to determine when porosity loss becomes important; if permeability is low enough, pressurization by porosity loss outweighs pressurization by thermal expansion of fluids.

  14. Intrusion-Related Gold Deposits: New insights from gravity and hydrothermal integrated 3D modeling applied to the Tighza gold mineralization (Central Morocco)

    Science.gov (United States)

    Eldursi, Khalifa; Branquet, Yannick; Guillou-Frottier, Laurent; Martelet, Guillaume; Calcagno, Philippe

    2018-04-01

    The Tighza (or Jebel Aouam) district is one of the most important polymetallic districts in Morocco. It belongs to the Variscan Belt of Central Meseta, and includes W-Au, Pb-Zn-Ag, and Sb-Ba mineralization types that are spatially related to late-Carboniferous granitic stocks. One of the proposed hypotheses suggests that these granitic stocks are connected to a large intrusive body lying beneath them and that W-Au mineralization is directly related to this magmatism during a 287-285 Ma time span. A more recent model argues for a disconnection between the older barren outcropping magmatic stocks and a younger hidden magmatic complex responsible for the W-Au mineralization. Independently of the magmatic scenario, the W-Au mineralization is consensually recognized as of intrusion-related gold deposit (IRGD) type, W-rich. In addition to discrepancies between magmatic sceneries, the IRGD model does not account for published older age corresponding to a high-temperature hydrothermal event at ca. 291 Ma. Our study is based on gravity data inversion and hydro-thermal modeling, and aims to test this model of IRGD and its related magmatic geometries, with respect to subsurface geometries, favorable physical conditions for deposition and time record of hydrothermal processes. Combined inversion of geology and gravity data suggests that an intrusive body is rooted mainly at the Tighza fault in the north and that it spreads horizontally toward the south during a trans-tensional event (D2). Based on the numerical results, two types of mineralization can be distinguished: 1) the "Pre-Main" type appears during the emplacement of the magmatic body, and 2) the "Main" type appears during magma crystallization and the cooling phase. The time-lag between the two mineralization types depends on the cooling rate of magma. Although our numerical model of thermally-driven fluid flow around the Tighza pluton is simplified, as it does not take into account the chemical and deformation

  15. Field observations of extended seawater intrusion through subsurface karst conduit networks at Wakulla Spring in the Woodville Karst Plain, Florida

    Science.gov (United States)

    Xu, Z.; Bassett, S.; Hu, B. X.; Dyer, S.

    2016-12-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electric conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 14 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This abstract documented the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  16. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  17. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  18. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  19. Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    Traditionally, an isolated intrusion detection system (IDS) is vulnerable to various types of attacks. In order to enhance IDS performance, collaborative intrusion detection networks (CIDNs) are developed through enabling a set of IDS nodes to communicate with each other. Due to the distributed...... network architecture, insider attacks are one of the major threats. In the literature, challenge-based trust mechanisms have been built to identify malicious nodes by evaluating the satisfaction levels between challenges and responses. However, such mechanisms rely on two major assumptions, which may...... result in a weak threat model. In this case, CIDNs may be still vulnerable to advanced insider attacks in real-world deployment. In this paper, we propose a novel collusion attack, called passive message fingerprint attack (PMFA), which can collect messages and identify normal requests in a passive way...

  20. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  1. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  2. Association between intrusive negative autobiographical memories and depression: A meta-analytic investigation.

    Science.gov (United States)

    Mihailova, Stella; Jobson, Laura

    2018-02-23

    The study investigated several associations between depression and intrusive negative autobiographical memories. A systematic literature search identified 23 eligible studies (N = 2,582), which provided 59 effect sizes. Separate meta-analyses indicated that depression was moderately, positively associated with intrusive memory frequency, memory distress, maladaptive memory appraisals, memory avoidance, and memory rumination. Intrusive memory vividness was not significantly associated with depression. There were insufficient data to examine the relationship between depression and memory vantage perspective. Between-study heterogeneity was high for intrusive memory frequency and memory avoidance, and the percentage of females in studies significantly moderated the relationship between these variables and depression. An additional exploratory meta-analysis (3 studies; N = 257) indicated that intrusive memories were experienced more frequently by those with posttraumatic stress disorder than those with depression. Overall, the findings suggest that intrusive memories warrant clinical attention as they may contribute to the maintenance of depressive symptomatology. Copyright © 2018 John Wiley & Sons, Ltd.

  3. Intrusive images in psychological disorders: characteristics, neural mechanisms, and treatment implications.

    Science.gov (United States)

    Brewin, Chris R; Gregory, James D; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy.

  4. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  5. Many-objective robust decision making for water allocation under climate change.

    Science.gov (United States)

    Yan, Dan; Ludwig, Fulco; Huang, He Qing; Werners, Saskia E

    2017-12-31

    Water allocation is facing profound challenges due to climate change uncertainties. To identify adaptive water allocation strategies that are robust to climate change uncertainties, a model framework combining many-objective robust decision making and biophysical modeling is developed for large rivers. The framework was applied to the Pearl River basin (PRB), China where sufficient flow to the delta is required to reduce saltwater intrusion in the dry season. Before identifying and assessing robust water allocation plans for the future, the performance of ten state-of-the-art MOEAs (multi-objective evolutionary algorithms) is evaluated for the water allocation problem in the PRB. The Borg multi-objective evolutionary algorithm (Borg MOEA), which is a self-adaptive optimization algorithm, has the best performance during the historical periods. Therefore it is selected to generate new water allocation plans for the future (2079-2099). This study shows that robust decision making using carefully selected MOEAs can help limit saltwater intrusion in the Pearl River Delta. However, the framework could perform poorly due to larger than expected climate change impacts on water availability. Results also show that subjective design choices from the researchers and/or water managers could potentially affect the ability of the model framework, and cause the most robust water allocation plans to fail under future climate change. Developing robust allocation plans in a river basin suffering from increasing water shortage requires the researchers and water managers to well characterize future climate change of the study regions and vulnerabilities of their tools. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  7. Investigating Ozone Sources in California Using AJAX Airborne Measurements and Models: Implications for Stratospheric Intrusion and Long Range Transport

    Science.gov (United States)

    Ryoo, Ju-Mee; Johnson, Matthew S.; Iraci, Laura T.; Yates, Emma L.; Pierce, R. Bradley; Tanaka, Tomoaki; Gore, Warren

    2016-01-01

    High ozone concentrations at low altitudes near the surface were detected from airborne Alpha Jet Atmospheric eXperiment (AJAX) measurements on May 30, 2012. We investigate the causes of the elevated ozone concentrations using the airborne measurements and various models. GEOSchem and WRF-STILT model simulations show that the contribution from local sources is small. From MERRA reanalysis, it is found that high potential vorticity (PV) is observed at low altitudes. This high PV appears to be only partially coming through the stratospheric intrusions because the air inside the high PV region is moist, which shows that mixing appears to be enhanced in the low altitudes. Considering that diabatic heating can also produce high PV in the lower troposphere, high ozone is partially coming through stratospheric intrusion, but this cannot explain the whole ozone concentration in the target areas of the western U.S. A back-trajectory model is utilized to see where the air masses originated. The air masses of the target areas came from the lower stratosphere (LS), upper (UT), mid- (MT), and lower troposphere (LT). The relative number of trajectories coming from LS and UT is low (7.7% and 7.6%, respectively) compared to that from LT (64.1%), but the relative ozone concentration coming from LS and UT is high (38.4% and 20.95%, respectively) compared to that from LT (17.7%). The air mass coming from LT appears to be mostly coming from Asia. Q diagnostics show that there is sufficient mixing along the trajectory to indicate that ozone from the different origins is mixed and transported to the western U.S. This study shows that high ozone concentrations can be detected by airborne measurements, which can be analyzed by integrated platforms such as models, reanalysis, and satellite data.

  8. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  9. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  10. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  11. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  12. Hydraulic barrier against seawater intrusion in the main aquifer of Delta del Llobregat

    International Nuclear Information System (INIS)

    Ortuno Gobern, F.; Ninerola Pla, J. M.; Fraile, J.; Juarez, I.; Molinero Huguet, J.; Arcos, D.; Pitarch, J. L.

    2009-01-01

    The main aquifer of Delta del Llobregat (Barcelona, Spain) is affected by seawater intrusion from 1970. For stopping its advance, the Catalan Water Agency is carrying out the construction of a positive hydraulic barrier through the injection of water in 14 wells. This is the first project of these characteristic that it is carried out in Spain and pioneer in Europe. The barrier elevates the groundwater level of the aquifer near the coast and avoids that the seawater penetrates inland, using reclaimed water of Baix Llobregat WWTP with several treatments. The first phase brings already more than 2 years of functioning, with highly positive results since a substantial improvement of the quality of the groundwater has been observed. The second phase is at present under construction. (Author)

  13. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks.

    Science.gov (United States)

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-10-13

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks.

  14. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  15. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  16. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  17. Pathway from child sexual and physical abuse to risky sex among emerging adults: the role of trauma-related intrusions and alcohol problems.

    Science.gov (United States)

    Walsh, Kate; Latzman, Natasha E; Latzman, Robert D

    2014-04-01

    Some evidence suggests that risk reduction programming for sexual risk behaviors (SRB) has been minimally effective, which emphasized the need for research on etiological and mechanistic factors that can be addressed in prevention and intervention programming. Childhood sexual and physical abuse have been linked with SRB among older adolescents and emerging adults; however, pathways to SRB remain unclear. This study adds to the literature by testing a model specifying that traumatic intrusions after early abuse may increase risk for alcohol problems, which in turn may increase the likelihood of engaging in various types of SRB. Participants were 1,169 racially diverse college students (72.9% female, 37.6% black/African-American, and 33.6% white) who completed anonymous questionnaires assessing child abuse, traumatic intrusions, alcohol problems, and sexual risk behavior. The hypothesized path model specifying that traumatic intrusions and alcohol problems account for associations between child abuse and several aspects of SRB was a good fit for the data; however, for men, stronger associations emerged between physical abuse and traumatic intrusions and between traumatic intrusions and alcohol problems, whereas for women, alcohol problems were more strongly associated with intent to engage in risky sex. Findings highlight the role of traumatic intrusions and alcohol problems in explaining paths from childhood abuse to SRB in emerging adulthood, and suggest that risk reduction programs may benefit from an integrated focus on traumatic intrusions, alcohol problems, and SRB for individuals with abuse experiences. Copyright © 2014 Society for Adolescent Health and Medicine. All rights reserved.

  18. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  19. Controlling factors on earthquake swarms associated with magmatic intrusions; constraints from Iceland

    Science.gov (United States)

    Pedersen, R.; Sigmundsson, F.; Einarsson, P.; Brandsdottir, B.; Arnadottir, T.

    2005-12-01

    Intrusion of magma into the Earth's crust is frequently associated with seismic activity, often occurring as distinct earthquake swarms. Understanding the nature of these swarms is important for evaluating crisis situations in volcanic areas. However, there often seem to be little correlation between the amount of seismic energy release, the spatial extent of the volume of rock affected by the stress perturbations, and the volume of magma on the move, which complicates the immediate risk evaluation. A number of factors may influence the evolution of a magmatically induced seismic swarm and the resulting seismic energy release. A number of factors need to be evaluated in each individual case. These are, in random order: the crustal thickness, presence/absence of a crustal magma chamber, geothermal gradient, magmatic flow rate/stressing rate, intrusion volume, depth of intrusion, tectonic setting of the intruded area, regional stresses and tectonic history. Based on three case studies, where seismic swarm activities have been confirmed through deformation measurements to be related to magmatic movements, we attempt to evaluate the relative importance of the assumed controlling factors. All case examples are located within Iceland, but in different tectonic settings. 1. The Hengill triple junction, situated where two extensional plate boundaries join a transform zone. The area experienced a period of unusually persistent earthquake activity from 1994 to 1999, contemporaneously with ground uplift at a rate of 1-2 cm/yr. The uplift was modeled as a response to magma injection at about 7 km depth. 2. The Eyjafjallajokull volcano, situated in a volcanic flank zone where extensional fractures are only poorly developed. Two minor seismic swarms, in 1994 and 1999; were associated with a cumulative surface uplift of more than 35 cm. The two uplift events were modeled as sill intrusions at depths of 4.5 to 6.5 km. 3. The Krafla rift segment, forming part of an extensional

  20. Water-supply potential of major streams and the Upper Floridan Aquifer in the vicinity of Savannah, Georgia

    Science.gov (United States)

    Garza, Reggina; Krause, Richard E.

