Sample records for access control intrusion

  1. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  2. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  3. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    PubMed

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  4. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  5. Replacing intrusive thoughts: investigating thought control in relation to OCD symptoms.

    PubMed

    Ólafsson, Ragnar P; Snorrason, Ívar; Bjarnason, Reynar K; Emmelkamp, Paul M G; Ólason, Daníel Þ; Kristjánsson, Árni

    2014-12-01

    Control of obsessive thoughts in Obsessive Compulsive Disorder (OCD) involves both avoidance and removal of undesirable intrusive thoughts. Thought suppression tasks tap both of these processes but experimental results have been inconsistent. Experimental tasks allowing more focused study of the processes involved in controlling intrusive thoughts may be needed. In two experiments, control over neutral, standardized intrusive and personal intrusive thoughts was investigated as participants attempted to replace them with neutral thoughts. Non-selected university students (Experiment 1: N = 61) and university students scoring high and low on self-report measure of OC symptoms (Experiment 2: N = 40) performed a computerized thought replacement task. In experiment 1 replacing personal intrusive thoughts took longer than replacing neutral thoughts. Self-reports showed that intrusive thoughts were rated more difficult to replace and were associated with greater thought reoccurrence during replacement, larger emotional reaction and more discomfort. These results were largely replicated in experiment 2. Furthermore, the high OC symptom group experienced greater overall difficulty controlling thoughts on the replacement task, experienced more reoccurrences of personal intrusive thoughts, larger emotional reactions and discomfort associated with them, and felt a greater urge to remove them. All participants were non-clinical university students, and older adults with OCD should be tested. The findings are in line with cognitive behavioural theories of OCD. They support the usefulness of thought replacement as a research paradigm to study thought control in OCD and possibly other psychological conditions characterized by repetitive thoughts. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Effective use of surface-water management to control saltwater intrusion

    NASA Astrophysics Data System (ADS)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  7. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  8. Pre-stressor cognitive control is related to intrusive cognition of a stressful film.

    PubMed

    Wessel, Ineke; Overwijk, Sippie; Verwoerd, Johan; de Vrieze, Nienke

    2008-04-01

    It has been suggested that relatively weak cognitive control existing prior to a stressful event may be associated with intrusive memories of that stressor afterwards. We explored this in two analog studies employing unselected participants who saw an emotional film fragment and completed behavioral (i.e., color-naming interference [CNI]) and self-report indices of intrusions. Prior to film presentation, several cognitive control tests were administered. Study 1 showed that better updating/monitoring was linked to less CNI from negative film-related words. However, better updating/monitoring was associated with more diary reports of intrusive memories. Study 2 showed that a better resistance to pro-active interference (PI) predicted less self-reported film-related intrusive cognition after 24h. However, after this delay, both self-reported intrusions and CNI were not related to updating/monitoring. Taken together, the results suggest that a specific pre-existing cognitive control function (i.e., resistance to PI) may be involved in the regulation of post-stressor intrusive memory phenomena.

  9. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency During Early Childhood

    PubMed Central

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2012-01-01

    Longitudinal relations among ego-resiliency, effortful control, and observed intrusive parenting were examined at 18, 30, and 42 months of age (Ns = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted effortful control a year later, over and above earlier levels. Effortful control at 30 months mediated the negative relation between 18-month intrusive parenting and ego-resiliency at 42 months when controlling for stability of the variables. Ego-resiliency did not predict effortful control. The findings suggest that intrusive parenting may have a negative effect on children’s personality resiliency through its effects on the abilities to regulate attention and behavior. PMID:23379965

  10. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  11. A new physical barrier system for seawater intrusion control

    NASA Astrophysics Data System (ADS)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  12. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena.

  13. Assessment of regional management strategies for controlling seawater intrusion

    USGS Publications Warehouse

    Reichard, E.G.; Johnson, T.A.

    2005-01-01

    Simulation-optimization methods, applied with adequate sensitivity tests, can provide useful quantitative guidance for controlling seawater intrusion. This is demonstrated in an application to the West Coast Basin of coastal Los Angeles that considers two management options for improving hydraulic control of seawater intrusion: increased injection into barrier wells and in lieu delivery of surface water to replace current pumpage. For the base-case optimization analysis, assuming constant groundwater demand, in lieu delivery was determined to be most cost effective. Reduced-cost information from the optimization provided guidance for prioritizing locations for in lieu delivery. Model sensitivity to a suite of hydrologic, economic, and policy factors was tested. Raising the imposed average water-level constraint at the hydraulic-control locations resulted in nonlinear increases in cost. Systematic varying of the relative costs of injection and in lieu water yielded a trade-off curve between relative costs and injection/in lieu amounts. Changing the assumed future scenario to one of increasing pumpage in the adjacent Central Basin caused a small increase in the computed costs of seawater intrusion control. Changing the assumed boundary condition representing interaction with an adjacent basin did not affect the optimization results. Reducing the assumed hydraulic conductivity of the main productive aquifer resulted in a large increase in the model-computed cost. Journal of Water Resources Planning and Management ?? ASCE.

  14. Industrial Control System Process-Oriented Intrusion Detection (iPoid) Algorithm

    DTIC Science & Technology

    2016-08-01

    inspection rules using an intrusion-detection system (IDS) sensor, a simulated Programmable Logic Controller (PLC), and a Modbus client operating...operating system PLC Programmable Logic Controller SCADA supervisory control and data acquisition SIGHUP signal hangup SPAN Switched Port Analyzer

  15. Intrusion Detection in Database Systems

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Sohrabi, Mina; Rafsanjani, Marjan Kuchaki

    Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated.

  16. Externalizing symptoms, effortful control, and intrusive parenting: A test of bidirectional longitudinal relations during early childhood.

    PubMed

    Eisenberg, Nancy; Taylor, Zoe E; Widaman, Keith F; Spinrad, Tracy L

    2015-11-01

    At approximately 30, 42, and 54 months of age (N = 231), the relations among children's externalizing symptoms, intrusive maternal parenting, and children's effortful control (EC) were examined. Both intrusive parenting and low EC have been related to psychopathology, but children's externalizing problems and low EC might affect the quality of parenting and one another. Mothers' intrusive behavior with their children was assessed with observations, children's EC was measured with mothers' and caregivers' reports, and children's externalizing symptoms were assessed with mothers', fathers', and caregivers' reports. In a structural equation panel model, bidirectional relations between intrusive parenting and EC were found: EC at 30 and 42 months predicted low levels of intrusive parenting a year later, controlling for prior levels of parenting and vice versa. Moreover, high levels of children's externalizing problems at both 30 and 42 months negatively predicted EC a year later, controlling for prior levels of EC. Although externalizing problems positively predicted high EC over time, this appeared to be a suppression effect because these variables had a strong negative pattern in the zero-order correlations. Moreover, when controlling for the stability of intrusive parenting, EC, and externalizing (all exhibited significant stability across time) and the aforementioned cross-lagged predictive paths, EC and externalizing problems were still negatively related within the 54-month assessment. The findings are consistent with the view that children's externalizing behavior undermines their EC and contributes to intrusive mothering and that relations between intrusive parenting and EC are bidirectional across time. Thus, interventions that focus on modifying children's externalizing problems (as well as the quality of parenting) might affect the quality of parenting they receive and, hence, subsequent problems with adjustment.

  17. Multilayer Statistical Intrusion Detection in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  18. Both trust and self-control are necessary to prevent intrusive behaviors: evidence from a longitudinal study of married couples.

    PubMed

    Buyukcan-Tetik, Asuman; Finkenauer, Catrin; Kuppens, Sofie; Vohs, Kathleen D

    2013-08-01

    Many people engage in intrusive behaviors in close relationships. Existing research links intrusive behaviors to a lack of trust and an imbalance between self- and partner-interest. The authors tested the novel hypothesis that people need self-control to regulate intrusive behaviors. Self-control enables people to forgo their self-interests (reassurance or closeness) for the sake of their partner or the relationship. Specifically, we predicted that people need both trust and self-control to refrain from intrusive behavior. One-hundred-eighty-nine couples participated in a prospective longitudinal study with three waves. Consistent with predictions, multilevel analyses revealed an interaction between trust and self-control on intrusive behaviors cross-sectionally as well as longitudinally (albeit marginally). These results provide support for our hypothesis that neither trust in the partner nor self-control is sufficient to forestall intrusive behaviors, but rather both are necessary to refrain from intruding into one's partner's privacy. © 2013 American Psychological Association

  19. Detection and response to unauthorized access to a communication device

    DOEpatents

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  20. Accounting for intrusive thoughts in PTSD: Contributions of cognitive control and deliberate regulation strategies.

    PubMed

    Bomyea, Jessica; Lang, Ariel J

    2016-03-01

    Persistent, trauma-related intrusive thoughts are common in individuals with posttraumatic stress disorder (PTSD). Automatic aspects of cognitive functioning (including executive functioning) and maladaptive deliberate attempts at cognitive regulation have been proposed as individual difference factors that may perpetuate intrusive thoughts. The current study sought to examine the joint contribution of these two factors on intrusive thoughts in PTSD. Forty-two women with PTSD completed an executive functioning assessment followed by a thought suppression task. Intrusive thoughts (frequency and duration), as well as participants' use of specific cognitive regulation strategies (avoidance-based thought regulation strategies; TRS), were measured during the task. Hierarchical linear regression was used to examine the interaction of executive functioning and TRS on intrusive thoughts. Greater use of TRS was associated with greater intrusive thought persistence for those with low executive functioning, but not those with high executive functioning. Data was collected cross-sectionally and the laboratory thought suppression task may not correspond to naturalistic thought regulation. Results are consistent with prior literature suggesting that certain responses deployed by individuals to control intrusive thoughts may be unhelpful, but that a higher level of cognitive capacity may mitigate this effect. Implications of these findings for recent models of cognition in PTSD are discussed. Published by Elsevier B.V.

  1. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    ERIC Educational Resources Information Center

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  2. Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks

    DTIC Science & Technology

    2007-01-01

    Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR

  3. Multiple levels of bilingual language control: evidence from language intrusions in reading aloud.

    PubMed

    Gollan, Tamar H; Schotter, Elizabeth R; Gomez, Joanne; Murillo, Mayra; Rayner, Keith

    2014-02-01

    Bilinguals rarely produce words in an unintended language. However, we induced such intrusion errors (e.g., saying el instead of he) in 32 Spanish-English bilinguals who read aloud single-language (English or Spanish) and mixed-language (haphazard mix of English and Spanish) paragraphs with English or Spanish word order. These bilinguals produced language intrusions almost exclusively in mixed-language paragraphs, and most often when attempting to produce dominant-language targets (accent-only errors also exhibited reversed language-dominance effects). Most intrusion errors occurred for function words, especially when they were not from the language that determined the word order in the paragraph. Eye movements showed that fixating a word in the nontarget language increased intrusion errors only for function words. Together, these results imply multiple mechanisms of language control, including (a) inhibition of the dominant language at both lexical and sublexical processing levels, (b) special retrieval mechanisms for function words in mixed-language utterances, and (c) attentional monitoring of the target word for its match with the intended language.

  4. [Analysis of intrusion errors in free recall].

    PubMed

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  5. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    PubMed

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  6. A Non-Intrusive Cyber Physical Social Sensing Solution to People Behavior Tracking: Mechanism, Prototype, and Field Experiments.

    PubMed

    Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid

    2017-01-13

    Tracking people's behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people's access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people's access behaviors can be correctly tracked within a one-second delay.

  7. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  8. A Non-Intrusive Cyber Physical Social Sensing Solution to People Behavior Tracking: Mechanism, Prototype, and Field Experiments

    PubMed Central

    Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid

    2017-01-01

    Tracking people’s behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people’s access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people’s access behaviors can be correctly tracked within a one-second delay. PMID:28098772

  9. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  10. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  11. Reducing intrusive traumatic memories after emergency caesarean section: A proof-of-principle randomized controlled study.

    PubMed

    Horsch, Antje; Vial, Yvan; Favrod, Céline; Harari, Mathilde Morisod; Blackwell, Simon E; Watson, Peter; Iyadurai, Lalitha; Bonsall, Michael B; Holmes, Emily A

    2017-07-01

    Preventative psychological interventions to aid women after traumatic childbirth are needed. This proof-of-principle randomized controlled study evaluated whether the number of intrusive traumatic memories mothers experience after emergency caesarean section (ECS) could be reduced by a brief cognitive intervention. 56 women after ECS were randomized to one of two parallel groups in a 1:1 ratio: intervention (usual care plus cognitive task procedure) or control (usual care). The intervention group engaged in a visuospatial task (computer-game 'Tetris' via a handheld gaming device) for 15 min within six hours following their ECS. The primary outcome was the number of intrusive traumatic memories related to the ECS recorded in a diary for the week post-ECS. As predicted, compared with controls, the intervention group reported fewer intrusive traumatic memories (M = 4.77, SD = 10.71 vs. M = 9.22, SD = 10.69, d = 0.647 [95% CI: 0.106, 1.182]) over 1 week (intention-to-treat analyses, primary outcome). There was a trend towards reduced acute stress re-experiencing symptoms (d = 0.503 [95% CI: -0.032, 1.033]) after 1 week (intention-to-treat analyses). Times series analysis on daily intrusions data confirmed the predicted difference between groups. 72% of women rated the intervention "rather" to "extremely" acceptable. This represents a first step in the development of an early (and potentially universal) intervention to prevent postnatal posttraumatic stress symptoms that may benefit both mother and child. ClinicalTrials.gov, www.clinicaltrials.gov, NCT02502513. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. Torque Control During Intrusion on Upper Central Incisor in Labial and Lingual bracket System - A 3D Finite Element Study.

    PubMed

    Pol, Tejas R; Vandekar, Meghna; Patil, Anuradha; Desai, Sanjana; Shetty, Vikram; Hazarika, Saptarshi

    2018-01-01

    The aim of present study was to investigate the difference of torque control during intrusive force on upper central incisors with normal, under and high torque in lingual and labial orthodontic systems through 3D finite element analysis. Six 3D models of an upper right central incisor with different torque were designed in Solid Works 2006. Software ANSYS Version 16.0 was used to evaluate intrusive force on upper central incisor model . An intrusive force of 0.15 N was applied to the bracket slot in different torque models and the displacements along a path of nodes in the upper central incisor was assessed. On application of Intrusive force on under torqued upper central incisor in Labial system produce labial crown movement but in Lingual system caused lingual movement in the apical and incisal parts. The same intrusive force in normal-torqued central incisor led to a palatal movement in apical and labial displacement of incisal edge in Lingual system and a palatal displacement in apical area and a labial movement in the incisal edge in Labial systemin. In overtorqued upper central incisor, the labial crown displacement in Labial system is more than Lingual system. In labial and lingual system on application of the same forces in upper central incisor with different inclinations showed different responses. The magnitudes of torque Loss during intrusive loads in incisors with normal, under and over-torque were higher in Labial system than Lingual orthodontic appliances. Key words: FEM, lingual orthodontics, intrusion, torque control, labial bracket systems.

  13. Non-Intrusive Impedance-Based Cable Tester

    NASA Technical Reports Server (NTRS)

    Medelius, Pedro J. (Inventor); Simpson, Howard J. (Inventor)

    1999-01-01

    A non-intrusive electrical cable tester determines the nature and location of a discontinuity in a cable through application of an oscillating signal to one end of the cable. The frequency of the oscillating signal is varied in increments until a minimum, close to zero voltage is measured at a signal injection point which is indicative of a minimum impedance at that point. The frequency of the test signal at which the minimum impedance occurs is then employed to determine the distance to the discontinuity by employing a formula which relates this distance to the signal frequency and the velocity factor of the cable. A numerically controlled oscillator is provided to generate the oscillating signal, and a microcontroller automatically controls operation of the cable tester to make the desired measurements and display the results. The device is contained in a portable housing which may be hand held to facilitate convenient use of the device in difficult to access locations.

  14. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  15. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  16. Stratigraphic controls on seawater intrusion and implications for groundwater management, Dominguez Gap area of Los Angeles, California, USA

    USGS Publications Warehouse

    Nishikawa, T.; Siade, A.J.; Reichard, E.G.; Ponti, D.J.; Canales, A.G.; Johnson, T.A.

    2009-01-01

    Groundwater pumping has led to extensive water-level declines and seawater intrusion in coastal Los Angeles, California (USA). A SUTRA-based solute-transport model was developed to test the hydraulic implications of a sequence-stratigraphic model of the Dominguez Gap area and to assess the effects of water-management scenarios. The model is two-dimensional, vertical and follows an approximate flow line extending from the Pacific Ocean through the Dominguez Gap area. Results indicate that a newly identified fault system can provide a pathway for transport of seawater and that a stratigraphic boundary located between the Bent Spring and Upper Wilmington sequences may control the vertical movement of seawater. Three 50-year water-management scenarios were considered: (1) no change in water-management practices; (2) installation of a slurry wall; and (3) raising inland water levels to 7.6 m above sea level. Scenario 3 was the most effective by reversing seawater intrusion. The effects of an instantaneous 1-m sea-level rise were also tested using water-management scenarios 1 and 3. Results from two 100-year simulations indicate that a 1-m sea-level rise may accelerate seawater intrusion for scenario 1; however, scenario 3 remains effective for controlling seawater intrusion. ?? Springer-Verlag 2009.

  17. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  18. Intrusive versus domiciliated triatomines and the challenge of adapting vector control practices against Chagas disease

    PubMed Central

    Waleckx, Etienne; Gourbière, Sébastien; Dumonteil, Eric

    2015-01-01

    Chagas disease prevention remains mostly based on triatomine vector control to reduce or eliminate house infestation with these bugs. The level of adaptation of triatomines to human housing is a key part of vector competence and needs to be precisely evaluated to allow for the design of effective vector control strategies. In this review, we examine how the domiciliation/intrusion level of different triatomine species/populations has been defined and measured and discuss how these concepts may be improved for a better understanding of their ecology and evolution, as well as for the design of more effective control strategies against a large variety of triatomine species. We suggest that a major limitation of current criteria for classifying triatomines into sylvatic, intrusive, domiciliary and domestic species is that these are essentially qualitative and do not rely on quantitative variables measuring population sustainability and fitness in their different habitats. However, such assessments may be derived from further analysis and modelling of field data. Such approaches can shed new light on the domiciliation process of triatomines and may represent a key tool for decision-making and the design of vector control interventions. PMID:25993504

  19. Corporate Mergers in the Publishing Industry: Helpful or Intrusive?

    ERIC Educational Resources Information Center

    Rudman, Herbert C.

    1990-01-01

    Examines the effects of corporate mergers in the publishing industry on the publishing of textbooks and standardized tests. Concludes that restructuring, acquisitions, and mergers have an intrusive effect on established practices of academic publishing and may severely limit the access of scholars to the academic marketplace. (FMW)

  20. Preventing intrusive memories after trauma via a brief intervention involving Tetris computer game play in the emergency department: a proof-of-concept randomized controlled trial

    PubMed Central

    Iyadurai, L; Blackwell, S E; Meiser-Stedman, R; Watson, P C; Bonsall, M B; Geddes, J R; Nobre, A C; Holmes, E A

    2018-01-01

    After psychological trauma, recurrent intrusive visual memories may be distressing and disruptive. Preventive interventions post trauma are lacking. Here we test a behavioural intervention after real-life trauma derived from cognitive neuroscience. We hypothesized that intrusive memories would be significantly reduced in number by an intervention involving a computer game with high visuospatial demands (Tetris), via disrupting consolidation of sensory elements of trauma memory. The Tetris-based intervention (trauma memory reminder cue plus c. 20 min game play) vs attention-placebo control (written activity log for same duration) were both delivered in an emergency department within 6 h of a motor vehicle accident. The randomized controlled trial compared the impact on the number of intrusive trauma memories in the subsequent week (primary outcome). Results vindicated the efficacy of the Tetris-based intervention compared with the control condition: there were fewer intrusive memories overall, and time-series analyses showed that intrusion incidence declined more quickly. There were convergent findings on a measure of clinical post-trauma intrusion symptoms at 1 week, but not on other symptom clusters or at 1 month. Results of this proof-of-concept study suggest that a larger trial, powered to detect differences at 1 month, is warranted. Participants found the intervention easy, helpful and minimally distressing. By translating emerging neuroscientific insights and experimental research into the real world, we offer a promising new low-intensity psychiatric intervention that could prevent debilitating intrusive memories following trauma. PMID:28348380

  1. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    PubMed

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  2. To suppress, or not to suppress? That is repression: controlling intrusive thoughts in addictive behaviour.

    PubMed

    Moss, Antony C; Erskine, James A K; Albery, Ian P; Allen, James Richard; Georgiou, George J

    2015-05-01

    Research to understand how individuals cope with intrusive negative or threatening thoughts suggests a variety of different cognitive strategies aimed at thought control. In this review, two of these strategies--thought suppression and repressive coping--are discussed in the context of addictive behaviour. Thought suppression involves conscious, volitional attempts to expel a thought from awareness, whereas repressive coping, which involves the avoidance of thoughts without the corresponding conscious intention, appears to be a far more automated process. Whilst there has been an emerging body of research exploring the role of thought suppression in addictive behaviour, there remains a dearth of research which has considered the role of repressive coping in the development of, and recovery from, addiction. Based on a review of the literature, and a discussion of the supposed mechanisms which underpin these strategies for exercising mental control, a conceptual model is proposed which posits a potential common mechanism. This model makes a number of predictions which require exploration in future research to fully understand the cognitive strategies utilised by individuals to control intrusive thoughts related to their addictive behaviour. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    USGS Publications Warehouse

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  4. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  5. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    NASA Astrophysics Data System (ADS)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  6. Using Unix system auditing for detecting network intrusions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators knowmore » what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.« less

  7. Petroleum Vapor Intrusion

    EPA Pesticide Factsheets

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  8. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  9. Research on regional intrusion prevention and control system based on target tracking

    NASA Astrophysics Data System (ADS)

    Liu, Yanfei; Wang, Jieling; Jiang, Ke; He, Yanhui; Wu, Zhilin

    2017-08-01

    In view of the fact that China’s border is very long and the border prevention and control measures are single, we designed a regional intrusion prevention and control system which based on target-tracking. The system consists of four parts: solar panel, radar, electro-optical equipment, unmanned aerial vehicle and intelligent tracking platform. The solar panel provides independent power for the entire system. The radar detects the target in real time and realizes the high precision positioning of suspicious targets, then through the linkage of electro-optical equipment, it can achieve full-time automatic precise tracking of targets. When the target appears within the range of detection, the drone will be launched to continue the tracking. The system is mainly to realize the full time, full coverage, whole process integration and active realtime control of the border area.