    1997-01-01

    Surface- and ground-water resources in the Savannah, Georgia, area were evaluated for potential water-supply development. Stream-discharge and water-quality data were analyzed for two major streams considered to be viable water-supply sources. A ground-water flow model was developed to be used in conjunction with other previously calibrated models to simulate the effects of additional pumpage on water levels near areas of saltwater intrusion at Brunswick and seawater encroachment at Hilton Head Island. Hypothetical scenarios also were simulated involving redistributions and small increases, and decreases in pumpage.

  1. Magmatic ore deposits in layered intrusions - Descriptive model for reef-type PGE and contact-type Cu-Ni-PGE deposits

    Science.gov (United States)

    Zientek, Michael L.

    2012-01-01

    Layered, ultramafic to mafic intrusions are uncommon in the geologic record, but host magmatic ore deposits containing most of the world's economic concentrations of platinum-group elements (PGE) (figs. 1 and 2). These deposits are mined primarily for their platinum, palladium, and rhodium contents (table 1). Magmatic ore deposits are derived from accumulations of crystals of metallic oxides, or immiscible sulfide, or oxide liquids that formed during the cooling and crystallization of magma, typically with mafic to ultramafic compositions. "PGE reefs" are stratabound PGE-enriched lode mineralization in mafic to ultramafic layered intrusions. The term "reef" is derived from Australian and South African literature for this style of mineralization and used to refer to (1) the rock layer that is mineralized and has distinctive texture or mineralogy (Naldrett, 2004), or (2) the PGE-enriched sulfide mineralization that occurs within the rock layer. For example, Viljoen (1999) broadly defined the Merensky Reef as "a mineralized zone within or closely associated with an unconformity surface in the ultramafic cumulate at the base of the Merensky Cyclic Unit." In this report, we will use the term PGE reef to refer to the PGE-enriched mineralization, not the host rock layer. Within a layered igneous intrusion, reef-type mineralization is laterally persistent along strike, extending for the length of the intrusion, typically tens to hundreds of kilometers. However, the mineralized interval is thin, generally centimeters to meters thick, relative to the stratigraphic thickness of layers in an intrusion that vary from hundreds to thousands of meters. PGE-enriched sulfide mineralization is also found near the contacts or margins of layered mafic to ultramafic intrusions (Iljina and Lee, 2005). This contact-type mineralization consists of disseminated to massive concentrations of iron-copper-nickel-PGE-enriched sulfide mineral concentrations in zones that can be tens to hundreds

  2. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  3. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  4. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  5. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  6. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  7. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  8. Seawater intrusion in the gravelly confined aquifer of the coastal Pisan Plain (Tuscany): hydrogeological and geochemical investigation to assess causes and consequences

    Science.gov (United States)

    Doveri, M.; Giannecchini, R.; Butteri, M.

    2012-12-01

    The gravelly horizon of the Pisa plain multilayered system is a confined aquifer tapped by a large number of wells. It hosts a very important water resource for drinking, industrial and irrigable uses, but may be affected by seawater intrusion coming from the coastal area; most wells is distributed inland, anyway a significant exploitation along the coastal area is also present to supply farms and tourist services. Previous hydrogeological and geochemical investigations carried out in coastal area stated maximum percentage of seawater in gravelly aquifer of about 7-9% and suggested the presence of two different mechanisms (Doveri et alii, 2010): i) a direct seawater intrusion from the zone where the gravelly aquifer is in contact with the sea floor; ii) a mixing process between freshwater and seawater, the latter deriving from the Arno river-shallow sandy aquifer system. Basing on these results, since January 2012 a new two-year project was financed by the MSRM Regional Park. Major aims are a better definition of such phenomena and their distribution on the territory, and an assessing of the seawater intrusion trend in relation to groundwater exploitation. Eleven piezometers were realised during first semester of 2012, thus improving the measurement network, which is now made up by 40 wells/piezometers distributed on about 60 km^2. Comparing new and previous borehole data a general confinement of the gravelly aquifer is confirmed, excepting in the northern part where the aquifer is in contact with the superficial sandy one. Preliminary field measurement was performed in June 2012, during which water level (WL) and electrical conductivity (EC) data were collected. WLs below the sea-level were observed on most of the studied area, with a minimum value of about -5 m a.s.l. in the inner part of the northern zone, where major exploitation is present. Moreover, a relative minimum of WL (about -2 m a.s.l.) is present near the shoreline in the southern zone. In the latter

  9. Isotopic variation in the Tuolumne Intrusive Suite, central Sierra Nevada, California

    Science.gov (United States)

    Kistler, R.W.; Chappell, B.W.; Peck, D.L.; Bateman, P.C.

    1986-01-01

    Granitoid rocks of the compositionally zoned Late Cretaceous Toulumne Intrusive Suite in the central Sierra Nevada, California, have initial87Sr/86Sr values (Sri) and143Nd/144Nd values (Ndi) that vary from 0.7057 to 0.7067 and from 0.51239 to 0.51211 respectively. The observed variation of both Sri and Ndi and of chemical composition in rocks of the suite cannot be due to crystal fractionation of magma solely under closed system conditons. The largest variation in chemistry, Ndi, and Sri is present in the outer-most equigranular units of the Tuolumne Intrusive Suite. Sri varies positively with SiO2, Na2O, K2O, and Rb concentrations, and negatively with Ndi, Al2O3, Fe2O3, MgO, FeO, CaO, MnO, P2O5, TiO2, and Sr concentrations. This covariation of Sri, Ndi and chemistry can be modeled by a process of simple mixing of basaltic and granitic magmas having weight percent SiO2 of 48.0 and 73.3 respectively. Isotopic characteristic of the mafic magma are Sri=0.7047, Ndi=0.51269 and ??18O=6.0, and of the felsic magma are Sri=0.7068, Ndi=0.51212 and ??18O=8.9. The rocks sampled contain from 50 to 80% of the felsic component. An aplite in the outer equigranular unit of the Tuolumne Intrusive Suite apparently was derived by fractional crystallization of plagioclase and hornblende from magma with granudiorite composition that was a product of mixing of the magmas described above. Siliceous magmas derived from the lower crust, having a maximum of 15 percent mantle-derived mafic component, are represented by the inner prophyritic units of the Tuolumne Intrusive Suite. ?? 1986 Springer-Verlag.

  10. Intrusion mechanics according to Burstone with the NiTi-SE-steel uprighting spring.

    Science.gov (United States)

    Sander, F G; Wichelhaus, A; Schiemann, C

    1996-08-01

    Intrusion mechanics according to Burstone can be regarded as a practicable method for the intrusion of incisors. 1. By applying the NiTi-SE-steel uprighting spring, relatively constant forces can be exerted over a large range of intrusion on both sides of the anterior tooth archwire. 2. By bending a 150 degrees tip-back bend or a curvature into the steel portion, the uprighting spring presented here is brought into the plastic range of the characteristic curve of force. 3. Application of sliding hooks on the intrusion spring permits readjustment for force transfer onto the anterior archwire. 4. Connecting the anterior archwire with the posterior elements by means of a steel ligature can be recommended only in some cases, because sagittally directed forces may be produced. 5. The adult patients presented showed an average intrusion of 0.6 mm/month, if a linear connection was presupposed. 6. An intrusive effect on the incisors could first be detected clinically after 6 to 8 weeks. 7. Application of a torque-key proves especially useful in controlling the incisor position during intrusion in order to avoid unnecessary radiography. 8. Actual prediction of the centre of resistance with the help of a cephalometric radiograph proved not to be feasible. 9. The calculated maximal intrusion of the mandibular incisors was 7 mm. 10. The torque-segmented archwire with crimped hooks and pseudoelastic springs between the molars and the crimped hooks proved very effective for retrusion and intrusion of maxillary incisors. The maxillary anterior teeth can be retruded by a total of 7 mm without readjustment. 11. Constant moments and forces could be transferred by applying preformed arch wires and segmented arch wires.

  11. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  12. Investigation of Ozone Sources in California Using AJAX Airborne Measurements and Models: Implications for Stratospheric Intrusion and Long Range Transport

    Science.gov (United States)

    Ryoo, Ju-Mee; Johnson, Matthew S.; Iraci, Laura T.; Yates, Emma L.; Pierce, R. Bradley; Tanaka, Tomoaki; Gore, Warren

    2015-01-01

    High ozone concentrations at low altitudes near the surface were detected from airborne Alpha Jet Atmospheric eXperiment (AJAX) measurements on May 30, 2012. We investigate the causes of the elevated ozone concentrations using the airborne measurements and various models. GEOS-chem and WRF-STILT model simulations show that the contribution from local sources is small. From MERRA reanalysis, it is found that high potential vorticity (PV) is observed at low altitudes. This high PV appears to be only partially coming through the stratospheric intrusions because the air inside the high PV region is moist, which shows that mixing appears to be enhanced in the low altitudes. Considering that diabatic heating can also produce high PV in the lower troposphere, high ozone is partially coming through stratospheric intrusion, but this cannot explain the whole ozone concentration in the target areas of the western U.S. A back-trajectory model is utilized to see where the air masses originated. The air masses of the target areas came from the lower stratosphere (LS), upper (UT), mid- (MT), and lower troposphere (LT). The relative number of trajectories coming from LS and UT is low (7.7 and 7.6, respectively) compared to that from LT (64.1), but the relative ozone concentration coming from LS and UT is high (38.4 and 20.95, respectively) compared to that from LT (17.7). The air mass coming from LT appears to be mostly coming from Asia. Q diagnostics show that there is sufficient mixing along the trajectory to indicate that ozone from the different origins is mixed and transported to the western U.S. This study shows that high ozone concentrations can be detected by airborne measurements, which can be analyzed by integrated platforms such as models, reanalysis, and satellite data.

  13. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  14. Analytical scaling relations to evaluate leakage and intrusion in intermittent water supply systems

    Science.gov (United States)

    Slocum, Alexander H.; Whittle, Andrew J.

    2018-01-01

    Intermittent water supplies (IWS) deliver piped water to one billion people; this water is often microbially contaminated. Contaminants that accumulate while IWS are depressurized are flushed into customers’ homes when these systems become pressurized. In addition, during the steady-state phase of IWS, contaminants from higher-pressure sources (e.g., sewers) may continue to intrude where pipe pressure is low. To guide the operation and improvement of IWS, this paper proposes an analytic model relating supply pressure, supply duration, leakage, and the volume of intruded, potentially-contaminated, fluids present during flushing and steady-state. The proposed model suggests that increasing the supply duration may improve water quality during the flushing phase, but decrease the subsequent steady-state water quality. As such, regulators and academics should take more care in reporting if water quality samples are taken during flushing or steady-state operational conditions. Pipe leakage increases with increased supply pressure and/or duration. We propose using an equivalent orifice area (EOA) to quantify pipe quality. This provides a more stable metric for regulators and utilities tracking pipe repairs. Finally, we show that the volume of intruded fluid decreases in proportion to reductions in EOA. The proposed relationships are applied to self-reported performance indicators for IWS serving 108 million people described in the IBNET database and in the Benchmarking and Data Book of Water Utilities in India. This application shows that current high-pressure, continuous water supply targets will require extensive EOA reductions. For example, in order to achieve national targets, utilities in India will need to reduce their EOA by a median of at least 90%. PMID:29775462

  15. Analytical scaling relations to evaluate leakage and intrusion in intermittent water supply systems.

    Science.gov (United States)

    Taylor, David D J; Slocum, Alexander H; Whittle, Andrew J

    2018-01-01

    Intermittent water supplies (IWS) deliver piped water to one billion people; this water is often microbially contaminated. Contaminants that accumulate while IWS are depressurized are flushed into customers' homes when these systems become pressurized. In addition, during the steady-state phase of IWS, contaminants from higher-pressure sources (e.g., sewers) may continue to intrude where pipe pressure is low. To guide the operation and improvement of IWS, this paper proposes an analytic model relating supply pressure, supply duration, leakage, and the volume of intruded, potentially-contaminated, fluids present during flushing and steady-state. The proposed model suggests that increasing the supply duration may improve water quality during the flushing phase, but decrease the subsequent steady-state water quality. As such, regulators and academics should take more care in reporting if water quality samples are taken during flushing or steady-state operational conditions. Pipe leakage increases with increased supply pressure and/or duration. We propose using an equivalent orifice area (EOA) to quantify pipe quality. This provides a more stable metric for regulators and utilities tracking pipe repairs. Finally, we show that the volume of intruded fluid decreases in proportion to reductions in EOA. The proposed relationships are applied to self-reported performance indicators for IWS serving 108 million people described in the IBNET database and in the Benchmarking and Data Book of Water Utilities in India. This application shows that current high-pressure, continuous water supply targets will require extensive EOA reductions. For example, in order to achieve national targets, utilities in India will need to reduce their EOA by a median of at least 90%.

  16. Intrusion of low-salinity water into the Yellow Sea Interior in 2012

    Science.gov (United States)

    Oh, Kyung-Hee; Lee, Joon-Ho; Lee, Seok; Pang, Ig-Chan

    2014-12-01

    Abnormally low-salinity water was detected in the surface layer of the central region of the Yellow Sea in August 2012. The presence of such low-salinity water in the Yellow Sea interior has never been reported previously. To understand the origin of this low-salinity water, oceanographic and wind data were analyzed, and the circulation of the surface layer was also examined in the Yellow and East China Seas using a numerical ocean model. The results confirmed that typhoons caused the low-salinity water. Two consecutive typhoons passed from east to west across the East China Sea, around the Changjiang Bank in early August 2012. Strong easterly and southeasterly winds created by the typhoons in the Yellow and East China Seas drove the low-salinity water to the north along the coast of China and northeastward toward the central region of the Yellow Sea, respectively. Usually, the northward drifting of Changjiang Diluted Water along the coast of China ends around the Jiangsu coast, where the drifting is blocked and is turned by the offshore Eulerian residual current. Therefore, the Changjiang Diluted Water does not intrude more into the Yellow Sea interior. However, in 2012, the low-salinity water drifted up to the Shandong Peninsula along the coast of China, and formed massive low-salinity water in the Yellow Sea interior combining with the other low-salinity water extended toward the central region of the Yellow Sea directly from the Changjiang Bank. Thus, the typhoons play a key role in the appearance of abnormally low-salinity water in the Yellow Sea interior and it means that the Yellow Sea ecosystem could be significantly influenced by the Changjiang Diluted Water.

  17. Development and evaluation of a decision-supporting model for identifying the source location of microbial intrusions in real gravity sewer systems.

    Science.gov (United States)

    Kim, Minyoung; Choi, Christopher Y; Gerba, Charles P

    2013-09-01

    Assuming a scenario of a hypothetical pathogenic outbreak, we aimed this study at developing a decision-support model for identifying the location of the pathogenic intrusion as a means of facilitating rapid detection and efficient containment. The developed model was applied to a real sewer system (the Campbell wash basin in Tucson, AZ) in order to validate its feasibility. The basin under investigation was divided into 14 sub-basins. The geometric information associated with the sewer network was digitized using GIS (Geological Information System) and imported into an urban sewer network simulation model to generate microbial breakthrough curves at the outlet. A pre-defined amount of Escherichia coli (E. coli), which is an indicator of fecal coliform bacteria, was hypothetically introduced into 56 manholes (four in each sub-basin, chosen at random), and a total of 56 breakthrough curves of E. coli were generated using the simulation model at the outlet. Transport patterns were classified depending upon the location of the injection site (manhole), various known characteristics (peak concentration and time, pipe length, travel time, etc.) extracted from each E. coli breakthrough curve and the layout of sewer network. Using this information, we back-predicted the injection location once an E. coli intrusion was detected at a monitoring site using Artificial Neural Networks (ANNs). The results showed that ANNs identified the location of the injection sites with 57% accuracy; ANNs correctly recognized eight out of fourteen expressions with relying on data from a single detection sensor. Increasing the available sensors within the basin significantly improved the accuracy of the simulation results (from 57% to 100%). Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Model assessment of protective barrier designs: Part 2

    International Nuclear Information System (INIS)

    Fayer, M.J.

    1987-11-01

    Protective barriers are being considered for use at the Hanford Site to enhance the isolation of radioactive wastes from water, plant, and animal intrusion. This study assesses the effectiveness of protective barriers for isolation of wastes from water. In this report, barrier designs are reviewed and several barrier modeling assumptions are tested. 20 refs., 16 figs., 6 tabs

  19. NRC Information No. 89-63: Possible submergence of electrical circuits located above the flood level because of water intrusion and lack of drainage

    International Nuclear Information System (INIS)

    Rossi, C.E.

    1992-01-01

    This information notice is being provided to alert addressees that electrical circuits located above the plant flood level within electrical enclosures may become submerged in water because appropriate drainage has not been provided. Failure of electrical circuits during service conditions, including postulated accidents, can occur due to submergence if water enters these enclosures and there is no provision for drainage. The electrical enclosures addressed by this notice include terminal boxes, junction boxes, pull boxes, conduits, Condulets, and other enclosures for end-use equipment (such as limit switches, motor operators, and electrical penetrations), the contents of which may include cables, terminal blocks, electrical splices and connectors. Information Notice 84-57, ''Operating Experience Related to Moisture Intrusion on Safety-Related Electrical Equipment at Commercial Power Plants,'' addressed watertight sealing of all electrical conduits to junction boxes and conduit-to-terminal box connection points for safety-related equipment located in areas of the reactor building as well as for areas that are potentially subject to high temperature steam or water impingement. This notice further addressed the importance of ensuring that box drain holes and equipment interfaces are in conformance with the test setup established during equipment qualification testing and with the vendor's recommendations

  20. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  1. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  2. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  3. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  4. Multi-scale modeling of Puget Sound using an unstructured-grid coastal ocean model: from tide flats to estuaries and coastal waters

    International Nuclear Information System (INIS)

    Yang, Zhaoqing; Khangaonkar, Tarang

    2010-01-01

    Water circulation in Puget Sound, a large complex estuary system in the Pacific Northwest coastal ocean of the United States, is governed by multiple spatially and temporally varying forcings from tides, atmosphere (wind, heating/cooling, precipitation/evaporation, pressure), and river inflows. In addition, the hydrodynamic response is affected strongly by geomorphic features, such as fjord-like bathymetry and complex shoreline features, resulting in many distinguishing characteristics in its main and sub-basins. To better understand the details of circulation features in Puget Sound and to assist with proposed nearshore restoration actions for improving water quality and the ecological health of Puget Sound, a high-resolution (around 50 m in estuaries and tide flats) hydrodynamic model for the entire Puget Sound was needed. Here, a threedimensional circulation model of Puget Sound using an unstructured-grid finite volume coastal ocean model is presented. The model was constructed with sufficient resolution in the nearshore region to address the complex coastline, multi-tidal channels, and tide flats. Model open boundaries were extended to the entrance of the Strait of Juan de Fuca and the northern end of the Strait of Georgia to account for the influences of ocean water intrusion from the Strait of Juan de Fuca and the Fraser River plume from the Strait of Georgia, respectively. Comparisons of model results, observed data, and associated error statistics for tidal elevation, velocity, temperature, and salinity indicate that the model is capable of simulating the general circulation patterns on the scale of a large estuarine system as well as detailed hydrodynamics in the nearshore tide flats. Tidal characteristics, temperature/salinity stratification, mean circulation, and river plumes in estuaries with tide flats are discussed.

  5. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  6. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  7. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  8. Salt intrusion in multi-channel estuaries: a case study in the Mekong Delta, Vietnam

    Directory of Open Access Journals (Sweden)

    A. D. Nguyen

    2006-01-01

    Full Text Available There is a well-tested theory for the computation of salt intrusion in alluvial estuaries that is fully analytical and predictive. The theory uses analytical equations to predict the mixing behaviour of the estuary based on measurable quantities, such as channel topography, river discharge and tidal characteristics. It applies to single-channel topographies and estuaries that demonstrate moderate tidal damping. The Mekong delta is a multi-channel estuary where the tide is damped due to a relatively strong river discharge (in the order of 2000 m3/s, even during the dry season. As a result the Mekong is a strongly riverine estuary. This paper aims to test if the theory can be applied to such a riverine multi-channel estuary, and to see if possible adjustments or generalisations need to be made. The paper presents salt intrusion measurements that were done by moving boat in 2005, to which the salt intrusion model was calibrated. The theory has been expanded to cater for tidal damping. Subsequently the model has been validated with observations made at fixed locations over the years 1998 and 1999. Finally it has been tested whether the Mekong calibration fits the overall predictive equations derived in other estuaries. The test has been successful and led to a slight adjustment of the predictive equation to cater for estuaries that experience a sloping bottom.

  9. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    Science.gov (United States)

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  10. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  11. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  12. Effects of heat-flow and hydrothermal fluids from volcanic intrusions on authigenic mineralization in sandstone formations

    Directory of Open Access Journals (Sweden)

    Wolela Ahmed

    2002-06-01

    Full Text Available Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar overgrowths. However, clay mineral-transformation, illite-smectite to illite and chlorite was documented near the volcanic intrusions. Abundant actinolite, illite, chlorite, albite and laumontite cementation of the sand grains were also documented near the volcanic intrusions. The abundance of these cementing minerals decreases away from the volcanic intrusions.In the Hartford Basin, USA, the emplacement of the volcanic intrusions took place simultaneous with sedimentation. The heat-flow from the volcanic intrusions and hydrothermal activity related to the volcanics modified the texture of authigenic minerals. Microcrystalline mosaic albite and quartz developed rather than overgrowths and crystals near the intrusions. Chlorite clumps and masses were also documented with microcrystalline mosaic albite and quartz. These features are localized near the basaltic intrusions. Laumontite is also documented near the volcanic intrusions. The reservoir characteristics of the studied sandstone formations are highly affected by the volcanic and hydrothermal fluids in the Hartford and the Ulster Basin. The porosity dropped from 27.4 to zero percent and permeability from 1350 mD to 1 mD.

  13. Rare earth mineralisation in the Cnoc nan Cuilean intrusion of the Loch Loyal Syenite Complex, northern Scotland

    Science.gov (United States)

    Walters, A. S.; Hughes, H. S. R.; Goodenough, K. M.; Gunn, A. G.; Lacinska, A.

    2012-04-01

    Due to growing global concerns about security of rare earth element (REE) supply, there is considerable interest in identifying new deposits and in understanding the processes responsible for their formation. Ongoing studies by BGS on potential indigenous resources have focused on the Caledonian alkaline intrusive complexes of north-west Scotland. The highest values of total rare earth oxide (TREO) have been found in the Cnoc nan Cuilean intrusion of the Loch Loyal Complex in Sutherland. The Loch Loyal Syenite Complex comprises three intrusions: Ben Loyal, Beinn Stumanadh and Cnoc nan Cuilean. The Cnoc nan Cuilean intrusion, which covers an area of about 3 km2, can be subdivided into two zones: a Mixed Syenite Zone (MSZ) and a later Massive Leucosyenite Zone (MLZ). Evidence from field mapping and 3D-modelling suggests that the melasyenites were passively emplaced to form a lopolith concordant with the Moine and Lewisian country rocks. A later episode of leucosyenitic magmatism caused mixing and mingling with the melasyenite forming the MSZ. Continued intrusion of leucosyenite melts then formed the MLZ [1]. The melasyenites are enriched in TREO relative to the leucosyenites with average values of 3800 ppm and 1400 ppm respectively. The highest contents, up to 20 000 ppm TREO, are found in narrow biotite-magnetite-rich veins identified in a single stream section near the eastern margin of the intrusion. All lithologies are light rare earth element (LREE) dominated with high concentrations of Ba and Sr and low levels of Nb and Ta. Various REE-bearing minerals are present but allanite is dominant, being present in all major magmatic lithologies and the biotite-magnetite veins. Three generations of allanite have been identified: a late-magmatic phase rimming apatite; allanite micro veinlets cross-cutting the syenite; and a third phase only observed in the biotite-magnetite veins. TREO concentrations of the different allanite generations are similar, averaging 22%. The

  14. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  15. Engineering evaluation of intrusion prevention strategies for single-shell tanks

    International Nuclear Information System (INIS)

    Jenkins, C.E.