  10. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  11. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  12. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  13. Perimeter intrusion detection and assessment system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  14. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  15. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  16. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  17. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  18. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  19. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  20. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  1. System access control study

    DOT National Transportation Integrated Search

    1974-06-01

    The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...

  2. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  3. A two-stage flow-based intrusion detection model for next-generation networks.

    PubMed

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  4. A two-stage flow-based intrusion detection model for next-generation networks

    PubMed Central

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results. PMID:29329294

  5. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    NASA Astrophysics Data System (ADS)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  6. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    PubMed

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  7. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  8. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  9. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    NASA Astrophysics Data System (ADS)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  10. Opportunities and Barriers to Address Seawater Intrusion Along California's Coast

    NASA Astrophysics Data System (ADS)

    Langridge, R.

    2016-12-01

    In many California coastal areas reliant on groundwater seawater intrusion is a serious problem. This presentation will discuss how particular groundwater management institutions in the state are addressing seawater intrusion issues, how stakeholders are participating in this process, and how scientific information can contribute to policies that support reducing or halting ongoing intrusion. In 2014, the California Legislature passed the Sustainable Groundwater Management Act (SGMA). The Act established requirements for 127 high and medium priority groundwater basins to form groundwater sustainability agencies (GSAs) and develop plans to sustainably manage their basin. Sustainable is defined in SGMA as avoiding specific unacceptable impacts, including significant and unreasonable seawater intrusion. Special Act Districts, created by an act of the legislature, have the option to be the sole GSA in their service area, and they can provide a window into current and potentially future strategies to address seawater intrusion. Additionally, adjudicated basins are often considered one of the best approaches to achieve efficient groundwater management, and these basins are exempt from SGMA and managed pursuant to a court judgment. The strategies utilized to manage seawater intrusion by three special act districts and five adjudicated basins will be discussed. These basins cover significant areas of central and southern California and all have experienced seawater intrusion. Our research team just completed reports for the State Water Resources Control Board on all the adjudicated and special act districts in the state, and this presentation will draw on our findings to better understand the barriers and opportunities to alleviate seawater intrusion and the information required to develop solutions.

  11. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features.

    PubMed

    Amudha, P; Karthik, S; Sivakumari, S

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different.

  12. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    PubMed Central

    Amudha, P.; Karthik, S.; Sivakumari, S.

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  13. Impact of exogenous cortisol on the formation of intrusive memories in healthy women.

    PubMed

    Rombold, Felicitas; Wingenfeld, Katja; Renneberg, Babette; Schwarzkopf, Friederike; Hellmann-Regen, Julian; Otte, Christian; Roepke, Stefan

    2016-12-01

    Stress hormones such as cortisol are involved in modulating emotional memory. However, little is known about the influence of cortisol on the formation of intrusive memories after a traumatic event. The aim of this study was to examine whether cortisol levels during encoding and consolidation of an intrusion-inducing trauma film paradigm would influence subsequent intrusion formation. In an experimental, double-blind, placebo-controlled study a trauma film paradigm was used to induce intrusions in 60 healthy women. Participants received a single dose of either 20 mg hydrocortisone or placebo before watching a trauma film. Salivary cortisol and alpha-amylase as well as blood pressure were measured during the experiment. The consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions resulting from the trauma film were assessed throughout the following seven days. Hydrocortisone administration before the trauma film resulted in increased salivary cortisol levels but did not affect the consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions throughout the following week. These results indicate that pharmacologically increased cortisol levels during an experimental trauma film paradigm do not influence consecutive intrusive memories. Current data do not support a prominent role of exogenous cortisol on intrusive memories, at least in healthy young women after a relatively mild trauma equivalent. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    PubMed

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  16. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  17. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  18. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  19. Testing the differential effects of acceptance and attention-based psychological interventions on intrusive thoughts and worry.

    PubMed

    Ainsworth, B; Bolderston, H; Garner, M

    2017-04-01

    Worry is a key component of anxiety and may be an effective target for therapeutic intervention. We compared two psychological processes (attention and acceptance) on the frequency of intrusive worrying thoughts in an experimental worry task. 77 participants were randomised across three groups and completed either a 10 min attention or acceptance-based psychological exercise, or progressive muscle relaxation control. We subsequently measured anxiety, and the content and frequency of intrusive thoughts before and after a 'worry induction task'. Groups did not differ in baseline worry, anxiety or thought intrusions. Both attention and acceptance-based groups experienced fewer negative thought intrusions (post-worry) compared to the relaxation control group. The acceptance exercise had the largest effect, preventing 'worry induction'. Increases in negative intrusive thoughts predicted subjective anxiety. We provide evidence that acceptance and attention psychological exercises may reduce anxiety by reducing the negative thought intrusions that characterise worry. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  20. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less

  1. Legal Factors Related to Access to Campuses of Public Colleges and Universities: An Occasional Paper.

    ERIC Educational Resources Information Center

    Lytle, Michael A.

    Legal methods and related case law that can be used by public higher education administrators to deal with intrusions by outsiders onto the campus are examined. The following legal factors related to control of campus access are addressed: risk management, police power, general trespass, school related trespass/loitering statutes, First and…

  2. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    PubMed Central

    Chapman, Helen R.; Kirby-Turner, Nick

    2018-01-01

    Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised) evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists. PMID:29719519

  3. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability maymore » also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system« less

  4. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE must...

  5. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This

  6. Quasi-horizontal circulation cells in 3D seawater intrusion

    USGS Publications Warehouse

    Abarca, E.; Carrera, J.; Sanchez-Vila, X.; Voss, C.I.

    2007-01-01

    The seawater intrusion process is characterized by the difference in freshwater and seawater density that causes freshwater to float on seawater. Many confined aquifers have a large horizontal extension with respect to thickness. In these cases, while buoyancy acts in the vertical direction, flow is confined between the upper and bottom boundaries and the effect of gravity is controlled by variations of aquifer elevation. Therefore, the effective gravity is controlled by the slope and the shape of the aquifer boundaries. Variability in the topography of the aquifer boundaries is one case where 3D analysis is necessary. In this work, density-dependent flow processes caused by 3D aquifer geometry are studied numerically and specifically, considering a lateral slope of the aquifer boundaries. Sub-horizontal circulation cells are formed in the saltwater entering the aquifer. The penetration of the saltwater can be quantified by a dimensionless buoyancy number that measures the lateral slope of the aquifer relative to freshwater flux. The penetration of the seawater intrusion wedge is controlled more by this slope than by the aquifer thickness and dispersivity. Thus, the slope must be taken into account in order to accurately evaluate seawater intrusion. ?? 2007 Elsevier B.V. All rights reserved.

  7. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  8. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  9. Bilingual language intrusions and other speech errors in Alzheimer's disease.

    PubMed

    Gollan, Tamar H; Stasenko, Alena; Li, Chuchu; Salmon, David P

    2017-11-01

    The current study investigated how Alzheimer's disease (AD) affects production of speech errors in reading-aloud. Twelve Spanish-English bilinguals with AD and 19 matched controls read-aloud 8 paragraphs in four conditions (a) English-only, (b) Spanish-only, (c) English-mixed (mostly English with 6 Spanish words), and (d) Spanish-mixed (mostly Spanish with 6 English words). Reading elicited language intrusions (e.g., saying la instead of the), and several types of within-language errors (e.g., saying their instead of the). Patients produced more intrusions (and self-corrected less often) than controls, particularly when reading non-dominant language paragraphs with switches into the dominant language. Patients also produced more within-language errors than controls, but differences between groups for these were not consistently larger with dominant versus non-dominant language targets. These results illustrate the potential utility of speech errors for diagnosis of AD, suggest a variety of linguistic and executive control impairments in AD, and reveal multiple cognitive mechanisms needed to mix languages fluently. The observed pattern of deficits, and unique sensitivity of intrusions to AD in bilinguals, suggests intact ability to select a default language with contextual support, to rapidly translate and switch languages in production of connected speech, but impaired ability to monitor language membership while regulating inhibitory control. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Stuck in the spin cycle: Avoidance and intrusions following breast cancer diagnosis.

    PubMed

    Bauer, Margaret R; Wiley, Joshua F; Weihs, Karen L; Stanton, Annette L

    2017-09-01

    Theories and research regarding cognitive and emotional processing during the experience of profound stressors suggest that the presence of intrusive thoughts and feelings predicts greater use of avoidance and that the use of avoidance paradoxically predicts more intrusions. However, empirical investigations of their purported bidirectional relationship are limited. This study presents a longitudinal investigation of the reciprocal relationship between intrusions and avoidance coping over a 6-month period in the year following breast cancer diagnosis. Breast cancer patients (N = 460) completed measures of cancer-related intrusions and avoidance at study entry, 3 months, and 6 months later (i.e., an average of 2, 5, and 8 months after diagnosis, respectively). Cross-lagged panel analyses revealed that intrusive thoughts, feelings, and images at study entry predicted greater avoidance 3 months later, and avoidance coping at study entry predicted intrusions 3 months later, controlling for the stability of intrusions and avoidance as well as time since diagnosis. Findings were not statistically significant for avoidance predicting intrusions, or vice versa, between the 3-month and the 6-month assessment period, during which they declined. These findings provide empirical support for the theoretical contention that avoidance and intrusive thoughts and emotions reciprocally influence one another following stressful events. Additionally, in the months shortly after breast cancer diagnosis, intrusions and avoidance are positively related. However, the relationships attenuate over time, which could indicate resolved cognitive and emotional processing of the cancer experience. Statement of contribution What is already known on this subject? Following stressful life events, individuals often experience intrusive thoughts and feelings related to the event and they report avoidance of such reminders. Many studies demonstrate that greater intrusions predict more

  11. Machine Learning in Intrusion Detection

    DTIC Science & Technology

    2005-07-01

    machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate

  12. Intrusion detection: systems and models

    NASA Technical Reports Server (NTRS)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  13. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Observed assertive and intrusive maternal feeding behaviors increase child adiposity123

    PubMed Central

    Ozbeki, Tina N; Appugliese, Danielle P; Kaciroti, Niko; Corwyn, Robert F; Bradley, Robert H

    2012-01-01

    Background: Few studies have examined observed maternal feeding behaviors and their potential association with child adiposity. The association between maternal prompting to eat and child adiposity has been inconsistent. Objectives: This study sought to identify factors associated with maternal feeding behaviors and to test the hypothesis that more maternal prompts to eat, more assertive prompts, and more intrusiveness are associated with greater child adiposity. Design: Children (n = 1218) and their mothers were videotaped eating a standardized snack at ages 15, 24, and 36 mo. Maternal prompts to eat, the percentage of prompts that were assertive, and intrusiveness were coded. Adjusted regression analyses evaluated predictors of prompts, the percentage of assertive prompts, and intrusiveness and the relation of each of these factors with child adiposity (weight-for-length z score at 15 mo and BMI z score at 24 and 36 mo) after control for the child's race-ethnicity and sex, family income-to-needs ratio, and maternal education, weight status, and depressive symptoms. Results: At 36 mo, mothers gave an average of 9.3 prompts; 61% of prompts were assertive, and 48% of mothers were intrusive. Lower maternal education and minority race-ethnicity were associated with a greater percentage of assertive prompts and intrusiveness. A greater percentage of assertive prompts and intrusiveness, but not total prompts, was associated with higher child adiposity. Conclusions: Assertive prompting and an intrusive style had small but significant associations with greater child adiposity. Future work should focus on maternal motivations for assertive and intrusive feeding styles and mechanisms through which these feeding styles might increase child adiposity. PMID:22277552

  15. Parallel Regulation of Memory and Emotion Supports the Suppression of Intrusive Memories

    PubMed Central

    Anderson, Michael C.

    2017-01-01

    Intrusive memories often take the form of distressing images that emerge into a person's awareness, unbidden. A fundamental goal of clinical neuroscience is to understand the mechanisms allowing people to control these memory intrusions and reduce their emotional impact. Mnemonic control engages a right frontoparietal network that interrupts episodic retrieval by modulating hippocampal activity; less is known, however, about how this mechanism contributes to affect regulation. Here we report evidence in humans (males and females) that stopping episodic retrieval to suppress an unpleasant image triggers parallel inhibition of mnemonic and emotional content. Using fMRI, we found that regulation of both mnemonic and emotional content was driven by a shared frontoparietal inhibitory network and was predicted by a common profile of medial temporal lobe downregulation involving the anterior hippocampus and the amygdala. Critically, effective connectivity analysis confirmed that reduced amygdala activity was not merely an indirect consequence of hippocampal suppression; rather, both the hippocampus and the amygdala were targeted by a top-down inhibitory control signal originating from the dorsolateral prefrontal cortex. This negative coupling was greater when unwanted memories intruded into awareness and needed to be purged. Together, these findings support the broad principle that retrieval suppression is achieved by regulating hippocampal processes in tandem with domain-specific brain regions involved in reinstating specific content, in an activity-dependent fashion. SIGNIFICANCE STATEMENT Upsetting events sometimes trigger intrusive images that cause distress and that may contribute to psychiatric disorders. People often respond to intrusions by suppressing their retrieval, excluding them from awareness. Here we examined whether suppressing aversive images might also alter emotional responses to them, and the mechanisms underlying such changes. We found that the better

  16. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  17. Resilient Control and Intrusion Detection for SCADA Systems

    DTIC Science & Technology

    2014-05-01

    Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human

  18. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  19. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  20. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    NASA Astrophysics Data System (ADS)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  1. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  2. Saltwater intrusion monitoring in Florida

    USGS Publications Warehouse

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  3. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.

  4. Layered intrusions of the Duluth Complex, Minnesota, USA

    USGS Publications Warehouse

    Miller, J.D.; Ripley, E.M.; ,

    1996-01-01

    The Duluth Complex and associated subvolcanic intrusions comprise a large (5000 km2) intrusive complex in northeastern Minnesota that was emplaced into comagmatic volcanics during the development of the 1.1 Ga Midcontinent rift in North America. In addition to anorthositic and felsic intrusions, the Duluth Complex is composed of many individual mafic layered intrusions of tholeiitic affinity. The cumulate stratigraphies and cryptic variations of six of the better exposed and better studied intrusions are described here to demonstrate the variability in their cumulus mineral paragenesis.

  5. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  6. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    PubMed

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  7. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    PubMed

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  8. The impact of dissociation on perceptual priming and intrusions after listening to auditory narratives.

    PubMed

    Dorahy, Martin J; Peck, Rowan K; Huntjens, Rafaele J C

    2016-01-01

    This study investigates the causal role of dissociation in intrusive memory development and possible underlying aberrant memory processes (e.g., increased perceptual priming). Using an audio-only adaption of the trauma film paradigm, we divided 60 participants into 3 conditions and presented them with different visual tasks-mirror staring, dot staring, or neutral images. The former 2 conditions were hypothesized to induce dissociation. Postaudio, a number of factors were assessed, including state dissociation, perceptual priming and conceptual priming, as well as intrusions over 3 days. Participants in the dissociation conditions displayed an increase in perceptual priming compared to those in the control condition and reported more distressing intrusions. No differences were found in conceptual priming and the overall number of intrusions between conditions. Findings contribute to the growing knowledge on the impact of dissociation and cognitive processing in the etiology of posttraumatic stress disorder intrusions.

  9. TReacLab: An object-oriented implementation of non-intrusive splitting methods to couple independent transport and geochemical software

    NASA Astrophysics Data System (ADS)

    Jara, Daniel; de Dreuzy, Jean-Raynald; Cochepin, Benoit

    2017-12-01

    Reactive transport modeling contributes to understand geophysical and geochemical processes in subsurface environments. Operator splitting methods have been proposed as non-intrusive coupling techniques that optimize the use of existing chemistry and transport codes. In this spirit, we propose a coupler relying on external geochemical and transport codes with appropriate operator segmentation that enables possible developments of additional splitting methods. We provide an object-oriented implementation in TReacLab developed in the MATLAB environment in a free open source frame with an accessible repository. TReacLab contains classical coupling methods, template interfaces and calling functions for two classical transport and reactive software (PHREEQC and COMSOL). It is tested on four classical benchmarks with homogeneous and heterogeneous reactions at equilibrium or kinetically-controlled. We show that full decoupling to the implementation level has a cost in terms of accuracy compared to more integrated and optimized codes. Use of non-intrusive implementations like TReacLab are still justified for coupling independent transport and chemical software at a minimal development effort but should be systematically and carefully assessed.

  10. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  11. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  12. From intrusive to oscillating thoughts.

    PubMed

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  13. Vapor Intrusion

    EPA Pesticide Factsheets

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  14. Geophysical characterization of saltwater intrusion in a coastal aquifer: The case of Martil-Alila plain (North Morocco)

    NASA Astrophysics Data System (ADS)

    Himi, Mahjoub; Tapias, Josefiina; Benabdelouahab, Sara; Salhi, Adil; Rivero, Luis; Elgettafi, Mohamed; El Mandour, Abdenabi; Stitou, Jamal; Casas, Albert

    2017-02-01

    Several factors can affect the quantity and the quality of groundwater resources, but in coastal aquifers seawater intrusion is often the most significant issue regarding freshwater supply. Further, saltwater intrusion is a worldwide issue because about seventy percent of the world's population lives in coastal regions. Generally, fresh groundwater not affected by saltwater intrusion is characterized by low salinity and therefore low electrical conductivity (EC) values. Consequently, high values of EC in groundwater along the coastline are usually associated to seawater intrusion. This effect is amplified if the coastal aquifer is overexploited with a subsequent gradual displacement of the freshwater-saltwater interface towards the continent. Delineation of marine intrusion in coastal aquifers has traditionally relied upon observation wells and collection of water samples. This approach may miss important hydrologic features related to saltwater intrusion in areas where access is difficult and where wells are widely spaced. Consequently, the scarcity of sampling points and sometimes their total absence makes the number of data available limited and most of the time not representative for mapping the spatial and temporal variability of groundwater salinity. In this study, we use a series of geophysical methods for characterizing the aquifer geometry and the extension of saltwater intrusion in the Martil-Alila coastal region (Morocco) as a complement to geological and hydrogeochemical data. For this reason, we carried out three geophysical surveys: Gravity, Electrical Resistivity and Frequency Domain Electromagnetic. The geometry of the basin has been determined from the interpretation of a detailed gravity survey. Electrical resistivity models derived from vertical electrical soundings allowed to characterize the vertical and the lateral extensions of aquifer formations. Finally, frequency domain electromagnetic methods allowed delineating the extension of the

  15. Stratigraphic controls on saltwater intrusion in the Dominguez Gap area of coastal Los Angeles

    USGS Publications Warehouse

    Edwards, Brian D.; Ehman, Kenneth D.; Ponti, Daniel J.; Reichard, Eric G.; Tinsley, John; Rosenbauer, Robert J.; Land, Michael T.

    2009-01-01

    The Los Angeles Basin is a densely populated coastal area that significantly depends on groundwater. A part of this groundwater supply is at risk from saltwater intrusion-the impetus for this study. High-resolution seismic-reflection data collected from the Los Angeles-Long Beach Harbor Complex have been combined with borehole geophysical and descriptive geological data from four nearby ??400-m-deep continuously cored wells and with borehole geophysical data from adjacent water and oil wells to characterize the Pliocene to Holocene stratigraphy of the Dominguez Gap coastal aquifer system. The new data are shown as a north-south, two- dimensional, sequence-stratigraphic model that is compared to existing lithostratigraphic models of the Los Angeles Basin in an attempt to better understand pathways of saltwater intrusion into coastal aquifers. Intrusion of saltwater into the coastal aquifer system generally is attributed to over-pumping that caused the hydraulic gradient to reverse during the mid-1920s. Local water managers have used the existing lithostratigraphic model to site closely spaced injection wells of freshwater (barrier projects) attempting to hydraulically control the saltwater intrusion. Improved understanding of the stratigraphic relationships can guide modifications to barrier design that will allow more efficient operation. Allostratigraphic nomenclature is used to define a new sequence-stratigraphic model for the area because the existing lithostratigraphic correlations that have been used to define aquifer systems are shown not to be time-correlative. The youngest sequence, the Holocene Dominguez sequence, contains the Gaspur aquifer at its base. The Gaspur aquifer is intruded with saltwater and consists of essentially flat-lying gravelly sands deposited by the ancestral Los Angeles River as broad channels that occupied a paleovalley incised into the coastal plain during the last glacio-eustatic highstand. The underlying sequences are deformed into

  16. A system for distributed intrusion detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snapp, S.R.; Brentano, J.; Dias, G.V.

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of ourmore » present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.« less

  17. Water Intrusion Problems in Transit Tunnels

    DOT National Transportation Integrated Search

    1986-05-01

    This report presents the findings of five case studies in which an in-depth analysis was made of tunnel water intrusion problems in transit tunnels. Water intrusion parameters of transit systems in Atlanta, Boston, Buffalo, New York and Washington, D...