    1994-01-01

    In this study, previously implemented actions to prevent liquid intrusion into out-of-service single-shell tanks (SSTs), i.e., interim isolation or partial interim isolation, are investigated and expanded to identify additional cost-effective intrusion prevention techniques that could be reasonably taken until SSTs are ready for waste retrieval. Possible precipitation, groundwater, and condensation pathways and internal tank connections that could provide possible pathways for liquids are examined. Techniques to block identified potential pathways are developed and costed to determine the potential benefit to costed trade-offs for implementing the techniques. (Note: Surveillance data show increased waste surface levels for several SSTs that indicate possible liquid intrusion despite interim isolation activities.)

  16. Identification of marine intrusion in the plain of Collo, northeastern Algeria

    Directory of Open Access Journals (Sweden)

    Saaidia Bachir

    2017-12-01

    Full Text Available The population increase, urbanization and intensification of agriculture and demands for water supply in the coastal plain of Collo led to excessive pumping of the unconfined aquifer with limited dimensions. This study aimed to characterize the effect of the overexploitation of the groundwater from the only unconfined aquifer in the region, what resulted in the inversion of the groundwater flow and the rise the possible seawater pollution that is shown in the water table map. The causes and effects of the saltwater intrusion were discussed. The interpretation of the electrical conductivity measurements, chloride and sodium maps have shown clearly the areas where values were the highest with tighter curves towards the sea, the wadis Guebli and Cherka. These values distribution indicated a marine source of salinity in wells and boreholes close to the sea and wadis.

  17. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  18. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  19. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    Science.gov (United States)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  20. Assessment of seawater intrusion and nitrate contamination on the groundwater quality in the Korba coastal plain of Cap-Bon (North-east of Tunisia)

    Science.gov (United States)

    Zghibi, Adel; Tarhouni, Jamila; Zouhri, Lahcen

    2013-11-01

    In recent years, seawater intrusion and nitrate contamination of groundwater have become a growing concern for people in rural areas in Tunisia where groundwater is always used as drinking water. The coastal plain of Korba (north-east of Tunisia) is a typical area where the contamination of the aquifer in the form of saltwater intrusion and high nitrate concentrations is very developed and represents the major consequence of human activities. The objective of this study is to evaluate groundwater resource level, to determine groundwater quality and to assess the risk of NO3- pollution in groundwater using hydrogeochemical tools. Groundwater were sampled and analyzed for physic-chemical parameters: Ca2+, Mg2+, Na+, K+, Cl-, SO42-, HCO3-, NO3-, Total Dissolved Solid and of the physical parameters (pH, electrical conductivity and the temperature). The interpretation of the analytical results is shown numerically and graphically through the ionic deviations, Piper Diagram, seawater fractions and binary diagrams. Moreover, electrical conductivity investigations have been used to identify the location of the major intrusion plumes in this coastal area and to obtain new information on the spatial scales and dynamics of the fresh water-seawater interface. Those processes can be used as indicators of seawater intrusion progression. First, the hydrogeochemical investigation of this aquifer reveals the major sources of contamination, represented by seawater intrusion. Thus, the intensive extraction of groundwater from aquifer reduces freshwater outflow to the sea, creates several drawdown cones and lowering of the water table to as much as 12 m below mean sea level in the center part of the study area especially between Diarr El Hojjej and Tafelloun villages, causing seawater migration inland and rising toward the wells. Moreover, the results of this study revealed the presence of direct cation exchange linked to seawater intrusion and dissolution processes associated with

  1. Dose and risk assessment for intrusion into mixed waste disposal sites

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Aaberg, R.L.

    1991-10-01

    Sites previously used for disposal of radioactive and hazardous chemical materials have resulted in situations that pose a potential threat to humans from inadvertent intrusion. An example generic scenario analysis was developed to demonstrate the evaluation of potential exposure to either cleanup workers or members of the public who intrude into buried waste containing both radioactive and hazardous chemical contaminants. The example scenarios consist of a collection of exposure routes (or pathways) with specific modeling assumptions for well-drilling and for excavation to construct buildings. These scenarios are used to describe conceptually some potential patterns of activity by non-protected human beings during intrusion into mixed-waste disposal sites. The dose from exposure to radioactive materials is calculated using the GENII software system and converted to risk by using factors from ICRP Publication 60. The hazard assessment for nonradioactive materials is performed using recent guidelines from the US Environmental Protection Agency (EPA). The example results are in the form of cancer risk for carcinogens and radiation exposure

  2. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  3. Features of Red Sea Water Masses

    KAUST Repository

    Kartadikaria, Aditya R.; Hoteit, Ibrahim

    2015-01-01

    by seasonal variability, fresh water intrusion of the Gulf of Aden Intermediate Water (GAIW), and eddies variability. Two types of mixing; isopycnal and diapycnal mixing are part of important physical phenomena that explain the change of water mass in the Red

  4. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  5. Multifidelity, Multidisciplinary Design Under Uncertainty with Non-Intrusive Polynomial Chaos

    Science.gov (United States)

    West, Thomas K., IV; Gumbert, Clyde

    2017-01-01

    The primary objective of this work is to develop an approach for multifidelity uncertainty quantification and to lay the framework for future design under uncertainty efforts. In this study, multifidelity is used to describe both the fidelity of the modeling of the physical systems, as well as the difference in the uncertainty in each of the models. For computational efficiency, a multifidelity surrogate modeling approach based on non-intrusive polynomial chaos using the point-collocation technique is developed for the treatment of both multifidelity modeling and multifidelity uncertainty modeling. Two stochastic model problems are used to demonstrate the developed methodologies: a transonic airfoil model and multidisciplinary aircraft analysis model. The results of both showed the multifidelity modeling approach was able to predict the output uncertainty predicted by the high-fidelity model as a significant reduction in computational cost.

  6. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  7. A correction for Dupuit-Forchheimer interface flow models of seawater intrusion in unconfined coastal aquifers

    Science.gov (United States)

    Koussis, Antonis D.; Mazi, Katerina; Riou, Fabien; Destouni, Georgia

    2015-06-01

    Interface flow models that use the Dupuit-Forchheimer (DF) approximation for assessing the freshwater lens and the seawater intrusion in coastal aquifers lack representation of the gap through which fresh groundwater discharges to the sea. In these models, the interface outcrops unrealistically at the same point as the free surface, is too shallow and intersects the aquifer base too far inland, thus overestimating an intruding seawater front. To correct this shortcoming of DF-type interface solutions for unconfined aquifers, we here adapt the outflow gap estimate of an analytical 2-D interface solution for infinitely thick aquifers to fit the 50%-salinity contour of variable-density solutions for finite-depth aquifers. We further improve the accuracy of the interface toe location predicted with depth-integrated DF interface solutions by ∼20% (relative to the 50%-salinity contour of variable-density solutions) by combining the outflow-gap adjusted aquifer depth at the sea with a transverse-dispersion adjusted density ratio (Pool and Carrera, 2011), appropriately modified for unconfined flow. The effectiveness of the combined correction is exemplified for two regional Mediterranean aquifers, the Israel Coastal and Nile Delta aquifers.

  8. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  9. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida

    OpenAIRE

    Zexuan Xu; Seth Willis Bassett; Bill Hu; Scott Barrett Dyer

    2016-01-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and travel...

  10. Vapor intrusion risk of lead scavengers 1,2-dibromoethane (EDB) and 1,2-dichloroethane (DCA).

    Science.gov (United States)

    Ma, Jie; Li, Haiyan; Spiese, Richard; Wilson, John; Yan, Guangxu; Guo, Shaohui

    2016-06-01

    Vapor intrusion of synthetic fuel additives represented a critical yet still neglected problem at sites impacted by petroleum fuel releases. This study used an advanced numerical model to simulate the vapor intrusion risk of lead scavengers 1,2-dibromoethane (ethylene dibromide, EDB) and 1,2-dichloroethane (DCA) under different site conditions. We found that simulated EDB and DCA indoor air concentrations can exceed USEPA screening level (4.7 × 10(-3) μg/m(3) for EDB and 1.1 × 10(-1) μg/m(3) for DCA) if the source concentration is high enough (is still within the concentration range found at leaking UST site). To evaluate the chance that vapor intrusion of EDB might exceed the USEPA screening levels for indoor air, the simulation results were compared to the distribution of EDB at leaking UST sites in the US. If there is no degradation of EDB or only abiotic degradation of EDB, from 15% to 37% of leaking UST sites might exceed the USEPA screening level. This study supports the statements made by USEPA in the Petroleum Vapor Intrusion (PVI) Guidance that the screening criteria for petroleum hydrocarbon may not provide sufficient protectiveness for fuel releases containing EDB and DCA. Based on a thorough literature review, we also compiled previous published data on the EDB and DCA groundwater source concentrations and their degradation rates. These data are valuable in evaluating EDB and DCA vapor intrusion risk. In addition, a set of refined attenuation factors based on site-specific information (e.g., soil types, source depths, and degradation rates) were provided for establishing site-specific screening criteria for EDB and DCA. Overall, this study points out that lead scavengers EDB and DCA may cause vapor intrusion problems. As more field data of EDB and DCA become available, we recommend that USEPA consider including these data in the existing PVI database and possibly revising the PVI Guidance as necessary. Copyright © 2016 Elsevier Ltd. All

  11. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  12. Synopsis Session III and IV 'Water and ion mobility, up-scaling and implementation in model approaches'

    International Nuclear Information System (INIS)

    2013-01-01

    The contributions of Session III 'Water and ion mobility' and Session IV 'Up-scaling and implementation in model approaches' were merged for the proceedings volume. The range of scales we are interested in starts at molecular scale (1-3 Angstrom) to crystal scale (3 Angstrom-2 nm) over particle scale with 2-200 nm dimension to the particle/macro-aggregate scale with 0.2-1500 μm. Methods available to study the particle scale concerning pore structure and connectivity which determines water mobility are under dry conditions N 2 adsorption and Hg intrusion, whereas under the hydrated state methods like X-Ray tomography and X-ray and neutron scattering are available. Going down in size molecular modeling, x-ray and neutron diffraction modeling and water adsorption gravimetry are inter alia available. There are resolution limits to the methods presented in session II (e.g. BIB-SEM) on pore characterization as e.g. the clay matrix characterization being only possible under a limited clay induration and pore throats being on the limit of resolution. These pore throats however are very important for as macroscopic phenomena observed. One methodological approach to bridge the gap between the molecular/crystal scale and the particle/macro-aggregate scale (FIB-SEM) is to use complementary techniques as cryo-NMR, N 2 and water ad-/desorption and TEM

  13. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  14. Ventilation of the Baltic Sea deep water: A brief review of present knowledge from observations and models

    Directory of Open Access Journals (Sweden)

    Hans Burchard

    2006-06-01

    Full Text Available The ventilation of the Baltic Sea deep wateris driven by either gale-forced barotropic or baroclinic salt water inflows.During the past two decades, the frequency of large barotropic inflows(mainly in winter has decreased and the frequency of medium-intensity baroclinic inflows(observed in summer has increased. As a result of entrainment of ambient oxygen-rich water,summer inflows are also important for the deep water ventilation.Recent process studies of salt water plumes suggest that the entrainmentrates are generally smaller than those predicted by earlier entrainment models.In addition to the entrance area, the Słupsk Sill andthe Słupsk Furrow are important locations for the transformation of water masses. Passing the Słupsk Furrow, both gravity-driven dense bottom flows and sub-surface cyclonic eddies,which are eroded laterally by thermohaline intrusions,ventilate the deep water of the eastern Gotland Basin.A recent study of the energy transfer from barotropic to baroclinicwave motion using a two-dimensional shallow water model suggests thatabout 30% of the energy needed below the halocline for deep water mixingis explained by the breaking of internal waves.In the deep water decade-long stagnation periods with decreasingoxygen and increasing hydrogen sulphide concentrations might be caused by anomalously largefreshwater inflows and anomalously high mean zonal wind speeds. In differentstudies the typical response time scale of average salinity was estimated tobe between approximately 20 and 30 years.The review summarizes recent research resultsand ends with a list of open questions and recommendations.

  15. Immiscibility of Fluid Phases at Magmatic-hydrothermal Transition: Formation of Various PGE-sulfide Mineralization for Layered Basic Intrusions

    Science.gov (United States)

    Zhitova, L.; Borisenko, A.; Morgunov, K.; Zhukova, I.

    2007-12-01

    Fluid inclusions in quartz of the Merensky Reef (Bushveld Complex, South Africa) and the Chineisky Pluton (Transbaikal Region, Russia) were studied using cryometry, microthermometry, Raman-spectroscopy, LA ICP- MS, scanning electronic microscopy, gas-chromatography and isotopic methods. This allowed us to document some examples of fluid phase separation resulting in formation of different types of PGE-sulfide mineralization for layered basic intrusions. The results obtained show at least three generations of fluid separated from boiling residual alumosilicate intercumulus liquid of the Merensky Reef. The earliest fluid phase composed of homogenous high-dense methane and nitrogen gas mixture was identified in primary gas and co-existing anomalous fluid inclusions from symplectitic quartz. The next generation, heterophase fluid, composed of brines containing a free low-dense (mostly of carbon dioxide) gas phase, was observed in primary multiphase and coexisting gas-rich inclusions of miarolitic quartz crystals. The latest generation was also a heterophase fluid (low salinity water-salt solution and free low-dense methane gas phase) found in primary water-salt and syngenetic gas inclusions from peripheral zones of miarolitic quartz crystals. For the Chineisky Pluton reduced endocontact magmatogene fluids changed to oxidized low salinity hydrothermal fluids in exocontact zone. This resulted in formation of sulfide-PGE enrichment marginal zones of intrusion. The results obtained give us a possibility to suggest that: 1) Fluid phase separation is a typical feature of magmatogene fluids for layered basic intrusions. 2) Reduced fluids can extract and transport substantial PGE and sulfide concentrations. 3) Oxidation of reduced fluids is one of the most important geochemical barriers causing abundant PGE minerals and sulfides precipitation. This in turn results in both formation of PGE reefs or enriched contact zones of layered basic intrusions. This work was supported by

  16. Identification of palaeo-seawater intrusion in groundwater using minor ions in a semi-confined aquifer of the Río de la Plata littoral (Argentina)

    Energy Technology Data Exchange (ETDEWEB)

    Santucci, L., E-mail: eleocarol@fcnym.unlp.edu.ar [Centro de Investigaciones Geológicas (CIG), Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) - Universidad Nacional de La Plata - UNLP, Calle 64 y Diag. 113, 1900 La Plata, Buenos Aires (Argentina); Carol, E. [Centro de Investigaciones Geológicas (CIG), Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) - Universidad Nacional de La Plata - UNLP, Calle 64 y Diag. 113, 1900 La Plata, Buenos Aires (Argentina); Kruse, E. [Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Cátedra de Hidrología General de la Facultad de Ciencias Naturales y Museo, Universidad Nacional de La Plata (UNLP), Calle 64 #3, 1900 La Plata, Buenos Aires (Argentina)

    2016-10-01

    The hydrochemistry of minor elements and traces such as bromide, lithium, strontium, uranium and selenium, together with the chemical analysis of major ions, has been used in the study of salinization process. This process occurs in a semi-confined aquifer that corresponds to a Pliocene–Pleistocene fluvial environment. The semi-confined aquifer is located in the littoral of the cities of Ensenada and Berisso, in the region of the middle Río de la Plata estuary, Argentina. Groundwater salinization was detected in the semi-confined aquifer in the coastal plain area, with salt contents that increase from the loess plain towards the river. The content of major ions that predominate in sea water (Cl{sup −}, Na{sup +} and Mg{sup 2+}), as well as the Cl{sup −}/Br{sup −} and U vs. Cl{sup −} ratios, demonstrates that such salinization is related to sea water, which shows no correspondence with estuary water. In the salinized area, Li, Sr and Se enrichments occur, and are used as tracers of the average time that a substance remains in solution in sea water in the aquifer. The study of such minor ions together with the geological evolution of the area made it possible to recognize that the salt water in the semi-confined aquifer corresponds to a palaeo-intrusion of sea water associated with the Pleistocene–Holocene ingressions caused by the climate changes occurring during the Quaternary. - Highlights: • The semi-confined aquifer in a sector of the Río de la Plata estuary is salinized. • Saline content is higher in the aquifer than in the estuary. • Minor elements indicate the occurrence of palaeo-seawater intrusion. • Palaeo-seawater intrusion may be associated with interglacial fluctuations.

  17. Identification of palaeo-seawater intrusion in groundwater using minor ions in a semi-confined aquifer of the Río de la Plata littoral (Argentina)

    International Nuclear Information System (INIS)

    Santucci, L.; Carol, E.; Kruse, E.

    2016-01-01

    The hydrochemistry of minor elements and traces such as bromide, lithium, strontium, uranium and selenium, together with the chemical analysis of major ions, has been used in the study of salinization process. This process occurs in a semi-confined aquifer that corresponds to a Pliocene–Pleistocene fluvial environment. The semi-confined aquifer is located in the littoral of the cities of Ensenada and Berisso, in the region of the middle Río de la Plata estuary, Argentina. Groundwater salinization was detected in the semi-confined aquifer in the coastal plain area, with salt contents that increase from the loess plain towards the river. The content of major ions that predominate in sea water (Cl"−, Na"+ and Mg"2"+), as well as the Cl"−/Br"− and U vs. Cl"− ratios, demonstrates that such salinization is related to sea water, which shows no correspondence with estuary water. In the salinized area, Li, Sr and Se enrichments occur, and are used as tracers of the average time that a substance remains in solution in sea water in the aquifer. The study of such minor ions together with the geological evolution of the area made it possible to recognize that the salt water in the semi-confined aquifer corresponds to a palaeo-intrusion of sea water associated with the Pleistocene–Holocene ingressions caused by the climate changes occurring during the Quaternary. - Highlights: • The semi-confined aquifer in a sector of the Río de la Plata estuary is salinized. • Saline content is higher in the aquifer than in the estuary. • Minor elements indicate the occurrence of palaeo-seawater intrusion. • Palaeo-seawater intrusion may be associated with interglacial fluctuations.

  18. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas

    2014-07-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  19. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas; Walter, Thomas R.; Ruch, Joel; Bonforte, Alessandro; Puglisi, Giuseppe

    2014-01-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  20. Strategies to combat salt water intrusion in coastal aquifers : A model-based exploratory analysis

    NARCIS (Netherlands)

    Kwakkel, J.H.; Slinger, J.H.

    2011-01-01

    Coastal communities dependent upon groundwater resources for drinking water and irrigation are vulnerable to salinization of the groundwater reserve. The increasing uncertainty associated with changing climatic conditions, population and economic development, and technological advances in

  1. Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks

    Science.gov (United States)

    Hortos, William S.

    2012-06-01

    In the author's previous work, a cross-layer protocol approach to wireless sensor network (WSN) intrusion detection an identification is created with multiple bio-inspired/evolutionary computational methods applied to the functions of the protocol layers, a single method to each layer, to improve the intrusion-detection performance of the protocol over that of one method applied to only a single layer's functions. The WSN cross-layer protocol design embeds GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layer, respectively. The construct neglects to assess the net effect of the combined bioinspired methods on the quality-of-service (QoS) performance for "normal" data streams, that is, streams without intrusions. Analytic expressions of throughput, delay, and jitter, coupled with simulation results for WSNs free of intrusion attacks, are the basis for sensitivity analyses of QoS metrics for normal traffic to the bio-inspired methods.

  2. Sediment Resuspension and Deposition on Seagrass Leaves Impedes Internal Plant Aeration and Promotes Phytotoxic H2S Intrusion.

    Science.gov (United States)

    Brodersen, Kasper E; Hammer, Kathrine J; Schrameyer, Verena; Floytrup, Anja; Rasheed, Michael A; Ralph, Peter J; Kühl, Michael; Pedersen, Ole

    2017-01-01

    HIGHLIGHTS: Sedimentation of fine sediment particles onto seagrass leaves severely hampers the plants' performance in both light and darkness, due to inadequate internal plant aeration and intrusion of phytotoxic H 2 S. Anthropogenic activities leading to sediment re-suspension can have adverse effects on adjacent seagrass meadows, owing to reduced light availability and the settling of suspended particles onto seagrass leaves potentially impeding gas exchange with the surrounding water. We used microsensors to determine O 2 fluxes and diffusive boundary layer (DBL) thickness on leaves of the seagrass Zostera muelleri with and without fine sediment particles, and combined these laboratory measurements with in situ microsensor measurements of tissue O 2 and H 2 S concentrations. Net photosynthesis rates in leaves with fine sediment particles were down to ~20% of controls without particles, and the compensation photon irradiance increased from a span of 20-53 to 109-145 μmol photons m -2 s -1 . An ~2.5-fold thicker DBL around leaves with fine sediment particles impeded O 2 influx into the leaves during darkness. In situ leaf meristematic O 2 concentrations of plants exposed to fine sediment particles were lower than in control plants and exhibited long time periods of complete meristematic anoxia during night-time. Insufficient internal aeration resulted in H 2 S intrusion into the leaf meristematic tissues when exposed to sediment resuspension even at relatively high night-time water-column O 2 concentrations. Fine sediment particles that settle on seagrass leaves thus negatively affect internal tissue aeration and thereby the plants' resilience against H 2 S intrusion.

  3. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  4. Study of 'inadvertent human intrusion or rare natural event scenarios' for sub-surface disposal of radioactive waste

    International Nuclear Information System (INIS)

    Nakatani, Takayoshi; Ishitoya, Kimihide; Funabashi, Hideyuki; Sugaya, Toshikatsu; Sone, Tomoyuki; Shimada, Hidemitsu; Nakai, Kunihiro

    2010-03-01

    Japan Atomic Energy Agency (JAEA) is making preparations for the sub-surface disposal of radioactive wastes, in an integrated fashion according to the properties of the waste material regardless of the generators or waste sources. In this study, 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' of 'Three Types scenarios' was considered according to the standard of the Atomic Energy Society of Japan (AESJ) on the sub-surface disposal system that was based on 'Basic Policy for Safety Regulation Concerning Land Disposal of Low-Level Radioactive Waste (Interim Report)' by Nuclear Safety Commission of Japan (NSC). Selection of the assessed scenarios, development of the assessment tool and preliminary exposure dose assessment for general public were conducted. Among the assessed scenarios, the exposure dose of 'well water drinking scenario' was the highest under the very conservative assessment condition. This scenario assumed that the groundwater in Excavation Disturbed Zone (EDZ) was directly used as drinking water without any dilution. Although this was very conservative condition and the result exceeded 10 mSv/y, it stayed under the upper limit of standard dose value for 'Inadvertent Human Intrusion or Rare Natural Event Scenarios' (10 - 100 mSv/y). (author)

  5. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  6. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  7. Stress distribution and displacement of maxillary anterior teeth during en-masse intrusion and retraction: A FEM study

    Directory of Open Access Journals (Sweden)

    Parag Bohara

    2017-01-01

    Full Text Available Background: Space closure by en masse intrusion and retraction in orthodontics is of particular interest. Aim: The aim of this study was to evaluate the stress distribution and displacement of maxillary anterior teeth. Materials and Methods: Four different finite element models of maxillary arch were constructed to understand the nature of stresses and displacement patterns of anterior teeth during en masse intrusion and retraction on force application with different combinations of mini-implants and retraction hooks. Results: In this study, tensile stresses were seen in the cervical region and various movements of teeth such as lingual crown tipping, bodily movement, lingual root tipping, intrusion, and extrusion were observed. Conclusion: Nature of stresses changes from tensile to compressive from cervical area to apical area. Various tooth displacements suggest that different combinations of mini-implants and retraction hooks affect the direction of the tooth movement.

  8. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  9. Criticality Potential of Waste Packages Containing DOE SNF Affected by Igneous Intrusion

    International Nuclear Information System (INIS)

    D.S. Kimball; C.E. Sanders

    2006-01-01

    The Department of Energy (DOE) is currently preparing an application to submit to the U.S. Nuclear Regulatory Commission for a construction authorization for a monitored geologic repository. The repository will contain spent nuclear fuel (SNF) and defense high-level waste (DHLW) in waste packages placed in underground tunnels, or drifts. The primary objective of this paper is to perform a criticality analysis for waste packages containing DOE SNF affected by a disruptive igneous intrusion event in the emplacement drifts. The waste packages feature one DOE SNF canister placed in the center and surrounded by five High-Level Waste (HLW) glass canisters. The effective neutron multiplication factor (k eff ) is determined for potential configurations of the waste package during and after an intrusive igneous event. Due to the complexity of the potential scenarios following an igneous intrusion, finding conservative and bounding configurations with respect to criticality requires some additional considerations. In particular, the geometry of a slumped and damaged waste package must be examined, drift conditions must be modeled over a range of parameters, and the chemical degradation of DOE SNF and waste package materials must be considered for the expected high temperatures. The secondary intent of this calculation is to present a method for selecting conservative and bounding configurations for a wide range of end conditions

  10. [Dynamic analysis of the rigid fixed bridge and related tissue after intrusion of abutment with micro screw implant].