  18. The role of intrusions in the formation of Irish-type mineralisation

    NASA Astrophysics Data System (ADS)

    McCusker, Jim; Reed, Christopher

    2013-08-01

    The Stonepark Prospect is located in County Limerick, south-central Ireland. Multiple zones of Zn-Pb mineralisation have been identified at Stonepark and these are approximately 5 km west of the Pallas Green Prospect. At Stonepark, the sulphide bodies are hosted within the Waulsortian Limestone and closely resemble other Irish-type deposits. The mineralisation is composed of pyrite-marcasite, sphalerite and galena with gangue Fe-dolomite and calcite cements. A key difference at Stonepark is the presence of Chadian-aged volcanic rocks (Knockroe Volcanics) that intrude into and overlie the Waulsortian Limestone. Subsequent hydrothermal brecciation of the Waulsortian Limestone and Knockroe intrusions resulted in the formation of tabular polymict breccia bodies containing mixed carbonate and clasts of intrusive rocks. These have then been overprinted by massive sulphide mineralisation. Further syn-mineralisation brecciation has overprinted the earlier breccias. Drilling has demonstrated a spatial relationship between the volume of intrusive rocks (dykes and polymict breccias) and Zn-Pb mineralisation. This association suggests that the intrusive rocks provided a mechanism for the introduction of the mineralising fluids into the breccia bodies. This is significant as to date no large controlling fault has been identified, as is seen at other Irish-type deposits. Further work is required to understand the alteration process of the intrusive rocks and how this may relate to the mineralising process.

  19. Compendium of Arms Control Verification Proposals.

    DTIC Science & Technology

    1982-03-01

    proposals. This appears to be the case for virtually all kinds of prospective arms control topics from general and complete disarmament to control of specific... virtually anywhere. Unrestricted access would be particularly necessary in the case of states which previously had nuclear weapons. Practically speaking...been transferred out of the area, it would be harder to check on remaining stocks without some intrusive inspection and it would be virtually impossible

  20. Rapid laccolith intrusion driven by explosive volcanic eruption

    NASA Astrophysics Data System (ADS)

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-11-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ~0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ~20-200 m and overpressures (~1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  1. Rapid laccolith intrusion driven by explosive volcanic eruption.

    PubMed

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  2. Acoustic emission intrusion detector

    DOEpatents

    Carver, Donald W.; Whittaker, Jerry W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  3. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  4. Playing the computer game Tetris prior to viewing traumatic film material and subsequent intrusive memories: Examining proactive interference.

    PubMed

    James, Ella L; Lau-Zhu, Alex; Tickle, Hannah; Horsch, Antje; Holmes, Emily A

    2016-12-01

    Visuospatial working memory (WM) tasks performed concurrently or after an experimental trauma (traumatic film viewing) have been shown to reduce subsequent intrusive memories (concurrent or retroactive interference, respectively). This effect is thought to arise because, during the time window of memory consolidation, the film memory is labile and vulnerable to interference by the WM task. However, it is not known whether tasks before an experimental trauma (i.e. proactive interference) would also be effective. Therefore, we tested if a visuospatial WM task given before a traumatic film reduced intrusions. Findings are relevant to the development of preventative strategies to reduce intrusive memories of trauma for groups who are routinely exposed to trauma (e.g. emergency services personnel) and for whom tasks prior to trauma exposure might be beneficial. Participants were randomly assigned to 1 of 2 conditions. In the Tetris condition (n = 28), participants engaged in the computer game for 11 min immediately before viewing a 12-min traumatic film, whereas those in the Control condition (n = 28) had no task during this period. Intrusive memory frequency was assessed using an intrusion diary over 1-week and an Intrusion Provocation Task at 1-week follow-up. Recognition memory for the film was also assessed at 1-week. Compared to the Control condition, participants in the Tetris condition did not report statistically significant difference in intrusive memories of the trauma film on either measure. There was also no statistically significant difference in recognition memory scores between conditions. The study used an experimental trauma paradigm and findings may not be generalizable to a clinical population. Compared to control, playing Tetris before viewing a trauma film did not lead to a statistically significant reduction in the frequency of later intrusive memories of the film. It is unlikely that proactive interference, at least with this task

  5. Young women's experiences of intrusive behavior in 12 countries.

    PubMed

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  6. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  7. Intrusion-based reasoning and depression: cross-sectional and prospective relationships.

    PubMed

    Berle, David; Moulds, Michelle L

    2014-01-01

    Intrusion-based reasoning refers to the tendency to form interpretations about oneself or a situation based on the occurrence of a negative intrusive autobiographical memory. Intrusion-based reasoning characterises post-traumatic stress disorder, but has not yet been investigated in depression. We report two studies that aimed to investigate this. In Study 1 both high (n = 42) and low (n = 28) dysphoric participants demonstrated intrusion-based reasoning. High-dysphoric individuals engaged in self-referent intrusion-based reasoning to a greater extent than did low-dysphoric participants. In Study 2 there were no significant differences in intrusion-based reasoning between currently depressed (n = 27) and non-depressed (n = 51) participants, and intrusion-based reasoning did not predict depressive symptoms at 6-month follow-up. Interestingly, previously (n = 26) but not currently (n = 27) depressed participants engaged in intrusion-based reasoning to a greater extent than never-depressed participants (n = 25), indicating the possibility that intrusion-based reasoning may serve as a "scar" from previous episodes. The implications of these findings are discussed.

  8. An automatically tuning intrusion detection system.

    PubMed

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  9. Rapid laccolith intrusion driven by explosive volcanic eruption

    PubMed Central

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-01-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ∼20–200 m and overpressures (∼1–10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards. PMID:27876800

  10. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  11. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  12. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  13. The effects of an anchovy (stolephorus insularis) substrate application on the level of fluor intrusion on Sprague Dawley rat teeth (in vivo)

    NASA Astrophysics Data System (ADS)

    Sakinah, N. R.; Gunawan, H. A.; Puspitawati, R.

    2017-08-01

    Fluoride intrusion is one of the efficacy parameters of fluoridation. Anchovy (Stolephorus insularis), which contains a high fluoride concentration in the CaF2compound, can be used as a fluoridative agent which is affordable and easily obtained. The aim of this study is to prove the effectiveness of the application of an anchovy substrate (Stolephorus insularis), either by a feeding method or a topical method, for tooth fluoridation based on the depth of fluoride intrusion on the enamel. An in vivo experimental laboratory method was used. The subjects were 14 Sprague Dawley rats divided into five groups. The groups included a baseline control, a feeding negative control, a topical negative control, an anchovy feeding method, and a topical solution anchovy method. After 15 days of treatment, the teeth were cut transversely with a 0.5 mm thickness then processed to test for fluoride intrusion using fluorescence microscopy. There was increased fluor intrusion on the enamel of the experimental groups compared to the negative control groups (p<0.05).Fluoride intrusion using the topical fluoride method is higher than with the feeding method (p <0.05). Thus, the application of an anchovy substrate, either by chewing or smearing, increases fluoride intrusion on the enamel.

  14. Vapor Intrusion Characterization Report (Revision 1.0)

    EPA Pesticide Factsheets

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  15. Intrusive Memories of Distressing Information: An fMRI Study

    PubMed Central

    Battaglini, Eva; Liddell, Belinda; Das, Pritha; Malhi, Gin; Felmingham, Kim

    2016-01-01

    Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI) to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42) viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13) demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13). Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC) and dorsolateral prefrontal cortex (dlPFC), inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories. PMID:27685784

  16. Review of SDDOT's highway access control process

    DOT National Transportation Integrated Search

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  17. Typing for Conflict Detection in Access Control Policies

    NASA Astrophysics Data System (ADS)

    Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge

    In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.

  18. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks

    PubMed Central

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-01-01

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks. PMID:27754380

  19. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks.

    PubMed

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-10-13

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks.

  20. Assessment of Mitigation Systems on Vapor Intrusion ...

    EPA Pesticide Factsheets

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor environments are often negatively pressurized with respect to outdoor air and soil gas (for example, from exhaust fans or the stack effect), and this pressure difference allows soil gas containing subsurface vapors to flow into indoor air through advection. In addition, concentration differentials cause VOCs and radon to migrate from areas of higher to lower concentrations through diffusion, which is another cause of vapor intrusion. Current practice for evaluating the vapor intrusion pathway involves a multiple line of evidence approach based on direct measurements in groundwater, external soil gas, subslab soil gas, and/or indoor air. No single line of evidence is considered definitive, and direct measurements of vapor intrusion can be costly, especially where significant spatial and temporal variability require repeated measurements at multiple locations to accurately assess the chronic risks of long-term exposure to volatile organic compounds (VOCs) like chloroform, perchloroethylene (PCE), and trichloroethylene (TCE).

  1. Magmatic intrusions in the lunar crust

    NASA Astrophysics Data System (ADS)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  2. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  3. Beta-blockers may reduce intrusive thoughts in newly diagnosed cancer patients.

    PubMed

    Lindgren, Monica E; Fagundes, Christopher P; Alfano, Catherine M; Povoski, Stephen P; Agnese, Doreen M; Arnold, Mark W; Farrar, William B; Yee, Lisa D; Carson, William E; Schmidt, Carl R; Kiecolt-Glaser, Janice K

    2013-08-01

    A cancer diagnosis provokes significant levels of emotional distress, with intrusive thoughts being the most common manifestation among breast cancer survivors. Cancer-related intrusive thoughts can take the form of emotional memories, flashbacks, nightmares, and intrusive images. Emotional arousal after a severe life stressor prolongs adrenergic activation, which in turn may increase risk for post-traumatic symptomatology. However, antihypertensive beta-blockers block adrenergic activation and are known to reduce traumatic memories and related psychological distress. Thus, the current study examined the association between beta-blocker use and the severity of cancer-related intrusive thoughts and related symptoms following a cancer diagnosis. The 174 breast and 36 female colorectal cancer patients who had recently undergone diagnostic screening or biopsy included 39 beta-blocker users and 171 non-users. Prior to any cancer treatment including surgery, participants completed questionnaires that included the Impact of Events Scale and the Center for Epidemiological Studies Depression Scale. Analyses controlled for age, education, cancer stage, cancer type, days since diagnosis, marital status, depression, and comorbidities. Although the high rates of cancer-related distress in this sample were similar to those of other studies with recently diagnosed patients, beta-blocker users endorsed 32% fewer cancer-related intrusive thoughts than non-users. Recently diagnosed cancer patients using beta-blockers reported less cancer-related psychological distress. These results suggest that beta-blocker use may benefit cancer patients' psychological adjustment following diagnosis, and provide a promising direction for future investigations on the pharmacological benefits of beta-blockers for cancer-related distress. Copyright © 2012 John Wiley & Sons, Ltd.

  4. Beta-blockers May Reduce Intrusive Thoughts in Newly Diagnosed Cancer Patients

    PubMed Central

    Lindgren, Monica E.; Fagundes, Christopher P.; Alfano, Catherine M.; Povoski, Stephen P.; Agnese, Doreen M.; Arnold, Mark W.; Farrar, William B.; Yee, Lisa D.; Carson, William E.; Schmidt, Carl R.; Kiecolt-Glaser, Janice K.

    2012-01-01

    Objective A cancer diagnosis provokes significant levels of emotional distress, with intrusive thoughts being the most common manifestation among breast cancer survivors. Cancer-related intrusive thoughts can take the form of emotional memories, flashbacks, nightmares, and intrusive images. Emotional arousal after a severe life stressor prolongs adrenergic activation, which in turn may increase risk for posttraumatic symptomatology. However, antihypertensive beta-blockers block adrenergic activation and are known to reduce traumatic memories and related psychological distress. Thus, the current study examined the association between beta-blocker use and the severity of cancer-related intrusive thoughts and related symptoms following a cancer diagnosis. Methods The 174 breast and 36 female colorectal cancer patients who had recently undergone diagnostic screening or biopsy included 39 beta-blocker users and 171 non-users. Prior to any cancer treatment including surgery, participants completed questionnaires that included the Impact of Events Scale (IES) and the Center for Epidemiological Studies Depression Scale (CES-D). Analyses controlled for age, education, cancer stage, cancer type, days since diagnosis, marital status, depression, and comorbidities. Results Although the high rates of cancer-related distress in this sample were similar to those of other studies with recently diagnosed patients, beta-blocker users endorsed 32% fewer cancer-related intrusive thoughts than non-users. Conclusions Recently diagnosed cancer patients using beta-blockers reported less cancer-related psychological distress. These results suggest that beta-blocker use may benefit cancer patients’ psychological adjustment following diagnosis, and provide a promising direction for future investigations on the pharmacological benefits of beta-blockers for cancer-related distress. PMID:23255459

  5. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  6. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    PubMed Central

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression. PMID:27069381

  7. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    PubMed

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  8. Adaptive top-down suppression of hippocampal activity and the purging of intrusive memories from consciousness.

    PubMed

    Benoit, Roland G; Hulbert, Justin C; Huddleston, Ean; Anderson, Michael C

    2015-01-01

    When reminded of unwanted memories, people often attempt to suppress these experiences from awareness. Prior work indicates that control processes mediated by the dorsolateral prefrontal cortex (DLPFC) modulate hippocampal activity during such retrieval suppression. It remains unknown whether this modulation plays a role in purging an intrusive memory from consciousness. Here, we combined fMRI and effective connectivity analyses with phenomenological reports to scrutinize a role for adaptive top-down suppression of hippocampal retrieval processes in terminating mnemonic awareness of intrusive memories. Participants either suppressed or recalled memories of pictures depicting faces or places. After each trial, they reported their success at regulating awareness of the memory. DLPFC activation was greatest when unwanted memories intruded into consciousness and needed to be purged, and this increased engagement predicted superior control of intrusive memories over time. However, hippocampal activity was decreased during the suppression of place memories only. Importantly, the inhibitory influence of the DLPFC on the hippocampus was linked to the ensuing reduction in intrusions of the suppressed memories. Individuals who exhibited negative top-down coupling during early suppression attempts experienced fewer involuntary memory intrusions later on. Over repeated suppressions, the DLPFC-hippocampus connectivity grew less negative with the degree that they no longer had to purge unwanted memories from awareness. These findings support a role of DLPFC in countermanding the unfolding recollection of an unwanted memory via the suppression of hippocampal processing, a mechanism that may contribute to adaptation in the aftermath of traumatic experiences.

  9. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  10. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  11. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  12. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  13. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  14. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  15. SAMPLING-BASED APPROACH TO INVESTIGATING VAPOR INTRUSION

    EPA Science Inventory

    Vapor intrusion is defined as the migration of volatile organic compounds (VOCs) into occupied buildings from contaminated soil or ground water. EPA recently developed guidance to facilitate assessment of vapor intrusion at sites regulated by RCRA and CERCLA. The EPA guidance e...

  16. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    USGS Publications Warehouse

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  17. Lower incisor intrusion with intraoral transosseous stainless steel wire anchorage in rabbits.

    PubMed

    Wu, Jian-chao; Huang, Ji-na; Lin, Xin-ping

    2010-06-01

    The purpose of this research was to investigate the potential use of intraoral transosseous stainless steel wires as anchorage for intrusion of the lower incisors using a rabbit model. Placement of intraoral transosseous stainless steel wires around incisors is similar to that of intraoral transosseous wiring of edentulous mandibular fractures. Ten male New Zealand rabbits, 9 +/- 1.5 months of age, average weight 1.8 +/- 0.3 kg, were used in this study. One lower incisor was intruded with a 50 g bilateral force using a coil spring for 10 weeks, while the other incisor served as the control. Clinical measurements of the distances between the occlusal edges of the incisors (EE) were performed weekly with a calliper. In addition to standard descriptive statistical calculations, a paired Student's t-test was used for comparison of the two groups. All surgical sites healed uneventfully after insertion of the wires. Significant differences were found in the change of EE between the experimental and control sides from 4 weeks onwards. Intrusion of the incisor, 4 +/- 0.58 mm, was seen on the test side, while EE on the control side remained unchanged. Within the limits of this animal study, it is concluded that the intraoral transosseous stainless steel wire anchorage system is a cost-effective method for intrusion of lower incisors when the use of other anchorage system is not possible.

  18. Evidential reasoning research on intrusion detection

    NASA Astrophysics Data System (ADS)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  19. Cross-Domain Synergy: Using Artillery in the Fight for Sea Control

    DTIC Science & Technology

    2017-04-28

    weapon systems designed to contest operational access to joint forces have given many countries low-cost options to prevent intrusion into their...systems designed to contest operational access to joint forces have given many countries low-cost options to prevent intrusion into their...1 The concept of anti-access is not new. The Great Wall of China and Athenian walls demonstrate this strategy has existed for

  20. Saltwater intrusion in coastal regions of North America

    USGS Publications Warehouse

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  1. Postemplacement dynamics of basaltic intrusions in the continental crust

    NASA Astrophysics Data System (ADS)

    Roman, A.; Jaupart, C.

    2017-02-01

    Laboratory experiments document the postemplacement behavior of mafic intrusions that spread at a density interface and founder as they become denser than their surroundings due to cooling and crystallization. All else being equal, the larger the intrusion volume, the farther the intrusion can spread and the smaller its aspect ratio is. The final aspect ratio is a function of a single dimensionless number analogous to the Rayleigh number of thermal convection. Once it is denser than its surroundings, the intrusion becomes unstable and may founder in two different regimes. At aspect ratios larger than about 0.4, the "teardrop" regime is such that the intrusion thickens in a central region, developing the shapes of a funnel and a pendant drop. At lower aspect ratios, another regime is observed, with thickening of the intrusion at the leading edge and thinning in a central region. The thick outer ring in turn becomes unstable into a set of teardrops and leads to an irregular horizontal outline. In one variant called the "jellyfish" regime, the thin central region develops a number of downwellings and upwellings in a Rayleigh-Taylor-like pattern. These instabilities may get arrested due to cooling as the intrusion and encasing rocks become too strong to deform. One would then be left with a funnel-shaped residual body or a wide irregular one with thick peripheral lobes and a thinner central region. These different patterns can be recognized in upper crustal mafic intrusions.

  2. Interactive Modelling of Salinity Intrusion in the Rhine-Meuse Delta

    NASA Astrophysics Data System (ADS)

    Baart, F.; Kranenburg, W.; Luijendijk, A.

    2015-12-01

    In many delta's of the world salinity intrusion imposes limits to fresh water availability. With increasing population and industry, the need for fresh water increases. But also salinity intrusion is expected to increase due to changes in river discharge, sea level and storm characteristics. In the Rhine-Meuse delta salt intrusion is impacted by human activities as well, like deepening of waterways and opening of delta-branches closed earlier. All these developments call for increasing the understanding of the system, but also for means for policy makers, coastal planners and engineers to assess effects of changes and to explore and design measures. In our presentation we present the developments in interactive modelling of salinity intrusion in the Rhine-Meuse delta. In traditional process-based numerical modelling, impacts are investigated by researchers and engineers by following the steps of pre-defining scenario's, running the model and post-processing the results. Interactive modelling lets users adjust simulations while running. Users can for instance change river discharges or bed levels, and can add measures like changes to geometry. The model will take the adjustments into account immediately, and will directly compute the effect. In this way, a tool becomes available with which coastal planners, policy makers and engineers together can develop and evaluate ideas and designs by interacting with the numerical model. When developing interactive numerical engines, one of the challenges is to optimize the exchange of variables as e.g. salt concentration. In our case we exchange variables on a 3D grid every time step. For this, the numerical model adheres to the Basic Model Interface (http://csdms.colorado.edu/wiki), which allows external control and the exchange of variables through pointers while the model is running. In our presentation we further explain our method and show examples of interactive design of salinity intrusion measures in the Rhine

  3. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  4. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  5. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  6. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  7. Vapour Intrusion into Buildings - A Literature Review

    EPA Science Inventory

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  8. Individual differences in experiencing intrusive memories: the role of the ability to resist proactive interference.

    PubMed

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J

    2009-06-01

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N=91) completed a self-report measure of intrusive memories, and carried out experimental tasks intended to measure two different types of inhibition: resistance to proactive interference and response inhibition (i.e., the ability to prevent automatically triggered responses). The results showed a significant relationship between inhibition at the cognitive level (i.e., resistance to proactive interference) and the frequency of intrusive memories (especially in the group of female participants) whereas no such relationship with measures of response inhibition emerged. These findings are consistent with the idea that deficient inhibitory control reflects a vulnerability factor for experiencing intrusive memories. Implications for research investigating risk factors for the development of posttraumatic stress disorder (PTSD) are discussed.

  9. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients.

    PubMed

    Bapat, Usha; Kedlya, Prashanth G

    2012-09-01

    To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD) patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients' above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life. Elderly, educated

  10. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  11. A New Intrusion Detection Method Based on Antibody Concentration

    NASA Astrophysics Data System (ADS)

    Zeng, Jie; Li, Tao; Li, Guiyang; Li, Haibo

    Antibody is one kind of protein that fights against the harmful antigen in human immune system. In modern medical examination, the health status of a human body can be diagnosed by detecting the intrusion intensity of a specific antigen and the concentration indicator of corresponding antibody from human body’s serum. In this paper, inspired by the principle of antigen-antibody reactions, we present a New Intrusion Detection Method Based on Antibody Concentration (NIDMBAC) to reduce false alarm rate without affecting detection rate. In our proposed method, the basic definitions of self, nonself, antigen and detector in the intrusion detection domain are given. Then, according to the antigen intrusion intensity, the change of antibody number is recorded from the process of clone proliferation for detectors based on the antigen classified recognition. Finally, building upon the above works, a probabilistic calculation method for the intrusion alarm production, which is based on the correlation between the antigen intrusion intensity and the antibody concen-tration, is proposed. Our theoretical analysis and experimental results show that our proposed method has a better performance than traditional methods.