    Science.gov (United States)

    Zhu, Lin; Xu, Pei-cheng; Lu, Liu-lei

    2013-08-01

    To study the variety of mechanical behavior of fixed bridge after abutments being intruded by micro screw implant and to provide theoretical principles for clinical practice of teeth preparation after intrusion of abutments under dynamic loads. Two-dimensional images of maxilla, teeth and supporting tissues of healthy people were scanned by spiral CT and were synthesized by Mimics10.01, Ansys13.0, etc. The three-dimensional finite element mathematical model of rigid fixed bridge repairing on double end of maxillary molar was developed. Under the condition of 10% simulative abutment alveolar absorption, vertical and oblique dynamic forces were applied in a circle of mastication(0.875 s) to build mathematical model after the abutment had been intruded for 0.5, 1.0, 1.5 and 2.0 mm. Stress variety of prosthesis, teeth, periodontal ligaments and supporting tissues were compared before and after intrusion of abutments. Stress variety of the prosthesis occurred, which had close relationship with the structure of prosthesis and teeth, the areas of periodontal ligaments increased, stress on the whole decreased along with the increase of the length of intrusion. With time accumulating, the stress value in prosthesis, teeth, periodontal ligaments and supporting tissues increased gradually and loads in oblique direction induced peak value stress in a masticatory cycle. Some residual stress left after unloading. By preparing the fixed bridge after abutment intrusion by micro screw implant, the service life of abutment and fixed bridge prosthesis can be reduced. The abutment and its related tissue have time-dependent mechanical behaviors during one mastication. The influence of oblique force on stress was greater than vertical force. There is some residual stress left after one mastication period. With the increase of the intrusion on abutment, residual stress reduced.

  11. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    Science.gov (United States)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  12. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    Science.gov (United States)

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  13. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  14. Check valve slam caused by air intrusion in emergency cooling water system

    International Nuclear Information System (INIS)

    Martin, C.S.

    2011-01-01

    Waterhammer pressures were experienced during periodic starting of Residual Heat Removal (RHR) pumps at a nuclear plant. Prior to an analytical investigation careful analysis performed by plant engineers indicated that the spring effect of entrapped air in a heat exchanger resulted in water hammer due to check valve slam following flow reversal. In order to determine in more detail the values of pertinent parameters controlling this water hammer a hydraulic transient analysis was performed of the RHR piping system, including essential elements such as the pump, check valve, and heat exchanger. Using characteristic torque and pressure loss curves the motion of the check valve was determined. By comparing output of the water hammer analysis with site recordings of pump discharge pressure the computer model was calibrated, allowing for a realistic estimate of the quantity of entrapped air in the heat exchanger. (author)

  15. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  16. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  17. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    Science.gov (United States)

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  18. Dynamics of large-diameter water pipes in hydroelectric power plants

    Science.gov (United States)

    Pavić, G.; Chevillotte, F.; Heraud, J.

    2017-04-01

    An outline is made of physical behaviour of water - filled large pipes. The fluid-wall coupling, the key factor governing the pipe dynamics, is discussed in some detail. Different circumferential pipe modes and the associated cut-on frequencies are addressed from a theoretical as well as practical point of view. Major attention is paid to the breathing mode in view of its importance regarding main dynamic phenomena, such as water hammer. Selected measurement results done at EDF are presented to demonstrate how an external, non-intrusive sensor can detect pressure pulsations of the breathing mode in a pressure pipe. Differences in the pressure measurement using intrusive and non-intrusive sensors reveal the full complexity of large-diameter pipe dynamics.

  19. Intrusion detection techniques for plant-wide network in a nuclear power plant

    International Nuclear Information System (INIS)

    Rajasekhar, P.; Shrikhande, S.V.; Biswas, B.B.; Patil, R.K.

    2012-01-01

    Nuclear power plants have a lot of critical data to be sent to the operator workstations. A plant wide integrated communication network, with high throughput, determinism and redundancy, is required between the workstations and the field. Switched Ethernet network is a promising prospect for such an integrated communication network. But for such an integrated system, intrusion is a major issue. Hence the network should have an intrusion detection system to make the network data secure and enhance the network availability. Intrusion detection is the process of monitoring the events occurring in a network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of network security policies, acceptable user policies, or standard security practices. This paper states the various intrusion detection techniques and approaches which are applicable for analysis of a plant wide network. (author)

  20. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  1. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  2. Waters Without Borders: Scarcity and the Future of State Interactions over Shared Water Resources

    Science.gov (United States)

    2010-04-01

    earth’s water is fresh water , stored in rivers, lakes, reservoirs, glaciers, permanent snow, groundwater aquifers, and the atmosphere. 10 This... freshwater resources between and within countries. 13 There is significant media attention given to intra-state water sharing issues. One...intrusion into coastal ground freshwater sources, among other effects. Consequently, water scarcity brought about by climate change could drive

  3. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  4. Modeling the Effects of Storm Surge from Hurricane Jeanne on Saltwater Intrusion into the Surficial Aquifer, East-Central Florida (USA)

    Science.gov (United States)

    Xiao, H.; Wang, D.; Hagen, S. C.; Medeiros, S. C.; Hall, C. R.

    2017-12-01

    Saltwater intrusion (SWI) that has been widely recognized as a detrimental issue causing the deterioration of coastal aquifer water quality and degradation of coastal ecosystems. While it is widely recognized that SWI is exacerbated worldwide due to global sea-level rise, we show that increased SWI from tropical cyclones under climate change is also a concern. In the Cape Canaveral Barrier Island Complex (CCBIC) located in east-central Florida, the salinity level of the surficial aquifer is of great importance to maintain a bio-diverse ecosystem and to support the survival of various vegetation species. Climate change induced SWI into the surficial aquifer can lead to reduction of freshwater storage and alteration of the distribution and productivity of vegetation communities. In this study, a three-dimensional variable-density SEAWAT model is developed and calibrated to investigate the spatial and temporal variation of salinity level in the surficial aquifer of CCBIC. We link the SEAWAT model to surge model data to examine the effects of storm surge from Hurricane Jeanne. Simulation results indicate that the surficial aquifer salinity level increases significantly right after the occurrence of storm surge because of high aquifer permeability and rapid infiltration and diffusion of the overtopping saltwater, while the surficial aquifer salinity level begins to decrease after the fresh groundwater recharge from the storm's rainfall. The tropical storm precipitation generates an effective hydraulic barrier further impeding SWI and providing seaward freshwater discharge for saltwater dilution and flushing. To counteract the catastrophic effects of storm surge, this natural remediation process may take at least 15-20 years or even several decades. These simulation results contribute to ongoing research focusing on forecasting regional vegetation community responses to climate change, and are expected to provide a useful reference for climate change adaptation planning

  5. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  7. Seasonal fluctuations of ichthyoplankton assemblage in the northeastern South China Sea influenced by the Kuroshio intrusion

    Science.gov (United States)

    Huang, Delian; Zhang, Xia; Jiang, Zhijian; Zhang, Jingping; Arbi, Iman; Jiang, Xin; Huang, Xiaoping; Zhang, Wenjing

    2017-09-01

    The distribution and assemblage of ichthyoplankton related to local hydrographic features, especially intrusion of the Kuroshio Current (KC) and Guangdong Coastal Current (GCC) in the northeastern South China Sea (NESCS) were investigated in this study. A total of 193 species of ichthyoplankton belonging to 141 genera and 66 families were recognized in summer 2015 and late-winter 2016. The ichthyoplankton assemblage was identified with distinct seasonal differences, and the differences were responded well with the oceanography conditions. In summer, the assemblages were identified into offshore and inshore groups, as controlled by the South China Sea Warm Current (SCSWC) in off-shelf, upwelling, and the diluted water from the Pearl River in inshore. In winter, three groups were divided, representing the southwestern inshore, intrusion of the KC in the eastern offshore, and the GCC in the northern inshore area, respectively. Furthermore, Sigmops gracilis and Vinciguerria sp.3 were probably brought into the NESCS by intrusion of the KC from the eastern Luzon Strait. In addition, high ichthyoplankton abundance was found in high chlorophyll a located in upwelling areas in the northern coastal area in summer and in the southwestern Taiwan Bank in winter, respectively. The nutrition outcropped by the upwelling together, and those brought from the Pearl River probably supported high food availability of the ichthyoplankton in the northern coast of the NESCS.

  8. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  9. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  10. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  11. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  12. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  13. A 5-year follow-up case of multiple intrusive luxative injuries

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2012-01-01

    Full Text Available Introduction: Traumatic intrusive luxation is one of the most severe forms of dental injuries, usually affecting the maxillary incisors. The consequence of such an occurrence is a high risk of healing complications such as pulp necrosis, external inflammatory resorption, and external replacement resorption (ankylosis. Case Report: This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 5 years. Discussion: Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 5 years, no clinical or radiographic pathology was detected.

  14. Non-intrusive measurement of tritium activity in waste drums by modelling a 3He leak quantified by mass spectrometry

    International Nuclear Information System (INIS)

    Demange, D.

    2002-01-01

    This study deals with a new method that makes it possible to measure very low tritium quantities inside radioactive waste drums. This indirect method is based on measuring the decaying product, 3 He, and requires a study of its behaviour inside the drum. Our model considers 3 He as totally free and its leak through the polymeric joint of the drum as two distinct phenomena: permeation and laminar flow. The numerical simulations show that a pseudo-stationary state takes place. Thus, the 3 He leak corresponds to the tritium activity inside the drum but it appears, however, that the leak peaks when the atmospheric pressure variations induce an overpressure in the drum. Nevertheless, the confinement of a drum in a tight chamber makes it possible to quantify the 3 He leak. This is a non-intrusive measurement of its activity, which was experimentally checked by using reduced models, representing the drum and its confinement chamber. The drum's confinement was optimised to obtain a reproducible 3 He leak measurement. The gaseous samples taken from the chamber were purified using selective adsorption onto activated charcoals at 77 K to remove the tritium and pre-concentrate the 3 He. The samples were measured using a leak detector mass spectrometer. The adaptation of the signal acquisition and the optimisation of the analysis parameters made it possible to reach the stability of the external calibrations using standard gases with a 3 He detection limit of 0.05 ppb. Repeated confinement of the reference drums demonstrated the accuracy of this method. The uncertainty of this non-intrusive measurement of the tritium activity in 200-liter drums is 15% and the detection limit is about 1 GBq after a 24 h confinement. These results led to the definition of an automated tool able to systematically measure the tritium activity of all storage waste drums. (authors)

  15. Long-term pumping test to study the impact of an open-loop geothermal system on seawater intrusion in a coastal aquifer: the case study of Bari (Southern Italy)

    Science.gov (United States)

    Clementina Caputo, Maria; Masciale, Rita; Masciopinto, Costantino; De Carlo, Lorenzo

    2016-04-01

    The high cost and scarcity of fossil fuels have promoted the increased use of natural heat for a number of direct applications. Just as for fossil fuels, the exploitation of geothermal energy should consider its environmental impact and sustainability. Particular attention deserves the so-called open loop geothermal groundwater heat pump (GWHP) system, which uses groundwater as geothermal fluid. From an economic point of view, the implementation of this kind of geothermal system is particularly attractive in coastal areas, which have generally shallow aquifers. Anyway the potential problem of seawater intrusion has led to laws that restrict the use of groundwater. The scarcity of freshwater could be a major impediment for the utilization of geothermal resources. In this study a new methodology has been proposed. It was based on an experimental approach to characterize a coastal area in order to exploit the low-enthalpy geothermal resource. The coastal karst and fractured aquifer near Bari, in Southern Italy, was selected for this purpose. For the purpose of investigating the influence of an open-loop GWHP system on the seawater intrusion, a long-term pumping test was performed. The test simulated the effects of a prolonged withdrawal on the chemical-physical groundwater characteristics of the studied aquifer portion. The duration of the test was programmed in 16 days, and it was performed with a constant pumping flowrate of 50 m3/h. The extracted water was outflowed into an adjacent artificial channel, by means of a piping system. Water depth, temperature and electrical conductivity of the pumped water were monitored for 37 days, including also some days before and after the pumping duration. The monitored parameters, collected in the pumping and in five observation wells placed 160 m down-gradient with respect to the groundwater flow direction, have been used to estimate different scenarios of the impact of the GWHP system on the seawater intrusion by mean of a

  16. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  17. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  18. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  19. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K.; Heland, J. [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R. [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M. [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G. [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D.H. [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P. [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M. [University of Reading (United Kingdom). Dept. of Physics

    1997-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  20. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K; Heland, J [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D H [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M [University of Reading (United Kingdom). Dept. of Physics

    1998-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  1. Non-intrusive uncertainty quantification in structural-acoustic systems using polynomial chaos expansion method

    Directory of Open Access Journals (Sweden)

    Wang Mingjie

    2017-01-01

    Full Text Available A framework of non-intrusive polynomial chaos expansion method (PC was proposed to investigate the statistic characteristics of the response of structural-acoustic system containing random uncertainty. The PC method does not need to reformulate model equations, and the statistics of the response can be evaluated directly. The results show that compared to the direct Monte Carlo method (MCM based on the original numerical model, the PC method is effective and more efficient.

  2. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  3. Effects of sea-level rise and pumpage elimination on saltwater intrusion in the Hilton Head Island area, South Carolina, 2004-2104

    Science.gov (United States)

    Payne, Dorothy F.

    2010-01-01

    Saltwater intrusion of the Upper Floridan aquifer has been observed in the Hilton Head area, South Carolina since the late 1970s and currently affects freshwater supply. Rising sea level in the Hilton Head Island area may contribute to the occurrence of and affect the rate of saltwater intrusion into the Upper Floridan aquifer by increasing the hydraulic gradient and by inundating an increasing area with saltwater, which may then migrate downward into geologic units that presently contain freshwater. Rising sea level may offset any beneficial results from reductions in groundwater pumpage, and thus needs to be considered in groundwater-management decisions. A variable-density groundwater flow and transport model was modified from a previously existing model to simulate the effects of sea-level rise in the Hilton Head Island area. Specifically, the model was used to (1) simulate trends of saltwater intrusion from predevelopment to the present day (1885-2004) and evaluate the conceptual model, (2) project these trends from the present day into the future based on different potential rates of sea-level change, and (3) evaluate the relative influences of pumpage and sea-level rise on saltwater intrusion. Four scenarios were simulated for 2004-2104: (1) continuation of the estimated sea-level rise rate over the last century, (2) a doubling of the sea-level rise, (3) a cessation of sea-level rise, and (4) continuation of the rate over the last century coupled with an elimination of all pumpage. Results show that, if present-day (year 2004) pumping conditions are maintained, the extent of saltwater in the Upper Floridan aquifer will increase, whether or not sea level continues to rise. Furthermore, if all pumpage is eliminated and sea level continues to rise, the simulated saltwater extent in the Upper Floridan aquifer is reduced. These results indicate that pumpage is a strong driving force for simulated saltwater intrusion, more so than sea-level rise at current rates

  4. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  5. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  6. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  7. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  8. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  9. Effects of labial and lingual retraction and intrusion force on maxillary central incisor with varying collum angles: A three-dimensional finite elemental analysis

    Directory of Open Access Journals (Sweden)

    Sandesh S Pai

    2017-01-01

    Full Text Available Aims: This study aims to analyze the effects of intrusive force, retraction force, and torque control on the maxillary central incisors with varying degrees of collum angle in labial and lingual orthodontic treatment procedures using finite element analysis. Subjects and Methods: Four pairs of three-dimensional finite element models (FEMs representative of maxillary central incisor with periodontal ligament (PDL and alveolar bone were constructed using ANSYS software (version 5.4, ANSYS Inc., Canonsburg, PA, USA. The models with 0°, 5°, 10°, and 15° were created based on crown root angulation. Four models for labial and four models for lingual orthodontic procedure were constructed. Each model was subjected to three forces, i.e., retraction force of 1 N, lingual root torque of −5 × 10−3 N and intrusive force of 0.64 N on crown with labially and lingually positioned brackets. Principal stress and strain, center of rotation and root apex displacement were monitored. Statistical Analysis Used: Not required (FEM study. Results: With the increase in collum angle, the stress-strain distribution in PDL was increased in both labial orthodontics (LaO and lingual orthodontics (LiO. Stress-strain distribution in the PDL with LiO was more in all the models as compared to LaO. There was more of tipping movement as collum angle increased from 0° to 15° in both LaO and LiO. The amount of intrusion reduced as the collum angle increased in both the systems. However, more of intrusion was seen in LaO. With increase in collum angle, the center of rotation moved cervically in both the systems. Conclusions: From the present study, we conclude that as the collum angle increased, the stress-strain distribution increased in LaO and LiO. The center of rotation shifted cervically, and the intrusion decreased when collum angle increased. The values were more marked in LiO.

  10. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  11. Three-dimensional vapor intrusion modeling approach that combines wind and stack effects on indoor, atmospheric, and subsurface domains.

    Science.gov (United States)

    Shirazi, Elham; Pennell, Kelly G

    2017-12-13

    Vapor intrusion (IV) exposure risks are difficult to characterize due to the role of atmospheric, building and subsurface processes. This study presents a three-dimensional VI model that extends the common subsurface fate and transport equations to incorporate wind and stack effects on indoor air pressure, building air exchange rate (AER) and indoor contaminant concentration to improve VI exposure risk estimates. The model incorporates three modeling programs: (1) COMSOL Multiphysics to model subsurface fate and transport processes, (2) CFD0 to model atmospheric air flow around the building, and (3) CONTAM to model indoor air quality. The combined VI model predicts AER values, zonal indoor air pressures and zonal indoor air contaminant concentrations as a function of wind speed, wind direction and outdoor and indoor temperature. Steady state modeling results for a single-story building with a basement demonstrate that wind speed, wind direction and opening locations in a building play important roles in changing the AER, indoor air pressure, and indoor air contaminant concentration. Calculated indoor air pressures ranged from approximately -10 Pa to +4 Pa depending on weather conditions and building characteristics. AER values, mass entry rates and indoor air concentrations vary depending on weather conditions and building characteristics. The presented modeling approach can be used to investigate the relationship between building features, AER, building pressures, soil gas concentrations, indoor air concentrations and VI exposure risks.

  12. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  13. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  14. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    Science.gov (United States)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  15. Sediment Resuspension and Deposition on Seagrass Leaves Impedes Internal Plant Aeration and Promotes Phytotoxic H2S Intrusion

    Directory of Open Access Journals (Sweden)

    Kasper E. Brodersen

    2017-05-01

    Full Text Available HIGHLIGHTS:Sedimentation of fine sediment particles onto seagrass leaves severely hampers the plants' performance in both light and darkness, due to inadequate internal plant aeration and intrusion of phytotoxic H2S.Anthropogenic activities leading to sediment re-suspension can have adverse effects on adjacent seagrass meadows, owing to reduced light availability and the settling of suspended particles onto seagrass leaves potentially impeding gas exchange with the surrounding water. We used microsensors to determine O2 fluxes and diffusive boundary layer (DBL thickness on leaves of the seagrass Zostera muelleri with and without fine sediment particles, and combined these laboratory measurements with in situ microsensor measurements of tissue O2 and H2S concentrations. Net photosynthesis rates in leaves with fine sediment particles were down to ~20% of controls without particles, and the compensation photon irradiance increased from a span of 20–53 to 109–145 μmol photons m−2 s−1. An ~2.5-fold thicker DBL around leaves with fine sediment particles impeded O2 influx into the leaves during darkness. In situ leaf meristematic O2 concentrations of plants exposed to fine sediment particles were lower than in control plants and exhibited long time periods of complete meristematic anoxia during night-time. Insufficient internal aeration resulted in H2S intrusion into the leaf meristematic tissues when exposed to sediment resuspension even at relatively high night-time water-column O2 concentrations. Fine sediment particles that settle on seagrass leaves thus negatively affect internal tissue aeration and thereby the plants' resilience against H2S intrusion.

  16. Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for

  17. Impacts of seawater rise on seawater intrusion in the Nile Delta Aquifer, Egypt.

    Science.gov (United States)

    Sefelnasr, Ahmed; Sherif, Mohsen

    2014-01-01

    Several investigations have recently considered the possible impacts of climate change and seawater level rise on seawater intrusion in coastal aquifers. All have revealed the severity of the problem and the significance of the landward movement of the dispersion zone under the condition of seawater level rise. Most of the studies did not consider the possible effects of the seawater rise on the inland movement of the shoreline and the associate changes in the boundary conditions at the seaside and the domain geometry. Such effects become more evident in flat, low land, coastal alluvial plans where large areas might be submerged with seawater under a relatively small increase in the seawater level. None of the studies combined the effect of increased groundwater pumping, due to the possible decline in precipitation and shortage in surface water resources, with the expected landward shift of the shore line. In this article, the possible effects of seawater level rise in the Mediterranean Sea on the seawater intrusion problem in the Nile Delta Aquifer are investigated using FEFLOW. The simulations are conducted in horizontal view while considering the effect of the shoreline landward shift using digital elevation models. In addition to the basic run (current conditions), six different scenarios are considered. Scenarios one, two, and three assume a 0.5 m seawater rise while the total pumping is reduced by 50%, maintained as per the current conditions and doubled, respectively. Scenarios four, five, and six assume a 1.0 m seawater rise and the total pumping is changed as in the first three scenarios. The shoreline is moved to account for the seawater rise and hence the study domain and the seaside boundary are modified accordingly. It is concluded that, large areas in the coastal zone of the Nile Delta will be submerged by seawater and the coast line will shift landward by several kilometers in the eastern and western sides of the Delta. Scenario six represents

  18. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  19. Evaluating the effects of consolidation on intrusion and retraction using temporary anchorage devices—a FEM study

    Directory of Open Access Journals (Sweden)

    Monica Namburi

    2017-01-01

    Full Text Available Abstract Background Extraction of premolars and retracting the anterior teeth using mini-implants and anterior retraction hooks became advent now a day. In such treatments, consolidation of arches is not done in regular practice. So, the present study is concentrated on effects of consolidation in two implant and three implant combinations of retraction and intrusion. Methods A three-dimensional FEM model of maxillary teeth and periodontal ligament housed in the alveolar bone with the first premolars extracted is generated with appropriate number of elements and nodes. The models were broadly divided into two groups according to the no. of implants. Mini-implants were placed bilaterally between the second premolar and molar at varying heights (7, 10, 13 mm in group I, and along with bilateral implants, an additional mid-implant is placed between the central incisors as group II. Brackets with 0.022 slot were placed on the teeth, 19 × 25 SS wire is placed in the brackets, an anterior retraction hook was placed at 9 mm height, and analysis was done to evaluate the stresses and displacement patterns in consolidation and non-consolidation models. Results The results showed that consolidation of the anterior teeth during intrusion and retraction shows various advantages such as less stresses on the bone, PDL, implant, teeth, and no labial flaring of the anterior teeth and three implant system, i.e., two bilateral implant at 10 mm and a mid-implant at 12 mm between the centrals has shown to be better than other models as bodily movement is observed. Conclusion Consolidation is better than non consolidation during enmasse retraction and intrusion.