  12. A Survey on Anomaly Based Host Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  13. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  14. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  15. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    NASA Astrophysics Data System (ADS)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  16. A new intrusion prevention model using planning knowledge graph

    NASA Astrophysics Data System (ADS)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  17. Type D personality, stress coping strategies and self-efficacy as predictors of Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Czuczwar, Stanisław Jerzy

    2017-07-01

    Recently, Facebook has become one of the most popular social networking sites. People use it more and more often. A number of studies have recently addressed the issue of excessive Facebook use, showing this phenomenon to be a spreading problem. The main aim of the present study was to examine whether Type D personality, self-efficacy and coping strategies are related to Facebook intrusion. The participants were 882 students of Polish universities, all of them Facebook users (72% women, mean age: 22.25 years, SD =2.06). We used the Facebook Intrusion Questionnaire, the Facebook Intensity Scale, the General Self-Efficacy Scale, the Coping Inventory for Stressful Situations, and the Type D Scale. We applied the pen-and-paper procedure. Our results indicate that emotion-oriented and avoidance-oriented strategies of coping in stressful situations are predictors of Facebook intrusion and Facebook intensity. The relations between both Facebook intrusion and intensity and social inhibition are significant only when emotion-oriented coping strategy is controlled. The knowledge of whether coping strategies in stressful situations, such as focus on emotions or avoidance, are related to Facebook intrusion might be useful for clinical purposes. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  18. Vapor Intrusion Assessment and Mitigation 2012

    DTIC Science & Technology

    2012-03-26

    1 Geosyntec 0 consultants Vapor Intrusion Assessment and Mitigation 2012 Robert Ettinger, M.S., P.E., Todd McAiary, M.Sc., P.Eng., P.G...REPORT DATE 26 MAR 2012 2. REPORT TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE Vapor Intrusion Assessment and...Updates • Typical Assessment Approaches and Common Challenges • Methods to Distinguish Background Sources (McHugh) • Significance • Compound

  19. Open-MRI measures of cam intrusion for hips in an anterior impingement position relate to acetabular contact force.

    PubMed

    Buchan, Lawrence L; Zhang, Honglin; Konan, Sujith; Heaslip, Ingrid; Ratzlaff, Charles R; Wilson, David R

    2016-02-01

    Open MRI in functional positions has potential to directly and non-invasively assess cam femoroacetabular impingement (FAI). Our objective was to investigate whether open MRI can depict intrusion of the cam deformity into the intra-articular joint space, and whether intrusion is associated with elevated acetabular contact force. Cadaver hips (9 cam; 3 controls) were positioned in an anterior impingement posture and imaged using open MRI with multi-planar reformatting. The β-angle (describing clearance between the femoral neck and acetabulum) was measured around the entire circumference of the femoral neck. We defined a binary "MRI cam-intrusion sign" (positive if β < 0°). We then instrumented each hip with a piezoresistive sensor and conducted six repeated positioning trials, measuring acetabular contact force (F). We defined a binary "contact-force sign" (positive if F > 20N). Cam hips were more likely than controls to have both a positive MRI cam-intrusion sign (p = 0.0182, Fisher's exact test) and positive contact-force sign (p = 0.0083), which represents direct experimental evidence for cam intrusion. There was also a relationship between the MRI cam-intrusion sign and contact-force sign (p = 0.033), representing a link between imaging and mechanics. Our findings indicate that open MRI has significant potential for in vivo investigation of the cam FAI mechanism. © 2015 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  20. Noble gas systematics of the Skaergaard intrusion

    NASA Astrophysics Data System (ADS)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Ra<1) along the margin of the intrusion indicates that noble gases from the Archean host-rock were incorporated into the cooling magma chamber, probably via magmatic assimilation. Noble gases in olivines from the upper portions of the intrusion have atmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  1. Sill intrusion in volcanic calderas: implications for vent opening probability

    NASA Astrophysics Data System (ADS)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  2. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  3. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  4. Programmable Direct-Memory-Access Controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F.

    1990-01-01

    Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.

  5. Cup-shaped Intrusions, Morphology and Emplacement Mechanism Investigate Through Analogue Modelling

    NASA Astrophysics Data System (ADS)

    Mathieu, L.; van Wyk de Vries, B.

    2007-12-01

    We investigate the morphology of large-scale shallow-depth magma intrusions and sub-volcanic complexes with analogue models. Intrusions of analogue magma are done in a granular material that can contain a ductile layer. The model surface is flat to model the formation of plutonic intrusions and it is overlain by a cone when modelling late sub-volcanic complexes. For flat-top models, we obtain cup-shaped intrusions fed by dykes. Cup-shaped intrusions are inverted-cone like bodies. They are different from saucer-shaped intrusions as they possess neither a well developed sill-base, nor an outer rim. However, like saucers, cups are shallow depth intrusions that dome the country rocks. They initiate from an advancing dyke and first develop an inverted-cone like morphology. Then, the central thickness increases and thrusts form at the edge of the domed country rocks. At this stage, the intrusions progressively involve toward a lopolith shape. By using analogue magma of various viscosities we have been able to constrain key relationships: higher intrusion viscosity causes deeper initiation and the deeper they initiate, the larger is the intrusion diameter. A natural example of such intrusion might by the circles of volcanoes like the Azufre-Lastaria (Peru) that might be overlain be a large-scale cup-shaped intrusion. When adding a cone at the surface of the model and, sometimes, a thin ductile layer in the substratum, the morphology of cup-shaped intrusions vary. Note that the ductile layer of our models is not thick enough to induce the gravitational spreading of the cone. Generally, cup-shaped intrusions are asymmetric in cross section and elliptical in plan view. Their formation creates extension structures in the cone (croissant-shaped rift, straight rift or normal fault) and thrusts in some sectors below the cone. Both types of structures are bordered by strike-slip faults. Cups and saucers share many similarities, but differ probably in the fact that saucers are

  6. Continental crust formation on early Earth controlled by intrusive magmatism

    NASA Astrophysics Data System (ADS)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-05-01

    The global geodynamic regime of early Earth, which operated before the onset of plate tectonics, remains contentious. As geological and geochemical data suggest hotter Archean mantle temperature and more intense juvenile magmatism than in the present-day Earth, two crust-mantle interaction modes differing in melt eruption efficiency have been proposed: the Io-like heat-pipe tectonics regime dominated by volcanism and the “Plutonic squishy lid” tectonics regime governed by intrusive magmatism, which is thought to apply to the dynamics of Venus. Both tectonics regimes are capable of producing primordial tonalite-trondhjemite-granodiorite (TTG) continental crust but lithospheric geotherms and crust production rates as well as proportions of various TTG compositions differ greatly, which implies that the heat-pipe and Plutonic squishy lid hypotheses can be tested using natural data. Here we investigate the creation of primordial TTG-like continental crust using self-consistent numerical models of global thermochemical convection associated with magmatic processes. We show that the volcanism-dominated heat-pipe tectonics model results in cold crustal geotherms and is not able to produce Earth-like primordial continental crust. In contrast, the Plutonic squishy lid tectonics regime dominated by intrusive magmatism results in hotter crustal geotherms and is capable of reproducing the observed proportions of various TTG rocks. Using a systematic parameter study, we show that the typical modern eruption efficiency of less than 40 per cent leads to the production of the expected amounts of the three main primordial crustal compositions previously reported from field data (low-, medium- and high-pressure TTG). Our study thus suggests that the pre-plate-tectonics Archean Earth operated globally in the Plutonic squishy lid regime rather than in an Io-like heat-pipe regime.

  7. Continental crust formation on early Earth controlled by intrusive magmatism.

    PubMed

    Rozel, A B; Golabek, G J; Jain, C; Tackley, P J; Gerya, T

    2017-05-18

    The global geodynamic regime of early Earth, which operated before the onset of plate tectonics, remains contentious. As geological and geochemical data suggest hotter Archean mantle temperature and more intense juvenile magmatism than in the present-day Earth, two crust-mantle interaction modes differing in melt eruption efficiency have been proposed: the Io-like heat-pipe tectonics regime dominated by volcanism and the "Plutonic squishy lid" tectonics regime governed by intrusive magmatism, which is thought to apply to the dynamics of Venus. Both tectonics regimes are capable of producing primordial tonalite-trondhjemite-granodiorite (TTG) continental crust but lithospheric geotherms and crust production rates as well as proportions of various TTG compositions differ greatly, which implies that the heat-pipe and Plutonic squishy lid hypotheses can be tested using natural data. Here we investigate the creation of primordial TTG-like continental crust using self-consistent numerical models of global thermochemical convection associated with magmatic processes. We show that the volcanism-dominated heat-pipe tectonics model results in cold crustal geotherms and is not able to produce Earth-like primordial continental crust. In contrast, the Plutonic squishy lid tectonics regime dominated by intrusive magmatism results in hotter crustal geotherms and is capable of reproducing the observed proportions of various TTG rocks. Using a systematic parameter study, we show that the typical modern eruption efficiency of less than 40 per cent leads to the production of the expected amounts of the three main primordial crustal compositions previously reported from field data (low-, medium- and high-pressure TTG). Our study thus suggests that the pre-plate-tectonics Archean Earth operated globally in the Plutonic squishy lid regime rather than in an Io-like heat-pipe regime.

  8. Factors controlling the permeability distribution in fault vein zones surrounding granitic intrusions (Ore Mountains/Germany)

    NASA Astrophysics Data System (ADS)

    Achtziger-Zupančič, P.; Loew, S.; Hiller, A.

    2017-03-01

    An outstanding legacy data set has been compiled from underground excavations mostly prospected and mined by the former Soviet (German) Stock Company Wismut describing the hydrology of faulted basement rocks in the Ore Mountains (SE Germany). It consists of more than 5000 detailed descriptions of groundwater inflows to about 660 km of tunnels and 57 km of drillings measured during or shortly after excavation. Inflow measurements (recorded between 1E-8 and 4E-2 m3/s) have been converted to fracture transmissivities using a simplified analytical solution. Discarding site specific effects, the median log transmissivity decreases from 1E-7 to 1E-10 m2/s within the studied depth interval of 0-2000 meters below ground surface (mbgs), and the spacing of conductive fracture increases from 0.1 to 2500 m. This general trend is overprinted at three mining sites by a clear reversal of fracture transmissivity which correlates with contact metamorphic aureoles around Variscan granite intrusions (327-295 Ma). We hypothesize that this transmissivity increase is caused by processes accompanying granite intrusion and contact metamorphism. The thickness of these hydraulically active aureoles is greater in lower-grade metamorphic schist than in higher-grade metamorphic gneisses. Rock mass equivalent continuum conductivities have been estimated by arithmetic averaging of fracture and matrix transmissivities over 100 m intervals and have been converted to permeabilities. The median equivalent continuum permeability decreases with depth according to log(k) = - 1.7 * log(z) - 17.3 (k in m2 and increasing depth z in kilometer being positive). Matrix conductivity controls the bulk conductivity below about 1000 mbgs and is less sensitive to the occurrence of contact metamorphic aureoles.

  9. Intrusive Memories in Perpetrators of Violent Crime: Emotions and Cognitions

    ERIC Educational Resources Information Center

    Evans, Ceri; Ehlers, Anke; Mezey, Gillian; Clark, David M.

    2007-01-01

    The authors investigated factors that may determine whether perpetrators of violent crime develop intrusive memories of their offense. Of 105 young offenders who were convicted of killing or seriously harming others, 46% reported distressing intrusive memories, and 6% had posttraumatic stress disorder. Intrusions were associated with lower…

  10. Seismic signature of active intrusions in mountain chains.

    PubMed

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  11. Seismic signature of active intrusions in mountain chains

    PubMed Central

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains. PMID:29326978

  12. Wind-forced salt intrusion into a tributary estuary

    NASA Astrophysics Data System (ADS)

    Sanford, Lawrence P.; Boicourt, William C.

    1990-08-01

    Moored measurements and hydrographic surveys were carried out during the summers of 1986 and 1987 to examine interaction between the mainstem of the Chesapeake Bay and the Choptank River, an eastern shore tributary estuary. The data show that an important mode of interaction is through wind-forced intrusion of saline, hypoxic water from below the pycnocline of the Bay into the lower river. Intrusions are driven by lateral tilting of the pycnocline in the Bay, when high salinity water is upwelled on the eastern side of the Bay in response to a southward pulse of wind stress. The resulting internal surges propagate up the relict Choptank entrance channel at a speed of about 20 cm/s and spill onto the broad sill inside the mouth of the river. Intrusion-favorable pycnocline tilts in the Bay do not always result in lower layer intrusion into the Choptank, but may be blocked or choked in the entrance channel on occasion. The data suggest that wind-forced intrusion of salt leads to increased gravitational circulation in the Choptank during the summer months, providing a mechanism through which high frequency energy may be directly translated into lower frequency motion.

  13. Heart rate, startle response, and intrusive trauma memories

    PubMed Central

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  14. Intrusion errors in visuospatial working memory performance.

    PubMed

    Cornoldi, Cesare; Mammarella, Nicola

    2006-02-01

    This study tested the hypothesis that failure in active visuospatial working memory tasks involves a difficulty in avoiding intrusions due to information that is already activated. Two experiments are described, in which participants were required to process several series of locations on a 4 x 4 matrix and then to produce only the final location of each series. Results revealed a higher number of errors due to already activated locations (intrusions) compared with errors due to new locations (inventions). Moreover, when participants were required to pay extra attention to some irrelevant (non-final) locations by tapping on the table, intrusion errors increased. Results are discussed in terms of current models of working memory functioning.

  15. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    DTIC Science & Technology

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  16. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.

    2013-11-14

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  17. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    PubMed

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Intrusions in story recall: when over-learned information interferes with episodic memory recall. Evidence from Alzheimer's disease.

    PubMed

    De Anna, Francesca; Attali, Eve; Freynet, Laurence; Foubert, Lucie; Laurent, Aurore; Dubois, Bruno; Dalla Barba, Gianfranco

    2008-03-01

    Patients with Alzheimer's disease (AD) suffer from distortions of memory. Among such distortions, intrusions in memory tests are frequently observed. In this study we describe the performance of a group of mild AD patients and a group of normal controls on the recall of three different types of stories: a previously unknown story, a well-known fairy-tale (Cinderella), and a modified well-known fairy-tale (Little Red Riding Hood is not eaten by the wolf). The aim of our study was to test the hypothesis that in patients who tend to produce intrusions, over-learned information interferes with episodic recall, i.e., the retrieval of specific, unique past episodes. AD patients produced significantly more intrusions in the recall of the modified fairy-tale compared to the recall of the two other stories. Intrusions in the recall of the modified fairy-tale always consisted of elements of the original version of the story. We suggest that in AD patients intrusions may be traced back to the interference of strongly represented, over-learned information in episodic memory recall.

  19. Hydrogeologic conditions and saline-water intrusion, Cape Coral, Florida, 1978-81

    USGS Publications Warehouse

    Fitzpatrick, D.J.

    1986-01-01

    The upper limestone unit of the intermediate aquifer system, locally called the upper Hawthorn aquifer, is the principal source of freshwater for Cape Coral, Florida. The aquifer has been contaminated with saline water by downward intrusion from the surficial aquifer system and by upward intrusion from the Floridan aquifer system. Much of the intrusion has occurred through open wellbores where steel casings are short or where casings have collapsed because of corrosion. Saline-water contamination of the upper limestone unit due to downward intrusion from the surficial aquifer is most severe in the southern and eastern parts of Cape Coral; contamination due to upward intrusion has occurred in many areas throughout Cape Coral. Intrusion is amplified in areas of heavy water withdrawals and large water-level declines. (USGS)

  20. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    DTIC Science & Technology

    2013-09-16

    fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011

  1. Fact Sheets and Letter to Residents: St. Louis Park Vapor Intrusion Site

    EPA Pesticide Factsheets

    Fact Sheets and letters to residents related to the St. Louis Park Vapor Intrusion site. Samples of ground water taken in St. Louis Park in 2005 and 2006 by the Minnesota Pollution Control Agency were found to contain volatile organic compounds, VOCs.

  2. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  3. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  4. Procrastination as a Self-Regulation Failure: The Role of Impulsivity and Intrusive Thoughts.

    PubMed

    Rebetez, Marie My Lien; Rochat, Lucien; Barsics, Catherine; Van der Linden, Martial

    2018-02-01

    Procrastination has been described as the quintessence of self-regulatory failure. This study examines the relationships between this self-regulatory failure and other manifestations of self-regulation problems, namely impulsivity and intrusive thoughts. One hundred and forty-one participants completed questionnaires assessing procrastination, impulsivity (in particular, the urgency and lack of perseverance dimensions), and intrusive thoughts (i.e., rumination and daydreaming). Main results show that urgency mediated the association between rumination and procrastination, whereas rumination did not mediate the relation between urgency and procrastination. Lack of perseverance mediated the association between daydreaming and procrastination, and daydreaming mediated the relation between lack of perseverance and procrastination. This study highlights the role of impulsivity and intrusive thoughts in procrastination, specifies the links between these self-regulation problems, and provides insights into their (potential) underlying mechanisms. It also opens interesting prospects for management strategies for implementing targeted psychological interventions to reduce impulsive manifestations and/or thought control difficulties accompanying procrastination.

  5. Politically-focused intrusive thoughts and associated ritualistic behaviors in a community sample.

    PubMed

    Cepeda, Sandra L; McKay, Dean; Schneider, Sophie C; La Buissonnière-Ariza, Valérie; Egberts, Jolenthe T N E; McIngvale, Elizabeth; Goodman, Wayne K; Storch, Eric A

    2018-05-01

    A significant proportion of the U.S. population report increased stress attributed to the political climate following the controversial 2016 United States (U.S.) Presidential election. The political stressors paired with the growth in news consumption and social media-use could be a potential trigger for obsessive-compulsive-like symptoms specific to politics in some individuals. This study aimed to elucidate the rate of Politically-focused Intrusive Thoughts and associated Ritualistic Behaviors (PITRB), their demographic and clinical correlates, and the degree of association with political ideology. Survey data were collected using the crowdsourcing platform Mechanical Turk. A total of N = 484 individuals completed the survey. Measures of politically-focused intrusive thoughts and ritualistic behaviors, general obsessive-compulsive symptoms, depression, anxiety, anxiety control, worry, and disability were administered, as well as a measure of social and economic conservative affiliation. Results showed that a quarter of the sample (25.2%) had at least one PITRB more than once a day. PITRB was associated with all measures of psychopathology and disability. Finally, anxiety control moderated the relationship between PITRB and both anxiety and depression. No differences in psychopathology were found between major party affiliations. The findings suggest that politically-focused intrusive thoughts and ritualistic behaviors are associated with psychopathology domains in a manner comparable to general obsessive-compulsive symptoms. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Speed control system for an access gate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bzorgi, Fariborz M

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the outputmore » element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.« less

  7. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  8. Thought-action fusion as a causal factor in the development of intrusions.

    PubMed

    Rassin, E; Merckelbach, H; Muris, P; Spaan, V

    1999-03-01

    Thought-action fusion refers to the tendency to treat thoughts and actions as equivalents. Some authors (e.g., Rachman, 1997; Behaviour Research and Therapy, 35, 793-802) have suggested that thought-action fusion plays a role in the etiology of obsessive intrusions. The present study sought to test this idea. Subjects (n = 19) in the experimental condition underwent a bogus EEG recording session. They were informed that the apparatus was able to pick up the word 'apple' and that thoughts of that word could result in the administration of electrical shocks to another person. After having spent 15 minutes in the EEG laboratory, experimental subjects and controls (n = 26) completed a short questionnaire containing items about characteristics of the target thought (e.g., frequency, aversiveness). Results indicate that thought-action fusion, indeed, promotes intrusive thinking in that it results in a higher frequency of target thoughts, more discomfort, and more resistance. Thus, the current findings support the idea that thought-action fusion may contribute to the development of obsessive intrusions.

  9. Body, mother, mind: anorexia, femininity and the intrusive object.

    PubMed

    Lawrence, Marilyn

    2002-08-01

    This paper takes as its starting point the preponderance of female to male patients who suffer from anorexia. The author suggests that there may be something specific about certain experiences of femaleness which predispose towards anxieties of intrusion. Two contemporary theories of the aetiology of anorexia are outlined. Both of these suggest that the problem has its origins in intrusion or invasion of different sorts. The author suggests that many women who suffer from anorexia have an intrusive object instated in their minds, which may not necessarily be the result of actual intrusions in external reality. In the final part of the paper, the author examines the intrusiveness of anorexic patients in the transference and suggests that such patients very often harbour profound phantasies of intruding between the parents, with a wish to regain their special place with mother, untroubled by the presence of father. It is further suggested that the psychopathology underlying certain cases of anorexia leads to a failure in symbolisation. This failure in turn complicates the clinical picture, making such patients particularly difficult to think with about their difficulties.

  10. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  11. Acceptance- and imagery-based strategies can reduce chocolate cravings: A test of the elaborated-intrusion theory of desire.