  20. Modelling the impact of rural land use scenarios on water management: a FREEWAT approach to the Bakumivka catchment case study, Ukraine

    Directory of Open Access Journals (Sweden)

    Mykhailo Grodzynskyi

    2017-09-01

    Full Text Available The Bakumivka River’s catchment, Ukraine serves as a case study to the application of FREEWAT to the ground and surface water management. The main objective of the study is to find out the optimal spatial distribution of the water supplied to the farms by modifying the land cover pattern of the catchment. An integrated numerical model was developed to provide quantitative estimates of the water budget components. The model includes four model layers, representing the main hydrostratigraphic units, different types of boundary conditions assigned along the area’s boundaries, major components of the water balance introduced through source and sink layers. It was implemented through the FREEWAT software. Three water management scenarios were developed in order to compare different spatial patterns of land cover and distribution of water within the Bakumivka River’s basin. The scenarios represent continuum from market oriented pattern to environmentally sounding pattern of land cover. The objective of the modeling exercise is to obtain mass balances and maps representing three scenarios of water management. Each map shows distribution of the areas where the water balance is optimal, insufficient (dry or excessive (wet for vegetation (land cover of particular type.The simulation shows that changing spatial land cover pattern is an effective measure to reduce water supply to the farms, however it does not prevent water logging in the areas adjacent to the flood plains and drying on summer stress periods in lands of sandyloam soils. Irrigation should be excluded in the areas with sandy and sandyloam soils. The flood plain with peat bogs despite the high water head in spring and late summer stress periods should be irrigated to prevent peat fires. The intrusion of eco-corridors to the land cover pattern in the catchment is positive from ecological perspective, but could prevent drainage causing water logging in the arable lands.

  1. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  2. Protecting coastal abstraction boreholes from seawater intrusion using self-potential data

    Science.gov (United States)

    Graham, Malcolm; Butler, Adrian; MacAllister, Donald John; Vinogradov, Jan; Ijioma, Amadi; Jackson, Matthew

    2016-04-01

    We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within coastal groundwater boreholes, with a view to using SP monitoring as part of an early warning system for saline intrusion. SP data were collected over a period of 18 months from a coastal groundwater borehole in the fractured Chalk of England. Spectral analysis of the results shows semi-diurnal fluctuations that are several orders of magnitude higher than those observed from monitoring of the Chalk more than 60 km inland, indicating a strong influence from oceanic tides. Hydrodynamic and geoelectric modelling of the coastal aquifer suggests that observed pressure changes (giving rise to the streaming potential) are not sufficient to explain the magnitude of the observed SP fluctuations. Simulation of the exclusion-diffusion potential, produced by changes in concentration across the saline front, is required to match the SP data from the borehole, despite the front being located some distance away. In late summer of 2013 and 2014, seawater intrusion occurred in the coastal monitoring borehole. When referenced to the shallowest borehole electrode, there was a characteristic increase in SP within the array, several days before any measurable increase in salinity. The size of this precursor increased steadily with depth, typically reaching values close to 0.3 mV in the deepest electrode. Numerical modelling suggests that the exclusion-diffusion potential can explain the magnitude of the precursor, but that the polarity of the change in SP cannot be replicated assuming a homogeneous aquifer. Small-scale models of idealised Chalk blocks were used to simulate the effects of discrete fractures on the distribution of SP. Initial results suggest that comparatively large reductions in voltage can develop in the matrix ahead of the front, in conjunction with a reduced or absent precursor in the vicinity of a fracture. Geophysical logging indicates the presence of a

  3. Simulation-optimization aids in resolving water conflict: Temecula Basin, Southern California

    Science.gov (United States)

    Hanson, Randall T.; Faunt, Claudia C.; Schmid, Wolfgang; Lear, Jonathan

    2014-01-01

    The productive agricultural areas of Pajaro Valley, California have exclusively relied on ground water from coastal aquifers in central Monterey Bay. As part of the Basin Management Plan (BMP), the Pajaro Valley Water Management Agency (PVWMA) is developing additional local supplies to replace coastal pumpage, which is causing seawater intrusion. The BMP includes an aquifer storage and recovery (ASR) system, which captures and stores local winter runoff, and supplies it to growers later in the growing season in lieu of ground-water pumpage. A Coastal Distribution System (CDS) distributes water from the ASR and other supplemental sources. A detailed model of the Pajaro Valley is being used to simulate the coupled supply and demand components of irrigated agriculture from 1963 to 2006. Recent upgrades to the Farm Process in MODFLOW (MF2K-FMP) allow simulating the effects of ASR deliveries and reduced pumping for farms in subregions connected to the CDS. The BMP includes a hierarchy of monthly supply alternatives, including a recovery well field around the ASR system, a supplemental wellfield, and onsite farm supply wells. The hierarchy of delivery requirements is used by MF2K-FMP to estimate the effects of these deliveries on coastal ground-water pumpage and recovery of water levels. This integrated approach can be used to assess the effectiveness of the BMP under variable climatic conditions, and to test the impacts of more complete subscription by coastal farmers to the CDS deliveries. The model will help managers assess the effects of new BMP components to further reduce pumpage and seawater intrusion.

  4. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. The Mesozoic-Cenozoic igneous intrusions and related sediment-dominated hydrothermal activities in the South Yellow Sea Basin, the Western Pacific continental margin

    Science.gov (United States)

    Yumao, Pang; Xunhua, Zhang; Guolin, Xiao; Luning, Shang; Xingwei, Guo; Zhenhe, Wen

    2018-04-01

    Various igneous complexes were identified in multi-channel seismic reflection profiles from the South Yellow Sea Basin. It is not rare that magmatic intrusions in sedimentary basins cause strong thermal perturbations and hydrothermal activities. Some intrusion-related hydrothermal vent complexes have been identified and they are considered to originate from the deep sedimentary contact aureole around igneous intrusions and terminate in upper vents structures, and are linked by a vertical conduit system. The upper vent complexes are usually eye-shaped, dome-shaped, fault-related, crater-shaped or pock-shaped in seismic profiles. A schematic model was proposed to illustrate the structures of different types of hydrothermal vent complexes. A conceptual conduit model composed of an upper pipe-like part and a lower branching part was also derived. Hydrothermal vent complexes mainly developed during the Middle-Late Cretaceous, which is coeval with, or shortly after the intrusion. The back-arc basin evolution of the area which is related to the subduction of the Paleo-Pacific plate during the Mesozoic-Cenozoic may be the principal factor for voluminous igneous complexes and vent complexes in this area. It is significant to study the characteristics of igneous complexes and related hydrothermal vent complexes, which will have implications for the future study of this area.

  6. Ensemble regression model-based anomaly detection for cyber-physical intrusion detection in smart grids

    DEFF Research Database (Denmark)

    Kosek, Anna Magdalena; Gehrke, Oliver

    2016-01-01

    The shift from centralised large production to distributed energy production has several consequences for current power system operation. The replacement of large power plants by growing numbers of distributed energy resources (DERs) increases the dependency of the power system on small scale......, distributed production. Many of these DERs can be accessed and controlled remotely, posing a cybersecurity risk. This paper investigates an intrusion detection system which evaluates the DER operation in order to discover unauthorized control actions. The proposed anomaly detection method is based...

  7. An Excel®-based visualization tool of 2-D soil gas concentration profiles in petroleum vapor intrusion.

    Science.gov (United States)

    Verginelli, Iason; Yao, Yijun; Suuberg, Eric M

    2016-01-01

    In this study we present a petroleum vapor intrusion tool implemented in Microsoft ® Excel ® using Visual Basic for Applications (VBA) and integrated within a graphical interface. The latter helps users easily visualize two-dimensional soil gas concentration profiles and indoor concentrations as a function of site-specific conditions such as source strength and depth, biodegradation reaction rate constant, soil characteristics and building features. This tool is based on a two-dimensional explicit analytical model that combines steady-state diffusion-dominated vapor transport in a homogeneous soil with a piecewise first-order aerobic biodegradation model, in which rate is limited by oxygen availability. As recommended in the recently released United States Environmental Protection Agency's final Petroleum Vapor Intrusion guidance, a sensitivity analysis and a simplified Monte Carlo uncertainty analysis are also included in the spreadsheet.

  8. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  9. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  10. Nonexplosive and explosive magma/wet-sediment interaction during emplacement of Eocene intrusions into Cretaceous to Eocene strata, Trans-Pecos igneous province, West Texas

    Science.gov (United States)

    Befus, K.S.; Hanson, R.E.; Miggins, D.P.; Breyer, J.A.; Busbey, A.B.

    2009-01-01

    Trans-Pecos Texas may be an important locale for the study of subvolcanic phreatomagmatic processes and associated phenomena. Eocene intrusions in the study area underwent complex interactions with wet sediment at shallow levels beneath the surface in strata as old as Maastrichtian, which must have remained unlithified and rich in pore water for ~ 20-25??Ma. ?? 2009 Elsevier B.V. All rights reserved.

  11. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  12. Lunar floor-fractured craters as magmatic intrusions: Geometry, modes of emplacement, associated tectonic and volcanic features, and implications for gravity anomalies

    Science.gov (United States)

    Jozwiak, Lauren M.; Head, James W.; Wilson, Lionel

    2015-03-01

    Lunar floor-fractured craters are a class of 170 lunar craters with anomalously shallow, fractured floors. Two end-member processes have been proposed for the floor formation: viscous relaxation, and subcrater magmatic intrusion and sill formation. Recent morphometric analysis with new Lunar Reconnaissance Orbiter Laser Altimeter (LOLA) and image (LROC) data supports an origin related to shallow magmatic intrusion and uplift. We find that the distribution and characteristics of the FFC population correlates strongly with crustal thickness and the predicted frequency distribution of overpressurization values of magmatic dikes. For a typical nearside lunar crustal thickness, dikes with high overpressurization values favor surface effusive eruptions, medium values favor intrusion and sill formation, and low values favor formation of solidified dikes concentrated lower in the crust. We develop a model for this process, make predictions for the morphologic, morphometric, volcanic, and geophysical consequences of the process and then compare these predictions with the population of observed floor-fractured craters. In our model, the process of magmatic intrusion and sill formation begins when a dike propagates vertically towards the surface; as the dike encounters the underdense brecciated region beneath the crater, the magmatic driving pressure is insufficient to continue vertical propagation, but pressure in the stalled dike exceeds the local lithostatic pressure. The dike then begins to propagate laterally forming a sill which does not propagate past the crater floor region because increased overburden pressure from the crater wall and rim crest pinch off the dike at this boundary; the sill then continues to inflate, further raising and fracturing the brittle crater floor. When the intrusion diameter to intrusion depth ratio is smaller than a critical value, the intrusion assumes a laccolith shape with a domed central region. When the ratio exceeds a critical value

  13. Smart container UWB sensor system for situational awareness of intrusion alarms

    Science.gov (United States)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  14. Geochemical and isotopic data for restricting seawater intrusion and groundwater circulation in a series of typical volcanic islands in the South China Sea.

    Science.gov (United States)

    Zhang, Wenjie; Chen, Xi; Tan, Hongbing; Zhang, Yanfei; Cao, Jifu

    2015-04-15

    The decline of groundwater table and deterioration of water quality related to seawater have long been regarded as a crucial problem in coastal regions. In this work, a hydrogeologic investigation using combined hydrochemical and isotopic approaches was conducted in the coastal region of the South China Sea near the Leizhou peninsular to provide primary insight into seawater intrusion and groundwater circulation. Hydrochemical and isotopic data show that local groundwater is subjected to anthropogenic activities and geochemical processes, such as evaporation, water-rock interaction, and ion exchange. However, seawater intrusion driven by the over-exploitation of groundwater and insufficient recharge is the predominant factor controlling groundwater salinization. Systematic and homologic isotopic characteristics of most samples suggest that groundwater in volcanic area is locally recharged and likely caused by modern precipitation. However, very depleted stable isotopes and extremely low tritium of groundwater in some isolated aquifers imply a dominant role of palaeowater. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Investigation of a dynamic seawater intrusion event using strontium isotopes (87Sr/86Sr)

    DEFF Research Database (Denmark)

    Jørgensen, Niels Oluf; Andersen, Martin S.; Engesgaard, Peter Knudegaard

    2008-01-01

    groundwater and deep groundwater from the underlying limestone aquifer as end-members. A mixing analysis is performed using the Cl contents and the 87Sr/86Sr ratios. The mixing analysis indicates a zone with leakage of deep groundwater from the limestone aquifer into the lower part of the shallow sandy...... and lower part of the water body in the shallow sandy aquifer. The leakage of deep groundwater increased during the intrusion experiment as a result of the large abstraction of groundwater. Following the ceasing of the groundwater pumping, the interface went from being vertical to being predominantly......A seawater intrusion experiment was carried out in a shallow coastal unconfined aquifer at Skansehage, Denmark. The aquifer consists of 6-10 m of postglacial (Holocene) eolian and marine sands and gravels resting on Pleistocene glacial sequence of tills and glacio-fluviatile sediments on a basement...

  16. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  17. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  18. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  19. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  20. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the