    PubMed

    Schumacher, Sophie; Kemps, Eva; Tiggemann, Marika

    2017-06-01

    The elaborated-intrusion theory of desire proposes that craving is a two-stage process whereby initial intrusions about a desired target are subsequently elaborated with mental imagery. The present study tested whether the craving reduction strategies of cognitive defusion and guided imagery could differentially target the intrusion and elaboration stages, respectively, and thus differentially impact the craving process. Participants were randomly assigned to a cognitive defusion, a guided imagery or a mind-wandering control condition. Pre- and post-intervention chocolate-related thoughts, intrusiveness of thoughts, vividness of imagery, craving intensity, and chocolate consumption were compared. Experiment 1 recruited a general sample of young women (n = 94), whereas Experiment 2 recruited a sample of chocolate cravers who wanted to reduce their chocolate consumption (n = 97). Across both experiments, cognitive defusion lowered intrusiveness of thoughts, vividness of imagery and craving intensity. Guided imagery reduced chocolate-related thoughts, intrusiveness, vividness and craving intensity for chocolate cravers (Experiment 2), but not for the general sample (Experiment 1). There were no group differences in chocolate consumption in either experiment. Results add to existing evidence supporting the elaborated-intrusion theory of desire in the food domain, and suggest that acceptance- and imagery-based techniques have potential for use in combatting problematic cravings. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  13. The architecture of a network level intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.; Maccabe, A.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  14. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  15. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  16. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  17. Toddler Inhibited Temperament, Maternal Cortisol Reactivity and Embarrassment, and Intrusive Parenting

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2013-01-01

    The relevance of parenting behavior to toddlers’ development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers’ inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multi-method approach would acknowledge that several levels of processes determine mothers’ experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers’ inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-olds toddlers and their mothers. Toddlers’ inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PMID:23750532

  18. Performance Assessment of Network Intrusion-Alert Prediction

    DTIC Science & Technology

    2012-09-01

    the threats. In this thesis, we use Snort to generate the intrusion detection alerts. 2. SNORT Snort is an open source network intrusion...standard for IPS. (Snort, 2012) We choose Snort because it is an open source product that is free to download and can be deployed cross-platform...Learning & prediction in relational time series: A survey. 21st Behavior Representation in Modeling & Simulation ( BRIMS ) Conference 2012, 93–100. Tan

  19. Testing alternative conceptual models of seawater intrusion in a coastal aquifer using computer simulation, southern California, USA

    USGS Publications Warehouse

    Nishikawa, Tracy

    1997-01-01

    Two alternative conceptual models of the physical processes controlling seawater intrusion in a coastal basin in California, USA, were tested to identify a likely principal pathway for seawater intrusion. The conceptual models were tested by using a two-dimensional, finite-element groundwater flow and transport model. This pathway was identified by the conceptual model that best replicated the historical data. The numerical model was applied in cross section to a submarine canyon that is a main avenue for seawater to enter the aquifer system underlying the study area. Both models are characterized by a heterogeneous, layered, water-bearing aquifer. However, the first model is characterized by flat-lying aquifer layers and by a high value of hydraulic conductivity in the basal aquifer layer, which is thought to be a principal conduit for seawater intrusion. The second model is characterized by offshore folding, which was modeled as a very nearshore outcrop, thereby providing a shorter path for seawater to intrude. General conclusions are that: 1) the aquifer system is best modeled as a flat, heterogeneous, layered system; 2) relatively thin basal layers with relatively high values of hydraulic conductivity are the principal pathways for seawater intrusion; and 3) continuous clay layers of low hydraulic conductivity play an important role in controlling the movement of seawater.

  20. No evidence for differential dose effects of hydrocortisone on intrusive memories in female patients with complex post-traumatic stress disorder--a randomized, double-blind, placebo-controlled, crossover study.

    PubMed

    Ludäscher, Petra; Schmahl, Christian; Feldmann, Robert E; Kleindienst, Nikolaus; Schneider, Miriam; Bohus, Martin

    2015-10-01

    Post-traumatic stress disorder is characterized by intrusive traumatic memories. Presently, a controversial debate is ongoing regarding whether reduced cortisol secretion in post-traumatic stress disorder promotes an automatic retrieval of trauma-associated memories. Hence, a pharmacological elevation of cortisol was proposed to decrease post-traumatic stress disorder symptoms, particularly intrusions. The present study investigated the impact of two different doses of hydrocortisone on automatic memory retrieval using a randomized, double-blind, placebo-controlled, crossover study in 30 inpatients with post-traumatic stress disorder. All participants were female and received various psychotropic medications. They were randomly assigned to one of two groups within a crossover design: they received either 1 week placebo followed by 1 week hydrocortisone 10/d, followed by 1 week placebo, followed by hydrocortisone 30 mg/d (15 participants) or 1 week hydrocortisone 30 mg/d, followed by 1 week placebo, followed by 1 week hydrocortisone 10 mg/d, followed by 1 week placebo (15 participants). The outcome measures were the frequency and the intensity of intrusions, the overall symptomatology of post-traumatic stress disorder and the general psychopathology. We did not find any differences in the frequency and the intensity of post-traumatic stress disorder-related intrusions between the 10 mg hydrocortisone, the 30 mg hydrocortisone and the placebo condition. All effect sizes for the hydrocortisone condition vs. placebo were very small. Additionally, the overall symptomatology of post-traumatic stress disorder and the general psychopathology did not differ between the hydrocortisone therapies and placebo. Our results do not show any effect of the hydrocortisone administration on intrusions in complex post-traumatic stress disorder. © The Author(s) 2015.

  1. A Survey of Artificial Immune System Based Intrusion Detection

    PubMed Central

    Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  2. A survey of artificial immune system based intrusion detection.

    PubMed

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  3. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  4. Non-Intrusive Pressure/Multipurpose Sensor and Method

    NASA Technical Reports Server (NTRS)

    Smith, William C. (Inventor)

    2001-01-01

    Method and apparatus are provided for determining pressure using a non-intrusive sensor that is easily attachable to the plumbing of a pressurized system. A bent mode implementation and a hoop mode implementation of the invention are disclosed. Each of these implementations is able to nonintrusively measure pressure while fluid is flowing. As well, each implementation may be used to measure mass flow rate simultaneously with pressure. An ultra low noise control system is provided for making pressure measurements during gas flow. The control system includes two tunable digital bandpass filters with center frequencies that are responsive to a clock frequency. The clock frequency is divided by a factor of N to produce a driving vibrational signal for resonating a metal sensor section.

  5. Railway clearance intrusion detection method with binocular stereo vision

    NASA Astrophysics Data System (ADS)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  6. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  7. BTSC VAPOR INSTRUSION PRIMER "VAPOR INTRUSION CONSIDERATION FOR REDEVELOPMENT"

    EPA Science Inventory

    This primer is designed for brownfields stakeholders concerned about vapor intrusion, including property owners, real estate developers, and contractors performing environmental site investigations. It provides an overview of the vapor intrusion issue and how it can impact the ap...

  8. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    PubMed

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  9. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    NASA Astrophysics Data System (ADS)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    Observations during recent decades show that there is a greater near surface warming occurring in the Arctic, particularly during winter, than at lower latitudes. Understanding the mechanisms controlling surface temperature in the Arctic is therefore an important priority in climate research. The surface energy budget is a key proximate control on Arctic surface temperature. During winter, insolation is low or absent and the atmospheric boundary layer is typically very stable, limiting turbulent hear exchange, so that the surface energy budget is almost entirely governed by longwave radiation. The net surface longwave radiation (NetLW) at this time has a strikingly bimodal distribution: conditions oscillate between a 'radiatively clear' state with rapid surface heat loss and a "moist cloudy" state with NetLW ˜ 0 W m-2. Each state can persist for days or weeks at a time but transitions between them happen in a matter of hours. This distribution of NetLW has important implications for the Arctic climate, as even a small shift in the frequency of occupancy of each state would be enough to significantly affect the overall surface energy budget and thus winter sea ice thickness. The clear and cloudy states typically occur during periods of relatively high and low surface pressure respectively, suggesting a link with synoptic-scale dynamics. This suggestion is consistent with previous studies indicating that the formation of low-level and mid-level clouds over the Arctic Ocean is typically associated with cyclonic activity and passing frontal systems . More recent work has shown that intense filamentary moisture intrusion events are a common feature in the Arctic and can induce large episodic increases of longwave radiation into the surface. The poleward transport of water vapor across 70N during boreal winter is examined in the ERA-Interim reanalysis product and 16 of the Coupled Model Intercomparison Project Phase 5 (CMIP5) models, focusing on intense moisture

  10. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  11. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  12. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    NASA Astrophysics Data System (ADS)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  13. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  14. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  15. The pattern and variability of winter Kuroshio intrusion northeast of Taiwan

    NASA Astrophysics Data System (ADS)

    Liu, Xiaohui; Dong, Changming; Chen, Dake; Su, Jilan

    2014-08-01

    The variations of the Kuroshio path and velocity northeast of Taiwan are analyzed based on along-track satellite altimeter data as well as high-resolution model experiments. Observations reveal that in winter the Kuroshio intrusion into the East China Sea (ECS) at this location is manifested by a secondary maximum current core (SMCC) shoreward of the Kuroshio's main path. The SMCC varies significantly on interannual time scale, and its variability is strikingly out of phase with that of the Kuroshio entering the ECS, meaning that the stronger the Kuroshio, the weaker the SMCC, and vice versa. Model experiments corroborate the observational results and, more importantly, indicate that the Kuroshio intrusion here follows two primary routes, a large anticyclonic loop that separates from the Kuroshio at the northern end of Taiwan and moves forward to form the SMCC, and a straight northward path onto the shelf when the Kuroshio turns sharply eastward along the continental slope of the ECS. The intrusion is controlled by both local forcing and remote effect, with its pattern and variability depending mostly on the local heat flux and the inertia of the Kuroshio Current. This article was corrected on 12 SEP 2014. See the end of the full text for details.

  16. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  17. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  18. Interfacial Granular Intrusions

    NASA Astrophysics Data System (ADS)

    Linden, Paul; Zheng, Zhong; Huppert, Herbert; Vriend, Nathalie; Neufeld, Jerome

    2017-11-01

    We study experimentally the intrusion of light granular material into an inviscid fluid of greater density. Despite a rich set of related geophysical and environmental phenomena, such as the spreading of calved ice and volcanic ash and debris flows, there are few previous studies on this topic. We conduct a series of lock-release experiments of light spherical beads into a rectangular tank initially filled with either fresh water or salt water, and record the time evolution of the interface shape and the front location of the current of beads. In particular, we find that the front location obeys a power-law behaviour during an intermediate time period following the release of the lock before the nose of beads reaches a maximum runout distance within a finite time. We investigate the dependence of the scaling exponent and runout distance on the total amount of beads, the initial lock length, and the properties of the liquid that fills the tank in the experiments. Appropriate scaling arguments are provided to collapse the raw experimental data into universal curves, which can be used to describe the front dynamics of light granular intrusions with different size and buoyancy effects and initial aspect ratios.

  19. Zone of intrusion study.

    DOT National Transportation Integrated Search

    2010-10-15

    The Midwest Roadside Safety Facility (MwRSF) performed an analysis using LS-DYNA simulation to investigate the zone of intrusion (ZOI) of an NCHRP Report No. 350 2000p pickup truck when impacting a 40-in. high F-shape parapet. : The ZOI for the 40-in...

  20. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    ERIC Educational Resources Information Center

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  1. Intrusion Detection: Generics and State-of-the-Art (la Detection de l’intrusion: Modeles generiques et etat de l’art)

    DTIC Science & Technology

    2002-01-01

    by the user for a number of possible pre-defined intrusions. One of these pre-defined intrusions is the command “get /etc/ passwd ”. If this command is...Application-level firewalls: which check communication at the application level. An example is the string get /etc/ passwd in the ftp protocol

  2. Mapping saltwater intrusion in the Biscayne Aquifer, Miami-Dade County, Florida using transient electromagnetic sounding

    USGS Publications Warehouse

    Fitterman, David V.

    2014-01-01

    Saltwater intrusion in southern Florida poses a potential threat to the public drinking-water supply that is typically monitored using water samples and electromagnetic induction logs collected from a network of wells. Transient electromagnetic (TEM) soundings are a complementary addition to the monitoring program because of their ease of use, low cost, and ability to fill in data gaps between wells. TEM soundings have been used to map saltwater intrusion in the Biscayne aquifer over a large part of south Florida including eastern Miami-Dade County and the Everglades. These two areas are very different with one being urban and the other undeveloped. Each poses different conditions that affect data collection and data quality. In the developed areas, finding sites large enough to make soundings is difficult. The presence of underground pipes further restricts useable locations. Electromagnetic noise, which reduces data quality, is also an issue. In the Everglades, access to field sites is difficult and working in water-covered terrain is challenging. Nonetheless, TEM soundings are an effective tool for mapping saltwater intrusion. Direct estimates of water quality can be obtained from the inverted TEM data using a formation factor determined for the Biscayne aquifer. This formation factor is remarkably constant over Miami-Dade County owing to the uniformity of the aquifer and the absence of clay. Thirty-six TEM soundings were collected in the Model Land area of southeast Miami-Dade County to aid in calibration of a helicopter electromagnetic (HEM) survey. The soundings and HEM survey revealed an area of saltwater intrusion aligned with canals and drainage ditches along U.S. Highway 1 and the Card Sound Road. These canals and ditches likely reduced freshwater levels through unregulated drainage and provided pathways for seawater to flow at least 12.4 km inland.

  3. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  4. Hormone-dependent control of developmental timing through regulation of chromatin accessibility

    PubMed Central

    Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.

    2017-01-01

    Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147

  5. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    PubMed Central

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  6. Cognitive avoidance of intrusive memories: recall vantage perspective and associations with depression.

    PubMed

    Williams, Alishia D; Moulds, Michelle L

    2007-06-01

    Although recent research demonstrates that intrusive memories represent an overlapping cognitive feature of depression and post-traumatic stress disorder (PTSD), there is still a general paucity of research investigating the prevalence and maintenance of intrusive memories in depression. The current study investigated the association between a range of cognitive avoidant mechanisms that characterize PTSD samples (i.e., suppression, rumination, emotional detachment, and an observer vantage perspective) and intrusive memories of negative autobiographical events in relation to dysphoria. Hypotheses were based on the proposition that employment of these cognitive mechanisms would hinder the emotional processing of the negative event, thus contributing to the maintenance of intrusions. Results supported an association between negative intrusive memories, dysphoria, and avoidant mechanisms. Significant differences were also found between field and observer memories and measures of emotional detachment and rumination. Implications relating to intrusive memory maintenance and treatment approaches are discussed.

  7. Scanning Seismic Intrusion Detector

    NASA Technical Reports Server (NTRS)

    Lee, R. D.

    1982-01-01

    Scanning seismic intrusion detector employs array of automatically or manually scanned sensors to determine approximate location of intruder. Automatic-scanning feature enables one operator to tend system of many sensors. Typical sensors used with new system are moving-coil seismic pickups. Detector finds uses in industrial security systems.

  8. Histologic evaluation of human pulp tissue after orthodontic intrusion.

    PubMed

    Lazzaretti, Dieison Nardi; Bortoluzzi, Gianna Steffens; Torres Fernandes, Lauren Fioreze; Rodriguez, Rubens; Grehs, Renésio Armindo; Martins Hartmann, Mateus Silveira

    2014-10-01

    The forces applied during orthodontic treatment bring about effects on the teeth and surrounding tissues. The aim of this study was to evaluate the possible changes in the human pulpal tissue resulting from orthodontic intrusion in a 21-day period using histologic examination. The sample consisted of 17 young individuals of both sexes between the ages of 12 and 19 years. A total of 34 premolars were evaluated with orthodontic indication of extraction. Because it is a split-mouth study, in each patient, intrusion force of 60 g was applied randomly on 1 of the dental elements experimental group for 21 days. The counterpart control group received no force. After extractions, these dental elements were fixed in 10% formaldehyde, processed automatically, submitted to histotechnical preparation, and stained with hematoxylin-eosin for analysis under optical microscope. The paired Fisher exact test (P ≤ .05) showed a significant increase of fibrous tissue in the experimental group. The nonparametric paired Wilcoxon test (P ≤ .05) showed a significant increase in the number of pulpal nodules in the elements of the experimental group and showed no difference in the number of blood vessels between the groups. Large-caliber vessels and congested elements were observed in 8 of the experimental group elements. The orthodontic intrusion force, in these conditions, caused vascular changes in the pulpal tissue and also increased the presence of fibrosis and the number of pulp calcifications in the experimental elements. Copyright © 2014 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  9. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as

  10. 40 CFR 197.26 - What are the circumstances of the human intrusion?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... human intrusion? 197.26 Section 197.26 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... YUCCA MOUNTAIN, NEVADA Public Health and Environmental Standards for Disposal Human-Intrusion Standard § 197.26 What are the circumstances of the human intrusion? For the purposes of the analysis of human...

  11. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  13. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  14. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  15. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  16. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  17. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  18. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  19. Framework flexibility of ZIF-8 under liquid intrusion: discovering time-dependent mechanical response and structural relaxation.

    PubMed

    Sun, Yueting; Li, Yibing; Tan, Jin-Chong

    2018-04-18

    The structural flexibility of a topical zeolitic imidazolate framework with sodalite topology, termed ZIF-8, has been elucidated through liquid intrusion under moderate pressures (i.e. tens of MPa). By tracking the evolution of water intrusion pressure under cyclic conditions, we interrogate the role of the gate-opening mechanism controlling the size variation of the pore channels of ZIF-8. Interestingly, we demonstrate that its channel deformation is recoverable through structural relaxation over time, hence revealing the viscoelastic mechanical response in ZIF-8. We propose a simple approach employing a glycerol-water solution mixture, which can significantly enhance the sensitivity of intrusion pressure for the detection of structural deformation in ZIF-8. By leveraging the time-dependent gate-opening phenomenon in ZIF-8, we achieved a notable improvement (50%) in energy dissipation during multicycle mechanical deformation experiments.

  20. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  1. Simulating the influence of groundwater table fluctuation on vapor intrusion

    NASA Astrophysics Data System (ADS)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  2. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  3. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  4. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  5. Associations between intrusive thoughts, reality discrimination and hallucination-proneness in healthy young adults.

    PubMed

    Smailes, David; Meins, Elizabeth; Fernyhough, Charles

    2015-01-01

    People who experience intrusive thoughts are at increased risk of developing hallucinatory experiences, as are people who have weak reality discrimination skills. No study has yet examined whether these two factors interact to make a person especially prone to hallucinatory experiences. The present study examined this question in a non-clinical sample. Participants were 160 students, who completed a reality discrimination task, as well as self-report measures of cannabis use, negative affect, intrusive thoughts and auditory hallucination-proneness. The possibility of an interaction between reality discrimination performance and level of intrusive thoughts was assessed using multiple regression. The number of reality discrimination errors and level of intrusive thoughts were independent predictors of hallucination-proneness. The reality discrimination errors × intrusive thoughts interaction term was significant, with participants who made many reality discrimination errors and reported high levels of intrusive thoughts being especially prone to hallucinatory experiences. Hallucinatory experiences are more likely to occur in people who report high levels of intrusive thoughts and have weak reality discrimination skills. If applicable to clinical samples, these findings suggest that improving patients' reality discrimination skills and reducing the number of intrusive thoughts they experience may reduce the frequency of hallucinatory experiences.

  6. Distributed intrusion detection system based on grid security model

    NASA Astrophysics Data System (ADS)

    Su, Jie; Liu, Yahui

    2008-03-01

    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  7. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  8. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  9. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  10. The importance of context: evidence that contextual representations increase intrusive memories.

    PubMed

    Pearson, David G; Ross, Fiona D C; Webster, Victoria L

    2012-03-01

    Intrusive memories appear to enter consciousness via involuntary rather than deliberate recollection. Some clinical accounts of PTSD seek to explain this phenomenon by making a clear distinction between the encoding of sensory-based and contextual representations. Contextual representations have been claimed to actively reduce intrusions by anchoring encoded perceptual data for an event in memory. The current analogue trauma study examined this hypothesis by manipulating contextual information independently from encoded sensory-perceptual information. Participants' viewed images selected from the International Affective Picture System that depicted scenes of violence and bodily injury. Images were viewed either under neutral conditions or paired with contextual information. Two experiments revealed a significant increase in memory intrusions for images paired with contextual information in comparison to the same images viewed under neutral conditions. In contrast to the observed increase in intrusion frequency there was no effect of contextual representations on voluntary memory for the images. The vividness and emotionality of memory intrusions were also unaffected. The analogue trauma paradigm may fail to replicate the effect of extreme stress on encoding postulated to occur during PTSD. These findings question the assertion that intrusive memories develop from a lack of integration between sensory-based and contextual representations in memory. Instead it is argued contextual representations play a causal role in increasing the frequency of intrusions by increasing the sensitivity of memory to involuntary retrieval by associated internal and external cues. Copyright © 2011 Elsevier Ltd. All rights reserved.

  11. The Elaborated Intrusion Theory of desire: a 10-year retrospective and implications for addiction treatments.

    PubMed

    May, Jon; Kavanagh, David J; Andrade, Jackie

    2015-05-01

    Ten years after the publication of Elaborated Intrusion (EI) Theory, there is now substantial research into its key predictions. The distinction between intrusive thoughts, which are driven by automatic processes, and their elaboration, involving controlled processing, is well established. Desires for both addictive substances and other desired targets are typically marked by imagery, especially when they are intense. Attention training strategies such as body scanning reduce intrusive thoughts, while concurrent tasks that introduce competing sensory information interfere with elaboration, especially if they compete for the same limited-capacity working memory resources. EI Theory has spawned new assessment instruments that are performing strongly and offer the ability to more clearly delineate craving from correlated processes. It has also inspired new approaches to treatment. In particular, training people to use vivid sensory imagery for functional goals holds promise as an intervention for substance misuse, since it is likely to both sustain motivation and moderate craving. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Work zone intrusion alarm effectiveness.

    DOT National Transportation Integrated Search

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  13. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes.

    PubMed

    Passarelli, L; Rivalta, E; Shuler, A

    2014-01-28

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process.

  14. Tell me more: Can a memory test reduce analogue traumatic intrusions?

    PubMed

    Krans, Julie; Näring, Gérard; Holmes, Emily A; Becker, Eni S

    2009-05-01

    Information processing theories of post-traumatic stress disorder (PTSD) state that intrusive images emerge due to a lack of integration of perceptual trauma representations in autobiographical memory. To test this hypothesis experimentally, participants were shown an aversive film to elicit intrusive images. After viewing, they received a recognition test for just one part of the film. The test contained neutrally formulated items to rehearse information from the film. Participants reported intrusive images for the film in an intrusion diary during one week after viewing. In line with expectations, the number of intrusive images decreased only for the part of the film for which the recognition test was given. Furthermore, deliberate cued-recall memory after one week was selectively enhanced for the film part that was in the recognition test a week before. The findings provide new evidence supporting information processing models of PTSD and have potential implications for early interventions after trauma.

  15. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    PubMed Central

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  16. Contrasting catastrophic eruptions predicted by different intrusion and collapse scenarios.

    PubMed

    Rincón, M; Márquez, A; Herrera, R; Alonso-Torres, A; Granja-Bruña, J L; van Wyk de Vries, B

    2018-04-18

    Catastrophic volcanic eruptions triggered by landslide collapses can jet upwards or blast sideways. Magma intrusion is related to both landslide-triggered eruptive scenarios (lateral or vertical), but it is not clear how such different responses are produced, nor if any precursor can be used for forecasting them. We approach this problem with physical analogue modelling enhanced with X-ray Multiple Detector Computed Tomography scanning, used to track evolution of internal intrusion, and its related faulting and surface deformation. We find that intrusions produce three different volcano deformation patterns, one of them involving asymmetric intrusion and deformation, with the early development of a listric slump fault producing pronounced slippage of one sector. This previously undescribed early deep potential slip surface provides a unified explanation for the two different eruptive scenarios (lateral vs. vertical). Lateral blast only occurs in flank collapse when the intrusion has risen into the sliding block. Otherwise, vertical rather than lateral expansion of magma is promoted by summit dilatation and flank buttressing. The distinctive surface deformation evolution detected opens the possibility to forecast the possible eruptive scenarios: laterally directed blast should only be expected when surface deformation begins to develop oblique to the first major fault.

  17. Emplacement of the early Miocene Pinto Peak intrusion, Southwest Utah, USA

    NASA Astrophysics Data System (ADS)

    Petronis, Michael S.; O'Driscoll, Brian

    2013-12-01

    In this contribution, we report rock magnetic, petrographic, and anisotropy of magnetic susceptibility (AMS) data from the Pinto Peak intrusion, all of which bear on volcanic construction. Rock magnetic data indicate that the dominant magnetic mineral phase is low-Ti titanomagnetite of multidomain grain size, the composition of which varies spatially across the intrusion. The intrusion is a porphyritic andesite dominated by Ca-rich plagioclase (>60%) as well as biotite, amphibole, olivine, and opaque minerals. Reflected light petrography reveals mostly euhedral-subhedral (titano)magnetite crystals that often form clustered glomerocrysts and stringers of equant crystals, without exhibiting a consistent mineral alignment fabric. Moderate-to-shallow plunging prolate magnetic susceptibility ellipsoids dominate the northern part of the intrusion while steeply dipping/plunging magnetic susceptibility ellipsoids are generally restricted to the southern part of the intrusion. The vent facies rocks yield moderate-to-steep oblate susceptibility ellipsoids. We interpret the flow pattern in the north to reflect subhorizontal flow of magma, filling a tabular sheet-like body associated with propagation of the intrusion to the north. We argue that the southern part of the intrusion represents the ascent site of the magma rising to shallow crustal levels along a steep feeder system. The oblate magnetic fabrics in the vent area plausibly represent flattening against the conduit walls as evidenced by a weak planar flow foliation observed in the vent conduit rocks. On reaching shallow crustal levels, the magma deformed and uplifted the roof rocks leading to gravitational instability. As the slide mass released from the roof, an explosive eruption ensued resulting in the emplacement of the Rocks of Paradise tuff and associated effusive lava flows. Following eruption, magma pressure decreased and the magma drained northward forming the northern intrusive phase.

  18. Potential mitigation approach to minimize salinity intrusion in the Lower Savannah River Estuary due to reduced controlled releases from Lake Thurmond

    USGS Publications Warehouse

    Conrads, Paul; Greenfield, James M.

    2010-01-01

    The Savannah River originates at the confluence of the Seneca and Tugaloo Rivers, near Hartwell, Ga. and forms the State boundary between South Carolina and Georgia. The J. Strom Thurmond Dam and Lake, located 187 miles upstream from the coast, is responsible for most of the flow regulation that affects the Savannah River from Augusta to the coast. The Savannah Harbor experiences semi-diurnal tides of two high and two low tides in a 24.8-hour period with pronounced differences in tidal range between neap and spring tides occurring on a 14-day and 28-day lunar cycle. The Savannah National Wildlife Refuge is located in the Savannah River Estuary. The tidal freshwater marsh is an essential part of the 28,000-acre refuge and is home to a diverse variety of wildlife and plant communities. The Southeastern U.S. experienced severe drought conditions in 2008 and if the conditions had persisted in Georgia and South Carolina, Thurmond Lake could have reached an emergency operation level where outflow from the lake is equal to the inflow to the lake. To decrease the effect of the reduced releases on downstream resources, a stepped approach was proposed to reduce the flow in increments of 500 cubic feet per second (ft3/s) intervals. Reduced flows from 3,600 ft3/s to 3,100 ft3/s and 2,600 ft3/s were simulated with two previously developed models of the Lower Savannah River Estuary to evaluate the potential effects on salinity intrusion. The end of the previous drought (2002) was selected as the baseline condition for the simulations with the model. Salinity intrusion coincided with the 28-day cycle semidiurnal tidal cycles. The results show a difference between the model simulations of how the salinity will respond to the decreased flows. The Model-to-Marsh Decision Support System (M2MDSS) salinity response shows a large increase in the magnitude (> 6.0 practical salinity units, psu) and duration (3-4 days) of the salinity intrusion with extended periods (21 days) of tidal

  19. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  20. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  1. Modal Composition and Age of Intrusions in North-Central and Northeast Nevada

    USGS Publications Warehouse

    du Bray, Edward A.; Crafford, A. Elizabeth Jones

    2007-01-01

    Introduction Data presented in this report characterize igneous intrusions of north-central and northeast Nevada and were compiled as part of the Metallogeny of the Great Basin project conducted by the U.S. Geological Survey (USGS) between 2001 and 2007. The compilation pertains to the area bounded by lats 38.5 and 42 N., long 118.5 W., and the Nevada-Utah border (fig. 1). The area contains numerous large plutons and smaller stocks but also contains equally numerous smaller, shallowly emplaced intrusions, including dikes, sills, and endogenous dome complexes. Igneous intrusions (hereafter, intrusions) of multiple ages are major constituents of the geologic framework of north-central and northeast Nevada (Stewart and Carlson, 1978). Mesozoic and Cenozoic intrusions are particularly numerous and considered to be related to subduction along the west edge of the North American plate during this time. Henry and Ressel (2000) and Ressel and others (2000) have highlighted the association between magmatism and ore deposits along the Carlin trend. Similarly, Theodore (2000) has demonstrated the association between intrusions and ore deposits in the Battle Mountain area. Decades of geologic investigations in north-central and northeast Nevada (hereafter, the study area) demonstrate that most hydrothermal ore deposits are spatially, and probably temporally and genetically, associated with intrusions. Because of these associations, studies of many individual intrusions have been conducted, including those by a large number of Master's and Doctoral thesis students (particularly University of Nevada at Reno students and associated faculty), economic geologists working on behalf of exploration and mining companies, and USGS earth scientists. Although the volume of study area intrusions is large and many are associated with ore deposits, no synthesis of available data that characterize these rocks has been assembled. Compilations that have been produced for intrusions in Nevada

  2. Efficient cooling of rocky planets by intrusive magmatism

    NASA Astrophysics Data System (ADS)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  3. Sulfide intrusion in the tropical seagrasses Thalassia testudinum and Syringodium filiforme

    NASA Astrophysics Data System (ADS)

    Holmer, Marianne; Pedersen, Ole; Krause-Jensen, Dorte; Olesen, Birgit; Hedegård Petersen, Malene; Schopmeyer, Stephanie; Koch, Marguerite; Lomstein, Bente Aa.; Jensen, Henning S.

    2009-11-01

    Sulfur and oxygen dynamics in the seagrasses Thalassia testudinum and Syringodium filiforme and their sediments were studied in the US Virgin Islands (USVI) in order to explore sulfide intrusion into tropical seagrasses. Four study sites were selected based on the iron concentration in sediments and on proximity to anthropogenic nutrient sources. Meadow characteristics (shoot density, above- and below-ground biomass, nutrient content) were sampled along with sediment biogeochemistry. Sulfide intrusion was high in T. testudinum, as up to 96% of total sulfur in the plant was derived from sediment-derived sulfides. The sulfide intrusion was negatively correlated to the turnover of sulfides in the sediments regulated by both plant parameters and sediment sulfur pools. Sediment iron content played an indirect role by affecting sulfide turnover rates. Leaf production was negatively correlated with sulfide intrusion suggesting that active growth reduced sulfide intrusion. Sulfide intrusion was lower in S. filiforme (up to 44%) compared to T. testudinum consistent with a higher internal nighttime oxygen concentrations found for S. filiforme. When S. filiforme can take advantage of its ability to maintain high internal oxygen concentrations, as was the case on the USVI, it could increase its success in colonizing unvegetated disturbed sediments with potentially high sulfide concentrations.

  4. Inducing and modulating intrusive emotional memories: a review of the trauma film paradigm.

    PubMed

    Holmes, Emily A; Bourne, Corin

    2008-03-01

    Highly affect-laden memory intrusions are a feature of several psychological disorders with intrusive images of trauma especially associated with post-traumatic stress disorder (PTSD). The trauma film paradigm provides a prospective experimental tool for investigating analogue peri-traumatic cognitive mechanisms underlying intrusion development. We review several historical papers and some more recent key studies that have used the trauma film paradigm. A heuristic diagram is presented, designed to simplify predictions about analogue peri-traumatic processing and intrusion development, which can also be related to the processing elements of recent cognitive models of PTSD. Results show intrusions can be induced in the laboratory and their frequency amplified/attenuated in line with predictions. Successful manipulations include competing task type (visuospatial vs. verbal) and use of a cognitive coping strategy. Studies show that spontaneous peri-traumatic dissociation also affects intrusion frequency although attempts to manipulate dissociation have failed. It is hoped that further use of this paradigm may lead to prophylactic training for at risk groups and an improved understanding of intrusions across psychopathologies.

  5. Deep intrusions, lateral magma transport and related uplift at ocean island volcanoes

    NASA Astrophysics Data System (ADS)

    Klügel, Andreas; Longpré, Marc-Antoine; García-Cañada, Laura; Stix, John

    2015-12-01

    Oceanic intraplate volcanoes grow by accumulation of erupted material as well as by coeval or discrete magmatic intrusions. Dykes and other intrusive bodies within volcanic edifices are comparatively well studied, but intrusive processes deep beneath the volcanoes remain elusive. Although there is geological evidence for deep magmatic intrusions contributing to volcano growth through uplift, this has rarely been demonstrated by real-time monitoring. Here we use geophysical and petrological data from El Hierro, Canary Islands, to show that intrusions from the mantle and subhorizontal transport of magma within the oceanic crust result in rapid endogenous island growth. Seismicity and ground deformation associated with a submarine eruption in 2011-2012 reveal deep subhorizontal intrusive sheets (sills), which have caused island-scale uplift of tens of centimetres. The pre-eruptive intrusions migrated 15-20 km laterally within the lower oceanic crust, opening pathways that were subsequently used by the erupted magmas to ascend from the mantle to the surface. During six post-eruptive episodes between 2012 and 2014, further sill intrusions into the lower crust and upper mantle have caused magma to migrate up to 20 km laterally, resulting in magma accumulation exceeding that of the pre-eruptive phase. A comparison of geobarometric data for the 2011-2012 El Hierro eruption with data for other Atlantic intraplate volcanoes shows similar bimodal pressure distributions, suggesting that eruptive phases are commonly accompanied by deep intrusions of sills and lateral magma transport. These processes add significant material to the oceanic crust, cause uplift, and are thus fundamentally important for the growth and evolution of volcanic islands. We suggest that the development of such a magma accumulation zone in the lower oceanic crust begins early during volcano evolution, and is a consequence of increasing size and complexity of the mantle reservoir system, and potentially

  6. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  7. Hysteretic behavior in seawater intrusion in response to discontinuous drought periods

    NASA Astrophysics Data System (ADS)

    Salandin, P.; Darvini, G.

    2017-12-01

    groundwater and the control of seawater intrusion are the challenges of the present day and future water supply engineers and managers. The existence of hysteretic effects further challenges the modelling of wedge saltwater intrusion and indicates that past forcing conditions should be considered in the interpretation of SWI measurements and predictions.

  8. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  9. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  10. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  11. Understanding Dysregulated Behaviors and Compulsions: An Extension of the Emotional Cascade Model and the Mediating Role of Intrusive Thoughts

    PubMed Central

    Jungmann, Stefanie M.; Vollmer, Noelle; Selby, Edward A.; Witthöft, Michael

    2016-01-01

    Objective: The Emotional Cascade Model (ECM) by Selby et al. (2008) proposes that people often engage in dysregulated behaviors to end extreme, aversive emotional states triggered by a self-perpetuating vicious cycle of (excessive) rumination, negative affect, and attempts to suppress negative thoughts. Method: Besides replicating the ECM, we introduced intrusions as a mediator between rumination and behavioral dysregulation and tested this extended ECM for compulsions as part of obsessive–compulsive disorders. A structural equation modeling approach was used to test this in a sample of N = 414, randomly recruited from the general population. Results: Intrusions were found to fully mediate the effect of rumination on a broad array of dysregulated behaviors and compulsions. This mediation endured when controlling for symptoms of depression. Conclusion: These findings support the idea that rumination fuels intrusions, which in turn foster dysregulated behaviors. Therefore, addressing rumination as well as intrusions may improve psychotherapeutic interventions for mental disorders characterized by dysregulated behaviors and/or extreme aversive emotional states. PMID:27445948

  12. State of the Practice of Intrusion Detection Technologies

    DTIC Science & Technology

    2000-01-01

    security incident response teams ) - the role of IDS in threat management, such as defining alarm severity, monitoring, alerting, and policy-based...attacks in an effort to sneak under the radar of security specialists and intrusion detection software, a U.S. Navy network security team said today...to get the smoking gun," said Stephen Northcutt, head of the Shadow intrusion detection team at the Naval Surface Warfare Center. "To know what’s

  13. Stratospheric Intrusion-Influenced Ozone Air Quality Exceedences Investigated in MERRA-2

    NASA Technical Reports Server (NTRS)

    Knowland, K. Emma; Ott, Lesley; Duncan, Bryan; Wargan, Krzysztof

    2017-01-01

    Ozone near the surface is harmful to human health and is a result of the photochemical reaction with both man-made and natural precursor pollutant sources. Therefore, in order to reduce near surface ozone concentrations, communities must reduce anthropogenic pollution sources. However, the injection of stratospheric ozone into the troposphere, known as a stratospheric intrusion, can also lead to concentrations of ground-level ozone exceeding air quality standards. Stratospheric intrusions are dynamical atmospheric features, however, these intrusions have been misrepresented in models and reanalyses until recently, as the features of a stratospheric intrusion are best identified in horizontal resolutions of approximately 50 km or smaller. NASA's Modern-Era Retrospective Analysis for Research and Applications Version-2 (MERRA-2) reanalysis is a publicly-available high-resolution dataset (50 km) with assimilated ozone that characterizes stratospheric ozone on the same spatiotemporal resolution as the meteorology. We show that stratospheric intrusions that impact surface air quality are well represented in the MERRA-2 reanalysis. This is demonstrated through a case study analysis of stratospheric intrusion events which were identified by the United States Environmental Protection Agency (EPA) to impact surface ozone air quality in spring 2012 in Colorado. The stratospheric intrusions are identified in MERRA-2 by the folding of the dynamical tropopause under the jet stream and subsequent isentropic descent of dry, O3-rich stratospheric air towards the surface where ozone air quality exceedences were observed. The MERRA-2 reanalysis can support air quality agencies for more rapid identification of the impact of stratospheric air on ground-level ozone.

  14. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    USGS Publications Warehouse

    duBray, E.A.

    2007-01-01

    Importantly, modal composition, age, and geochemical characteristics of intrusions associated with large mineral deposits along the trends, are indistinguishable from non-mineralized intrusions in northern Nevada and thus do not identify intrusions associated with significant deposits. Moreover, intrusion age and composition show little correlation with mineral-deposit type, abundance, and size. Given the lack of diagnostic characteristics for intrusions associated with deposits, it is uncertain whether age, modal composition, and geochemical data can identify intrusions associated with mineral deposits. These findings suggest that associations between northern Nevada intrusions and mineral deposits reflect superimposition of many geologic factors, none of which was solely responsible for mineral-deposit formation. These factors might include intrusion size, efficiency of fluid and metal extraction from magma, prevailing redox and sulfidation conditions, or derivation of metals and ligands from host rocks and groundwater. The abundance and diversity of mineral deposits in northern Nevada may partly reflect geochemical inheritance, for example, along the mineral trends rather than the influence of petrologically unique magma or associated fluids.

  15. Magnetic fabric constraints of the emplacement of igneous intrusions

    NASA Astrophysics Data System (ADS)

    Maes, Stephanie M.

    Fabric analysis is critical to evaluating the history, kinematics, and dynamics of geological deformation. This is particularly true of igneous intrusions, where the development of fabric is used to constrain magmatic flow and emplacement mechanisms. Fabric analysis was applied to three mafic intrusions, with different tectonic and petrogenetic histories, to study emplacement and magma flow: the Insizwa sill (Mesozoic Karoo Large Igneous Province, South Africa), Sonju Lake intrusion (Proterozoic Midcontinent Rift, Minnesota, USA), and Palisades sill (Mesozoic rift basin, New Jersey, USA). Multiple fabric analysis techniques were used to define the fabric in each intrusive body. Using digital image analysis techniques on multiple thin sections, the three-dimensional shape-preferred orientation (SPO) of populations of mineral phases were calculated. Low-field anisotropy of magnetic susceptibility (AMS) measurements were used as a proxy for the mineral fabric of the ferromagnetic phases (e.g., magnetite). In addition, a new technique---high-field AMS---was used to isolate the paramagnetic component of the fabric (e.g., silicate fabric). Each fabric analysis technique was then compared to observable field fabrics as a framework for interpretation. In the Insizwa sill, magnetic properties were used to corroborate vertical petrologic zonation and distinguish sub-units within lithologically defined units. Abrupt variation in magnetic properties provides evidence supporting the formation of the Insizwa sill by separate magma intrusions. Low-field AMS fabrics in the Sonju Lake intrusion exhibit consistent SW-plunging lineations and SW-dipping foliations. These fabric orientations provide evidence that the cumulate layers in the intrusion were deposited in a dynamic environment, and indicate magma flowed from southwest to northeast, parallel to the pre-existing rift structures. In the Palisades sill, the magnetite SPO and low-field AMS lineation have developed orthogonal to

  16. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  17. Saltwater intrusion coupled with drought accelerates carbon loss from a brackish coastal wetland

    NASA Astrophysics Data System (ADS)

    Wilson, B.; Troxler, T.

    2017-12-01

    Coastal wetlands, such as the Everglades, are critical ecosystems for blue carbon (C) storage, yet this storage capacity is vulnerable to environmental change, such as saltwater intrusion and altered hydrology. Saltwater intrusion can stress vegetation and bring new metabolites for microbial respiration, thereby altering the C cycle. Drought can reduce the depth of water covering the wetland soil, and, in extreme cases, lead to exposed soil surface. This increases oxygen levels, thus speeding up C decomposition and potentially leading to peat collapse. The combined effects of both saltwater intrusion and drought on coastal marshes, however, are still uncertain, but recent evidence suggests that saltwater intrusion accelerates C loss from wetlands when coupled with drought. Our objective was to determine the change in CO2 flux, decomposition, root and shoot production, and elevation in a brackish water marsh under conditions of drought and elevated salinity. During the onset of drought, soil CO2 efflux increased by 124% and 237% in the ambient and elevated salinity treatments, respectively, compared to the control. Within one month, elevated salinity decreased net ecosystem production (NEP) by 40%, while after 6 months it had decreased by 85%. During the onset of the drought, there was no difference in NEP with ambient salinity between the inundated and exposed monoliths (-3.4 ± 0.8 vs. -4.2 ± 2.0 μmol CO2 m-2 s-1, respectively). However, drought conditions in the elevated salinity treatment resulted in more CO2 release in the exposed monoliths than the inundated monoliths (1.5 ± 0.4 vs. -0.5 ± 0.3 μmol CO2 m-2 s-1, respectively). Elevation change collected at the end of the experiment will allow us to test if elevated salinity combined with drought contributes to peat collapse, and what mechanisms of ecosystem C cycling has the greatest influence. While the restoration of water flows to the southern Everglades is hypothesized to mitigate the periods of

  18. Evaluation of modified work zone traffic control devices at business accesses

    DOT National Transportation Integrated Search

    2001-01-01

    Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...

  19. Influence of Age, Thought Content, and Anxiety on Suppression of Intrusive Thoughts

    PubMed Central

    Beadel, Jessica R.; Green, Jennifer S.; Hosseinbor, Shahrzad; Teachman, Bethany A.

    2013-01-01

    Understanding differences in responses following attempts to suppress versus simply monitor intrusive thoughts is important given the established relationship between intrusive thinking and numerous forms of psychopathology. Moreover, these differences may vary as a function of age. Because of the links between aging and both enhancement in emotion regulation skills and decline in inhibition skills, older and younger adults were expected to differ in their responses (e.g., experience of negative affect and thought recurrence) to attempts at suppressing intrusive thoughts. This study examined whether efforts to suppress thought content that varied in valence and age-relevance differentially affected older (N = 40, aged 66–92) and younger (N = 42, aged 16–25) adults’ ability to inhibit intrusive thought recurrence and their resulting negative affect. Interestingly, older adults experienced less recurrence for most thoughts than younger adults. Also, for several dependent variables (negative affect and perceived difficulty suppressing intrusive thoughts), older adults showed less decline in their magnitude of response across thinking periods (i.e., from suppression to monitoring) than did younger adults. These age effects were not generally moderated by level of trait anxiety, though higher anxiety did predict intrusive thought responding in expected directions, such as greater negative affect. These findings point to independent influences of age and anxiety, and suggest a complex mix of risk and protective factors for older adults’ responses to intrusive thoughts. PMID:23395408

  20. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  1. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  2. Petrogenesis of the Ni-Cu-PGE sulfide-bearing Tamarack Intrusive Complex, Midcontinent Rift System, Minnesota

    NASA Astrophysics Data System (ADS)

    Taranovic, Valentina; Ripley, Edward M.; Li, Chusi; Rossell, Dean

    2015-01-01

    The Tamarack Intrusive Complex (TIC, 1105.6 ± 1.2 Ma) in NE Minnesota, was emplaced during the early stages of the development of the Midcontinent Rift System (MRS, "Early Stage": 1110-1106 Ma). Country rocks of the TIC are those of the Paleoproterozoic Thomson Formation, part of the Animikie Group including sulfide-bearing metasedimentary black shale. The magmatic system is composed of at least two principal mafic-ultramafic intrusive sequences: the sulfide-barren Bowl Intrusion in the south and the "dike" area intrusions in the north which host Ni-Cu-Platinum Group Elements (PGE) mineralization with up to 2.33% Ni, 1.24% Cu, 0.34 g/t Pt, 0.23 g/t Pd and 0.18 g/t Au. Two distinct intrusive units in the "dike" area are the CGO (coarse-grained olivine-bearing) Intrusion, a sub-vertical dike-like body, and the overlying sub-horizontal FGO (fine-grained olivine-bearing) Intrusion. Both intrusions comprise peridotite, feldspathic peridotite, feldspathic pyroxenite, melatroctolite and melagabbro. Massive sulfides are volumetrically minor and mainly occur as lenses emplaced into the country rocks associated with both intrusions. Semi-massive (net-textured) sulfides are distributed at the core of the CGO Intrusion, surrounded by a halo of the disseminated sulfides. Disseminated sulfides also occur in lenses along the base of the FGO Intrusion. Olivine compositions in the CGO Intrusion are between Fo89 and Fo82 and in the FGO Intrusion from Fo84 to Fo82. TIC intrusions have more primitive olivine compositions than that of olivine in the sheet-like intrusions in the Duluth Complex (below Fo70), as well as olivine from the smaller, conduit-related, Eagle and East Eagle Intrusions in Northern Michigan (Fo86 to Fo75). The FeO/MgO ratios of the CGO and FGO Intrusion parental magmas, inferred from olivine compositions, are similar to those of picritic basalts erupted during the early stages of the MRS formation. Trace element ratios differ slightly from other intrusions in the

  3. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  4. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    PubMed Central

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  5. Final OSWER Vapor Intrusion Guidance

    EPA Science Inventory

    EPA is preparing to finalize its guidance on assessing and addressing vapor intrusion, which is defined as migration of volatile constituents from contaminated media in the subsurface (soil or groundwater) into the indoor environment. In November 2002, EPA issued draft guidance o...

  6. Implementing and testing a fiber-optic polarization-based intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hajj, Rasha El; MacDonald, Gregory; Verma, Pramode; Huck, Robert

    2015-09-01

    We describe a layer-1-based intrusion detection system for fiber-optic-based networks. Layer-1-based intrusion detection represents a significant elevation in security as it prohibits an adversary from obtaining information in the first place (no cryptanalysis is possible). We describe the experimental setup of the intrusion detection system, which is based on monitoring the behavior of certain attributes of light both in unperturbed and perturbed optical fiber links. The system was tested with optical fiber links of various lengths and types, under different environmental conditions, and under changes in fiber geometry similar to what is experienced during tapping activity. Comparison of the results for perturbed and unperturbed links has shown that the state of polarization is more sensitive to intrusion activity than the degree of polarization or power of the received light. The testing was conducted in a simulated telecommunication network environment that included both underground and aerial links. The links were monitored for intrusion activity. Attempts to tap the link were easily detected with no apparent degradation in the visual quality of the real-time surveillance video.

  7. Maxillary molar intrusion with micro-implant anchorage (MIA).

    PubMed

    Park, Hyo-Sang; Jang, Bong-Kyu; Kyung, Hee-Moon

    2005-11-01

    Intrusion of the maxillary molars is difficult to accomplish using traditional methods of anchorage. To describe methods of maxillary molar intrusion with the aid of micro-implants. Micro-implants provide stable intra-oral anchorage and enable the maxillary molars to be intruded without the usual side effects. Three adult patients are presented showing how micro-implants can be used to intrude the maxillary molars. In the first patient micro-implants were placed in the alveolar process between the second premolar and first molar, in the second patient micro-implants were placed in the palatal alveolar process between the first and second molars, and in the third patient a micro-implant was placed in the palate paramedially. A transpalatal bar was used to prevent bucco- or linguoversion of the molars during intrusion. The maxillary molars can be intruded with intra-oral anchorage derived from microscrew implants.

  8. Design of an Evolutionary Approach for Intrusion Detection

    PubMed Central

    2013-01-01

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The proposed approach can generate a pool of noninferior solutions and ensembles thereof having optimized trade-offs values of multiple conflicting objectives. In this paper, a three-phase, approach is proposed to generate solutions to a simple chromosome design in the first phase. In the first phase, a Pareto front of noninferior individual solutions is approximated. In the second phase of the proposed approach, the entire solution set is further refined to determine effective ensemble solutions considering solution interaction. In this phase, another improved Pareto front of ensemble solutions over that of individual solutions is approximated. The ensemble solutions in improved Pareto front reported improved detection results based on benchmark datasets for intrusion detection. In the third phase, a combination method like majority voting method is used to fuse the predictions of individual solutions for determining prediction of ensemble solution. Benchmark datasets, namely, KDD cup 1999 and ISCX 2012 dataset, are used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover individual solutions and ensemble solutions thereof with a good support and a detection rate from benchmark datasets (in comparison with well-known ensemble methods like bagging and boosting). In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting

  9. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  10. Posttraumatic stress symptoms in London school children following September 11, 2001: an exploratory investigation of peri-traumatic reactions and intrusive imagery.

    PubMed

    Holmes, Emily A; Creswell, Cathy; O'Connor, Thomas G

    2007-12-01

    Threatening intrusive images are central to posttraumatic stress disorder. It has been suggested that intrusive imagery in the context of a sense of threat leads to the development and persistence of posttraumatic stress symptoms. This study investigates London school children's (N=76; age 10-11 years) self-reported posttraumatic stress symptoms in response to viewing the attacks of September 11, 2001 on television. Assessments were made at two time points. A minority of participants reported moderate-severe symptoms with functional impairment at 2 months (14.5%) and 6 months (9.2%) after viewing the September 11 events. After controlling for symptom stability, persistent symptoms were associated with peri-traumatic factors, notably perceiving that one's life was in danger. The combined effect of intrusive imagery and peri-traumatic life threat was associated with symptom persistence. Assessments of intrusive image content via checklist and free-report indicated that the images were directly related to September 11 and were fairly stable over time. Implications for treating children's intrusive images following stressful events are explored.

  11. Seawater intrusion vulnerability indicators for freshwater lenses in strip islands

    NASA Astrophysics Data System (ADS)

    Morgan, L.; Werner, A. D.

    2014-12-01

    Freshwater lenses on small islands have been described as some of the most vulnerable aquifer systems in the world. Yet, little guidance is available regarding methods for rapidly assessing the vulnerability of freshwater lenses to the potential effects of climate change. To address this gap we employ a steady-state analytic modelling approach to develop seawater intrusion (SWI) vulnerability indicator equations. The vulnerability indicator equations quantify the propensity for SWI to occur in strip islands due to both recharge change and sea-level rise (SLR) (incorporating the effect of land surface inundation (LSI)). This work extends that of Werner et al. (2012) who developed SWI vulnerability indicator equations for unconfined and confined continental aquifers, and did not consider LSI. Flux-controlled and head-controlled conceptualisations of freshwater lenses are adopted. Under flux-controlled conditions the water table is able to rise unencumbered by land surface effects. Under head-controlled conditions the head is fixed at the centre of the lens due to, for example, centrally located topographic controls, surface water features or pumping. A number of inferences about SWI vulnerability in freshwater lenses can be made from the analysis: (1) SWI vulnerability indicators for SLR (under flux-controlled conditions) are proportional to lens thickness (or volume) and the rate of LSI and inversely proportional to island width; (2) SWI vulnerability indicators for recharge change (under flux-controlled conditions) are proportional to lens thickness (or volume) and inversely proportional to recharge; (3) SLR has greater impact under head-controlled conditions rather than flux-controlled conditions, whereas the opposite is the case for LSI and recharge change. Example applications to several case studies illustrate use of the method for rapidly ranking lenses according to vulnerability, thereby allowing for prioritisation of areas where further and more detailed SWI

  12. Metamorphic charnockite in contact aureoles around intrusive enderbite from Natal, South Africa

    NASA Astrophysics Data System (ADS)

    van den Kerkhof, Alfons M.; Grantham, Geoffrey H.

    In the Port Edward area of southern Kwa-Zulu Natal, South Africa, charnockitic aureoles up to 10m in width in the normally garnetiferous Nicholson's Point Granite, are developed adjacent to intrusive contacts with the Port Edward Enderbite and anhydrous pegmatitic veins. Mineralogical differences between the country rock and charnockitic aureole suggest that the dehydration reaction Bt+Qtz-->Opx+Kfs+H2O and the reaction of Grt+Qtz-->Opx+Pl were responsible for the charnockitization. The compositions of fluid inclusions show systematic variation with: (1) the Port Edward Enderbite being dominated by CO2 and N2 fluid inclusions; (2) the non-charnockitized granite by saline aqueous inclusions with 18-23 EqWt% NaCl; (3) the charnockitic aureoles by low-salinity and pure water inclusions (<7 EqWt% NaCl); (4) the pegmatites by aqueous inclusions of various salinity with minor CO2. As a result of the thermal event the homogenization temperatures of the inclusions in charnockite show a much larger range (up to 390°C) compared to the fluid inclusions in granite (mostly <250°C). Contrary to fluid-controlled charnockitization (brines, CO2) which may have taken place along shear zones away from the intrusive body, the present ``proximal'' charnockitized granite formed directly at the contact with enderbite. The inclusions indicate contact metamorphism induced by the intrusion of ``dry'' enderbitic magma into ``wet'' granite resulting in local dehydration. This was confirmed by cathodoluminescence microscopy showing textures indicative for the local reduction of structural water in the charnockite quartz. Two-pyroxene thermometry on the Port Edward Enderbite suggests intrusion at temperatures of 1000-1050°C into country rock with temperature of <700°C. The temperature of aureole formation must have been between 700°C (breakdown of pyrite to form pyrrhotite) and 1000°C. Charnockitization was probably controlled largely by heat related to anhydrous intrusions causing

  13. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  14. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  15. Layered intrusion formation by top down thermal migration zone refining (Invited)

    NASA Astrophysics Data System (ADS)

    Lundstrom, C.

    2009-12-01

    The formation of layered mafic intrusions by crystallization from cooling magmas represents the textbook example of igneous differentiation, often attributed to fractional crystallization through gravitational settling. Yet in detail, such interpretations have significant problems such that it remains unclear how these important features form. Put in the Earth perspective that no km scale blob of >50% melt has ever been imaged geophysically and that geochronological studies repeatedly indicate age inconsistencies with “big tank” magma chambers, it may be questioned if km scale magma chambers have ever existed. I will present the case for forming layered intrusions by a top down process whereby arriving basaltic magma reaches a permeability barrier, begins to underplate and forms the intrusion incrementally by sill injection with the body growing downward at ~1 mm/yr rate or less. A temperature gradient zone occurs in the overlying previously emplaced sills, leading to chemical components migrating by diffusion. As long as the rate of diffusion can keep up with rate of sill addition, the body will differentiate along a path similar to a liquid line of descent. In this talk, I will integrate data from 3 areas: 1) laboratory experiments examining the behavior of partially molten silicates in a temperature gradient (thermal migration); 2) numerical modeling of the moving temperature gradient zone process using IRIDIUM (Boudreau, 2003); 3) measurements of Fe isotope ratios and geochronology from the Sonju Lake Intrusion in the Duluth Complex. This model provides the ability to form km scale intrusions by a seismically invisible means, can explain million year offsets in chronology, and has implications for reef development and PGE concentration. Most importantly, this model of top down layered intrusion formation, following a similar recent proposal for granitoid formation (Lundstrom, 2009), represents a testable hypothesis: because temperature gradient driven

  16. In-situ trainable intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such thatmore » the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.« less

  17. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  18. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  19. Predicting The Intrusion Layer From Deep Ocean Oil Spills

    NASA Astrophysics Data System (ADS)

    Wang, Dayang; Chow, Aaron; Adams, E. Eric

    2015-11-01

    Oil spills from deep ocean blowout events motivate our study of multiphase plumes in a water column. Key to understanding the long-term fate of these plumes is the ability to predict the depth and persistence of intrusion layers. While intrusion layers from multiphase plumes have been studied under stagnant conditions, their behavior in the presence of crossflow, especially in mild crossflow, remains poorly understood. The classical classification of plume behavior identifies two regimes: crossflow-dominant and stratification-dominant--but it does not account for the interplay between the two effects, leaving the transition region unexplored. We conduct laboratory tank experiments to investigate the behavior of intrusion layers under the simultaneous action of crossflow and stratification. Our experiments use an inverted frame of reference, using glass beads with a range of sizes to simulate oil droplets. We find that crossflow creates enhanced mixing, which in turn leads to a shallower intrusion layer of the released fluid (correspondingly, a deeper layer in the case of a deep ocean blowout). We develop a mathematical formulation that extends previous models to account for crossflow effects, and use field observations to validate the analytical and experimental findings.

  20. Indoor Air Vapor Intrusion Mitigation Approaches

    EPA Pesticide Factsheets

    The National Risk Management Research Laboratory has developed a technology transfer document regarding management and treatment of vapor intrusion into building structures. This document describes the range of mitigation technologies available.

  1. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  2. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  3. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  4. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  5. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  6. The New Paleomagnetic Data from the Permian-Triassic Intrusions of the North-Western Siberian Platform: Implications for the Evolution of the Magmatic Activity

    NASA Astrophysics Data System (ADS)

    Latyshev, A.; Ulyahina, P.; Krivolutskaya, N.

    2017-12-01

    The Siberian Traps Large Igneous Province (LIP) is the area of the great scientific interest due to the huge Cu-Ni and PGE deposits related to the mafic intrusions located in Norilsk region. Though this area has been an object of the detailed investigations for many decades, the genesis of these deposits is still debated. Nowadays, 7 Permian-Triassic intrusive complexes are distinguished in Norilsk region, however their age, order of emplacement and correlation with the volcanic section are discussed. We perform the results of the detailed paleomagnetic study of the intrusions from the North-Western Siberian platform (Norilsk and Culumbe regions), including the ore-bearing Chernogorsky intrusion and some apophyses of the ore-bearing bodies. Our results demonstrate the contrasting paleomagnetic directions in different intrusions, providing an opportunity of the paleomagnetic division of the intrusive complexes and types. Moreover, some intrusions belonging to the same "Norilsk" type yield statistically different paleomagnetic directions. In addition, we found both normally and reversely magnetized intrusions in the most ancient Ergalakhsky complex. Besides, we carried out the detailed investigation of the anisotropy of magnetic susceptibility (AMS) in Norilsk intrusions. While about a half of the studied sites demonstrates so-called "normal" type of AMS ellipsoid, the other intrusions yield reverse or dispersed distributions. Nevertheless, in "normal" sites the shallow north-west directions of the maximal axis K1 are predominant. It is consistent with the idea that the magmatic transport in Norilsk region was controlled by the Norilsk-Kharaelakh regional fault. This work was supported by RFBR (projects #16-35-60114, 17-05-01121, 15-05-09250) and the Ministry of Education and Science RF (project #14.Z50.31.0017).

  7. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms

  8. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    NASA Astrophysics Data System (ADS)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  9. Predicting family health and well-being after separation from an abusive partner: role of coercive control, mother's depression and social support.

    PubMed

    Broughton, Sharon; Ford-Gilboe, Marilyn

    2017-08-01

    Drawing on the Strengthening Capacity to Limit Intrusion theory, we tested whether intrusion (i.e. unwanted interference from coercive control, custody and access difficulties and mother's depressive symptoms) predicted family health and well-being after separation from an abusive partner/father, and whether social support moderated intrusion effects on family health and well-being. Experiences of coercive control and the negative consequences related to those experiences have been documented among women who have separated from an abusive partner. We conducted a secondary analysis of data from 154 adult, Canadian mothers of dependent children who had separated from an abusive partner and who participated in Wave 2 of the Women's Health Effects Study. We used hierarchical multiple regression to test whether intrusion predicts family health and well-being as well as whether social support moderated this relationship. Families were found to experience considerable intrusion, yet their health and well-being was similar to population norms. Intrusion predicted 11·4% of the variance in family health and well-being, with mother's depressive symptoms as the only unique predictor. Social support accounted for an additional 9% of explained variance, but did not buffer intrusion effects on family health and well-being. Although women had been separated from their abusive partners for an average of 2·5 years, the majority continued to experience coercive control. On average, levels of social support and family functioning were relatively high, contrary to public and academic discourse. In working with these families postseparation, nurses should approach care from a strength-based perspective, and integrate tailored assessment and intervention options for women and families that address both depression and social support. © 2016 John Wiley & Sons Ltd.

  10. Marshes on the Move: Testing effects of seawater intrusion on ...

    EPA Pesticide Factsheets

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  11. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  12. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  13. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  14. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  15. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  16. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  17. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  18. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  19. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  20. The Experience of Cognitive Intrusion of Pain: scale development and validation

    PubMed Central

    Attridge, Nina; Crombez, Geert; Van Ryckeghem, Dimitri; Keogh, Edmund; Eccleston, Christopher

    2015-01-01

    Abstract Patients with chronic pain often report their cognition to be impaired by pain, and this observation has been supported by numerous studies measuring the effects of pain on cognitive task performance. Furthermore, cognitive intrusion by pain has been identified as one of 3 components of pain anxiety, alongside general distress and fear of pain. Although cognitive intrusion is a critical characteristic of pain, no specific measure designed to capture its effects exists. In 3 studies, we describe the initial development and validation of a new measure of pain interruption: the Experience of Cognitive Intrusion of Pain (ECIP) scale. In study 1, the ECIP scale was administered to a general population sample to assess its structure and construct validity. In study 2, the factor structure of the ECIP scale was confirmed in a large general population sample experiencing no pain, acute pain, or chronic pain. In study 3, we examined the predictive value of the ECIP scale in pain-related disability in fibromyalgia patients. The ECIP scale scores followed a normal distribution with good variance in a general population sample. The scale had high internal reliability and a clear 1-component structure. It differentiated between chronic pain and control groups, and it was a significant predictor of pain-related disability over and above pain intensity. Repairing attentional interruption from pain may become a novel target for pain management interventions, both pharmacologic and nonpharmacologic. PMID:26067388

  1. Automating Access Control Logics in Simple Type Theory with LEO-II

    NASA Astrophysics Data System (ADS)

    Benzmüller, Christoph

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.

  2. Igneous Sheet Intrusions as a Record of Paleostress States

    NASA Astrophysics Data System (ADS)

    Stephens, T. L.; Walker, R. J.; Healy, D.; Bubeck, A.; England, R. W.; McCaffrey, K. J. W.

    2017-12-01

    The architecture of igneous sheet intrusion networks provides useful constraints on paleostress during emplacement. Several models for sill emplacement have used the close spatial relationships between sills and dikes in layered (sedimentary) host rocks to propose that dike-sill transitions are driven by layering. Such models require a stress rotation - from horizontal extension for dikes, to horizontal compression for sills - which is assumed to reflect a near-hydrostatic stress state, facilitating the dilation and intrusion of pre-existing structures (e.g. faults, joints, and bedding). Here, we present case examples of sills for which layering is not the main control on emplacement: Isle of Mull (UK), Faroe Islands (European Atlantic margin) and the San Rafael Subvolcanic Field (Utah, USA). In each case, dikes cut, or are cut by, sills; indicating that dikes were not the feeders to sills in the same section. The sills consist of linked, flat and shallowly-dipping segments that always show near-vertical opening directions. Sills cut bedding and formation contacts with consistent low-angle dips, and cut or abut against vertical faults, fractures, and tectonic foliations. From this, we infer that magma pressure during emplacement did not exceed the horizontal stress. To constrain the stress state during emplacement we present a novel approach that combines analysis of local and overall sill geometry data with mechanical models for slip tendency, dilation tendency, and fracture susceptibility. We also present a new depth-independent mechanical model, which estimates paleostress ratio and driving fluid pressure ratio using the opening angles of dilated fluid-filled fractures. Our results show that the studied sills record previously unrecognised local fluctuations in the far-field stress state, during magmatic supply. Sills, therefore, present an important tool for determining paleostress in areas where few brittle deformation structures (e.g. faults), other than

  3. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  4. Effect of winds and waves on salt intrusion in the Pearl River estuary

    NASA Astrophysics Data System (ADS)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  5. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  6. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    PubMed Central

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  7. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    PubMed

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  8. Fingerprinting Software Defined Networks and Controllers

    DTIC Science & Technology

    2015-03-01

    24 2.5.3 Intrusion Prevention System with SDN . . . . . . . . . . . . . . . 25 2.5.4 Modular Security Services...Control Message Protocol IDS Intrusion Detection System IPS Intrusion Prevention System ISP Internet Service Provider LLDP Link Layer Discovery Protocol...layer functions (e.g., web proxies, firewalls, intrusion detection/prevention, load balancers, etc.). The increase in switch capabilities combined

  9. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  10. Linking magnetic fabric and cumulate texture in layered mafic-ultramafic intrusions (Invited)

    NASA Astrophysics Data System (ADS)

    O Driscoll, B.; Stevenson, C.; Magee, C.

    2013-12-01

    Research on the magnetic fabrics of igneous rocks, pioneered by Balsley and Buddington[1] and Khan[2], has greatly contributed to our understanding of magma dynamics in lava flows, sheet intrusions and plutons over the past five decades. However, considerably few magnetic fabric studies have focused on layered mafic-ultramafic intrusions, particularly ';lopolithic' intrusions, despite the fact that such rocks may preserve a large range of small-scale kinematic structures potentially related to important magma chamber processes. This may be partly due to the fact that mafic-ultramafic cumulates commonly exhibit visible planar fabrics (mineral lamination), as well as compositional layering, in contrast to the frequent absence of such features in granite bodies or fine-grained mafic lava flows. Indeed, debates in the 1970s and 1980s on the development of layering and mineral fabrics in mafic-ultramafic intrusions, focused around the crystal settling versus in situ crystallisation paradigms, are classic in the subject of igneous petrology. Central to these debates is the notion that a wide range of magma chamber processes occur in layered mafic-ultramafic intrusions that are not frequently considered to occur in their relatively viscous granitic counterparts; in essence, the latter have historically been viewed as much more likely to ';freeze-in' a primary magma flow fabric whilst mafic-ultramafic intrusions are subjected to a more protracted solidification history. This wide array of potential initial sources for layering and mineral fabrics in layered mafic-ultramafic intrusions, together with the possible modification of textures at the postcumulus stage, demands a cautious application of any fabric analysis and presents a problem well-suited to interrogation by the AMS technique. The purpose of this contribution is to provide specific context on the application of AMS to elucidating the formation of cumulates in layered mafic-ultramafic intrusions. Examples of AMS

  11. Formalization of the Access Control on ARM-Android Platform with the B Method

    NASA Astrophysics Data System (ADS)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  12. Intrusions and provoked and spontaneous confabulations on memory tests in Korsakoff's syndrome.

    PubMed

    Rensen, Yvonne C M; Oosterman, Joukje M; Walvoort, Serge J W; Eling, Paul A T M; Kessels, Roy P C

    2017-03-01

    Intrusions on verbal memory tests have been used as an index for clinical confabulation. Severe memory impairments in combination with executive dysfunction have been suggested to be the underlying mechanism of confabulation, but to date, this relation is unclear. The aim of this study was (a) to examine the relation between (different types of) intrusions and confabulations in a large sample of confabulating patients with Korsakoff's syndrome (KS) and (b) to investigate whether different measures of executive functioning and memory performance are related to provoked and spontaneous confabulation. The Dutch version of the California Verbal Learning Test (CVLT) and various executive function and memory tests were administered to a group of 51 confabulating patients with KS. Professional caregivers rated the severity of provoked and spontaneous confabulation behavior of the patients using the Nijmegen-Venray Confabulation List-20 (NVCL-20). The total number of intrusions on the CVLT was not related to either provoked or spontaneous confabulation scores. None of the CVLT intrusion scores correlated significantly with any of the confabulation scores, but we did find small-to-medium, positive correlations between unrelated intrusions and both provoked confabulations and spontaneous confabulation. Provoked confabulation behavior was associated with executive dysfunction and poorer memory performances. Spontaneous confabulation was not related to performance on measures of executive function and memory. The total number of intrusions on verbal memory tests and clinical confabulations appear to be different phenomena. Only unrelated intrusions produced on the CVLT might possibly be related to confabulations. The production of provoked, but not spontaneous, confabulation is associated with executive dysfunction and memory deficits.

  13. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    PubMed

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  14. JOHNSON AND ETTINGER (1991) VAPOR INTRUSION MODEL WITH SUB-SLAB CONCENTRATION

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is known as vapor intrusion (VI). Under certain circumstances, people living in homes above contaminated soil or ground water may be exposed to harmful levels of these vapors. Vapor intrusion is a part...

  15. Igneous intrusion models for floor fracturing in lunar craters

    NASA Technical Reports Server (NTRS)

    Wichman, R. W.; Schultz, P. H.

    1991-01-01

    Lunar floor-fractured craters are primarily located near the maria and frequently contain ponded mare units and dark mantling deposits. Fracturing is confined to the crater interior, often producing a moat-like feature near the floor edge, and crater depth is commonly reduced by uplift of the crater floor. Although viscous relaxation of crater topography can produce such uplift, the close association of modification with surface volcanism supports a model linking floor fracture to crater-centered igneous intrusions. The consequences of two intrusion models for the lunar interior are quantitatively explored. The first model is based on terrestrial laccoliths and describes a shallow intrusion beneath the crater. The second model is based on cone sheet complexes where surface deformation results from a deeper magma chamber. Both models, their fit to observed crater modifications and possible implications for local volcanism are described.

  16. Reducing depressive intrusions via a computerized cognitive bias modification of appraisals task: developing a cognitive vaccine.

    PubMed

    Lang, Tamara J; Moulds, Michelle L; Holmes, Emily A

    2009-02-01

    A feature of depression is the distressing experience of intrusive, negative memories. The maladaptive appraisals of such intrusions have been associated with symptom persistence. This study aimed to experimentally manipulate appraisals about depressive intrusions via a novel computerized cognitive bias modification (CBM) of appraisals paradigm, and to test the impact on depressive intrusion frequency for a standardized event (a depressive film). Forty-eight participants were randomly assigned to either a session of positive or negative CBM. Participants then watched a depressing film (including scenes of bereavement and bullying) and subsequently monitored the occurrence of depressive intrusions related to the film in a diary for one week. At one-week follow-up, participants completed additional measures of intrusions--the Impact of Event Scale (IES) and an intrusion provocation task. As predicted, compared to the negative condition, participants who underwent positive CBM showed a more positive appraisal bias. Further, one week later, positive CBM participants reported fewer intrusions of the film and had lower IES scores. Our findings demonstrate that it is possible to manipulate maladaptive appraisals about depressive intrusions via a computerized CBM task. Further, this effect transfers to reducing intrusive symptomatology related to a standardized event (a depressive film) over one week, suggesting novel clinical implications.

  17. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    PubMed

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  18. Intrusive hyaloclastite and peperitic breccias associated to sill and cryptodome emplacement on an Early Paleocene polymagmatic compound cone-dome volcanic complex from El Guanaco mine, Northern Chile

    NASA Astrophysics Data System (ADS)

    Páez, G. N.; Permuy Vidal, C.; Galina, M.; López, L.; Jovic, S. M.; Guido, D. M.

    2018-04-01

    This work explores the textural characteristics, morphology and facies architecture of well-preserved Paleocene hyaloclastic and peperitic breccias associated with subvolcanic intrusions at El Guanaco gold mine (Northern Chile). The El Guanaco mine volcanic sequence is part of a polymagmatic compound cone-dome volcanic complex grouping several dacitic domes and maar-diatremes, and subordinated subvolcanic intrusions of basaltic, andesitic and dacitic compositions. The Soledad-Peñafiel Fault System is a first order regional structure controlling the location and style of the volcanism in the region. Three different intrusive bodies (Basaltic sills, Dacitic cryptodomes and Andesitic cryptodomes) were found to intrude into a wet and poorly consolidated pyroclastic sequence representing the upper portions of a maar-diatreme. Consequently, extensive quench fragmentation and fluidization along their contacts occurred, leading to the formation of widespread breccia bodies enclosing a coherent nucleus. Differences in matrix composition allows to define two main breccias types: 1) poorly-sorted monomictic breccias (intrusive hyaloclastites) and 2) poorly-sorted tuff-matrix breccias (peperites). The observed facies architecture is interpreted as the result of the interplay of several factors, including: 1) magma viscosity, 2) the geometry of the intrusives, and 3) variations on the consolidation degree of the host rocks. Additionally, the overall geometry of each intrusive is interpreted to be controlled by the effective viscosity of the magmas along with the available magma volume at the time of the intrusions. The presence of three compositionally different subvolcanic bodies with intrusive hyaloclastite and peperite envelopes indicate, not only that all these intrusions occurred in a short period of time (probably less than 2-3 Ma), but also that the volcaniciclastic pile suffer little or none compaction nor consolidation during that time. The presence of three

  19. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  20. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  1. Global Access-controlled Transfer e-frame (GATe)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  2. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  3. New device to measure dynamic intrusion/extrusion cycles of lyophobic heterogeneous systems.

    PubMed

    Guillemot, Ludivine; Galarneau, Anne; Vigier, Gérard; Abensur, Thierry; Charlaix, Élisabeth

    2012-10-01

    Lyophobic heterogeneous systems (LHS) are made of mesoporous materials immersed in a non-wetting liquid. One application of LHS is the nonlinear damping of high frequency vibrations. The behaviour of LHS is characterized by P - ΔV cycles, where P is the pressure applied to the system, and ΔV its volume change due to the intrusion of the liquid into the pores of the material, or its extrusion out of the pores. Very few dynamic studies of LHS have been performed until now. We describe here a new apparatus that allows us to carry out dynamic intrusion/extrusion cycles with various liquid/porous material systems, controlling the temperature from ambient to 120 °C and the frequency from 0.01 to 20 Hz. We show that for two LHS: water/MTS and Galinstan/CPG, the energy dissipated during one cycle depends very weakly on the cycle frequency, in strong contrast to conventional dampers.

  4. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    DOE PAGES

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-flymore » during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.« less

  5. Effects of intrusions on grades and contents of gold and other metals in volcanogenic massive sulfide deposits

    USGS Publications Warehouse

    Singer, Donald A.; Berger, Vladimir; Mosier, Dan L.

    2011-01-01

    The reason some VMS deposits contain more gold or other metals than others might be due to the influence of intrusions. A new approach examining this possibility is based on examining the information about many VMS deposits to test statistically if those with associated intrusions have significantly different grades or amounts of metals. A set of 632 VMS deposits with reported grades, tonnages, and information about the observed presence or absence of subvolcanic or plutonic intrusive bodies emplaced at or after VMS mineralization is statistically analyzed.Deposits with syn-mineralization or post-mineralization intrusions nearby have higher tonnages than deposits without reported intrusions, but the differences are not statistically significant. When both kinds of intrusions are reported, VMS deposit sizes are significantly higher than in the deposits without any intrusions. Gold, silver, zinc, lead, and copper average grades are not significantly different in the VMS deposits with nearby intrusions compared to deposits without regardless of relative age of intrusive. Only zinc and copper contents are significantly higher in VMS deposits with both kinds of intrusive reported. These differences in overall metal content are due to significantly larger deposit sizes of VMS deposits where both intrusive kinds are observed and reported, rather than any difference in metal grades.

  6. The use of data-mining techniques for developing effective decisionsupport systems: A case study of simulating the effects ofclimate change on coastal salinity intrusion

    USGS Publications Warehouse

    Conrads, Paul; Edwin Roehl, Jr.

    2017-01-01

    Natural-resource managers and stakeholders face difficult challenges when managing interactions between natural and societal systems. Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. The availability of freshwater in coastal streams can be threatened by saltwater intrusion. Even though the collective interests and computer skills of the community of managers, scientists and other stakeholders are quite varied, there is an overarching need for equal access by all to the scientific knowledge needed to make the best possible decisions. This paper describes a decision support system, PRISM-2, developed to evaluate salinity intrusion due to potential climate change along the South Carolina coast in southeastern USA. The decision support system is disseminated as a spreadsheet application and integrates the output of global circulation models, watershed models and salinity intrusion models with real-time databases for simulation, graphical user interfaces, and streaming displays of results. The results from PRISM-2 showed that a 31-cm and 62-cm increase in sea level reduced the daily availability of freshwater supply to a coastal municipal intake by 4% and 12% of the time, respectively. Future climate change projections by a global circulation model showed a seasonal change in salinity intrusion events from the summer to the fall for the majority of events.

  7. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  8. Distributed intrusion monitoring system with fiber link backup and on-line fault diagnosis functions

    NASA Astrophysics Data System (ADS)

    Xu, Jiwei; Wu, Huijuan; Xiao, Shunkun

    2014-12-01

    A novel multi-channel distributed optical fiber intrusion monitoring system with smart fiber link backup and on-line fault diagnosis functions was proposed. A 1× N optical switch was intelligently controlled by a peripheral interface controller (PIC) to expand the fiber link from one channel to several ones to lower the cost of the long or ultra-long distance intrusion monitoring system and also to strengthen the intelligent monitoring link backup function. At the same time, a sliding window auto-correlation method was presented to identify and locate the broken or fault point of the cable. The experimental results showed that the proposed multi-channel system performed well especially whenever any a broken cable was detected. It could locate the broken or fault point by itself accurately and switch to its backup sensing link immediately to ensure the security system to operate stably without a minute idling. And it was successfully applied in a field test for security monitoring of the 220-km-length national borderline in China.

  9. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  10. Alerts Visualization and Clustering in Network-based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administratormore » with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.« less

  11. The Effects of Saltwater Intrusion to Flood Mitigation Project

    NASA Astrophysics Data System (ADS)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  12. Quantification of the Intrusion Process at Kïlauea Volcano, Hawai'I

    NASA Astrophysics Data System (ADS)

    Wright, T. L.; Marsh, B. D.

    2014-12-01

    Knowing the time between initial intrusion and later eruption of a given volume of differentiated magma is key to evaluating the connections among magma transport and emplacement, solidification and differentiation, and melt extraction and eruption. Cooling rates for two Kïlauea lava lakes as well as known parent composition and residence times for intrusions that resulted in fractionated lavas later erupted on the East Rift Zone in 1955 (34 years) and 1977 (22 years) allow intrusion dimensions to be calculated. We model intrusions beneath Kïlauea's East Rift Zone near their point of separation from the magma transport path at ~ 5 km depth using Jaeger's (1957) method calibrated against Alae and Makaopuhi lava lakes with wallrock temperatures above the curie point at 450-550°C. Minimum thicknesses of 50-70 meters are found for intrusions that fed the two fractionated lavas, as well as for long-lived magma bodies identified from geodetic monitoring during many East Rift eruptions. These intrusions began as dikes, but probably became sills or laccolithic bodies that remained near the transport path. Short-lived intrusions also arrested near the magma transport path, but that retain a dike geometry, are hypothesized to serve as a trigger for the small but discrete increments of seaward movement on Kïlauea's south flank that characterize slow-slip earthquakes. Two additional thoughts arise from the quantitative modeling of magma cooling. First, long-term heating of the wallrock surrounding the horizontal East Rift Zone transport path slows the rate of cooling within the conduit, possibly contributing to the longevity of the East Rift eruption that began in 1983. Second, the combined effects of heating of the wall rock and ever-increasing magma supply rate from the mantle may have forced breakdown and widening of the vertical transport conduit, which could explain the 5-15-km deep long-period earthquake swarms beneath Kīlauea's summit between 1987 and 1992.

  13. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  14. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  15. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    NASA Astrophysics Data System (ADS)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  16. ON-LINE CALCULATOR: VAPOR INTRUSION MODELING

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is called vapor intrusion (VI). Volatile organic chemicals in contaminated soils or groundwater can emit vapors, which may migrate through subsurface soils and may enter the indoor air of overlying build...

  17. Work Zone Intrusion Report Interface Design

    DOT National Transportation Integrated Search

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  18. ASSESSMENT OF VAPOR INTRUSION USING INDOOR AND SUB-SLAB AIR SAMPLING

    EPA Science Inventory

    The objective of this investigation was to develop a method for evaluating vapor intrusion using indoor and sub-slab air measurement and at the same time directly assist EPA’s New England Regional Office in evaluating vapor intrusion in 15 homes and one business near the former R...

  19. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  20. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  1. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is crediblemore » as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required.« less

  2. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  3. Attenuating fearful memories: effect of cued extinction on intrusions.

    PubMed

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  4. Ratio of Major Ions in Groundwater to Determine Saltwater Intrusion in Coastal Areas

    NASA Astrophysics Data System (ADS)

    Sudaryanto; Naily, Wilda

    2018-02-01

    Saltwater or seawater intrusion into groundwater aquifers occurs mostly in big cities and developing coastal cities. Coastal hydrology is associated with complex and highly dynamic environmental characteristics of interactions between groundwater, surface water, and water from the estuary. The rise of sea levels and excessive use of groundwater for clean water source trigger saltwater intrusion. Identification of saltwater intrusion into groundwater can be done by groundwater sampling and major ion analysis. The major ions dissolved in water are Ca, Mg, Na, K, Cl, HCO3, and SO4; the major ion ratios are Cl/Br, Ca/Mg, Ca/ (HCO3 and SO4), and Na/Cl. By knowing whether groundwater quality has been or has not been influenced by saltwater, groundwater zones can be determined in every coastal area. In addition, by analyzing and reviewing some concepts about the intrusion or contamination of saltwater into groundwater, there will be sufficient results for the identification of saltwater intrusion.

  5. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    PubMed

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  6. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms

    PubMed Central

    James, Ella L.; Bonsall, Michael B.; Hoppitt, Laura; Tunbridge, Elizabeth M.; Geddes, John R.; Milton, Amy L.

    2015-01-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind’s eye and cause distress. We investigated whether reconsolidation—the process during which memories become malleable when recalled—can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. PMID:26133572

  7. A Simulation-Optimization Model for the Management of Seawater Intrusion

    NASA Astrophysics Data System (ADS)

    Stanko, Z.; Nishikawa, T.

    2012-12-01

    Seawater intrusion is a common problem in coastal aquifers where excessive groundwater pumping can lead to chloride contamination of a freshwater resource. Simulation-optimization techniques have been developed to determine optimal management strategies while mitigating seawater intrusion. The simulation models are often density-independent groundwater-flow models that may assume a sharp interface and/or use equivalent freshwater heads. The optimization methods are often linear-programming (LP) based techniques that that require simplifications of the real-world system. However, seawater intrusion is a highly nonlinear, density-dependent flow and transport problem, which requires the use of nonlinear-programming (NLP) or global-optimization (GO) techniques. NLP approaches are difficult because of the need for gradient information; therefore, we have chosen a GO technique for this study. Specifically, we have coupled a multi-objective genetic algorithm (GA) with a density-dependent groundwater-flow and transport model to simulate and identify strategies that optimally manage seawater intrusion. GA is a heuristic approach, often chosen when seeking optimal solutions to highly complex and nonlinear problems where LP or NLP methods cannot be applied. The GA utilized in this study is the Epsilon-Nondominated Sorted Genetic Algorithm II (ɛ-NSGAII), which can approximate a pareto-optimal front between competing objectives. This algorithm has several key features: real and/or binary variable capabilities; an efficient sorting scheme; preservation and diversity of good solutions; dynamic population sizing; constraint handling; parallelizable implementation; and user controlled precision for each objective. The simulation model is SEAWAT, the USGS model that couples MODFLOW with MT3DMS for variable-density flow and transport. ɛ-NSGAII and SEAWAT were efficiently linked together through a C-Fortran interface. The simulation-optimization model was first tested by using a

  8. A new interpretation of the structure of the Sept Iles Intrusive suite, Canada

    NASA Astrophysics Data System (ADS)

    Higgins, Michael D.

    2005-08-01

    The layered mafic intrusion at Sept Iles, Canada, is one of the largest intrusions in the world. A new interpretation of its structure is proposed, based on a review of its geology and a comparison with the Skaergaard intrusion, Greenland. Several different magmatic components are recognized; hence the name Sept Iles Intrusive suite (SIIS) is proposed. Emplacement of the suite may have been preceded by eruption of flood basalts. The first magmas of the suite rose in the crust to accumulate beneath the density filter afforded by the basalts. The largest component is the Sept Iles Mafic intrusion (SIMI). The Lower series of the SIMI is dominated by leucotroctolites and leucogabbros. Above it lie the Layered series, which is largely comprised of gabbro and troctolite. Both these units are unchanged from earlier interpretations. The anorthosites (s.l.), gabbros and monzogabbros, formerly called the Transitional series, are now considered to be the Upper Border series, developed by floatation of plagioclase. Common autoliths in the Layered series are parts of the hydrothermally altered Upper Border series from towards the interior of the intrusion, which have foundered and settled through the magma. The contamination of the magma that accompanied this event oxidised iron in the magma and led to the precipitation of magnetite around the periphery of the intrusion. The subsequent depletion of Fe 3+ and/or increase in SiO 2, CaO and P 2O 5 may have induced apatite saturation and accumulation to form two layers rich in apatite, near the base and at top of the Layered series. Granitic magma was developed by fractional crystallisation and was emplaced along the roof of the chamber, where it acquired large quantities of xenoliths. These were probably derived from the flood basalts, their evolved members and fragments of mafic dykes chilled by the granitic magma. Accumulations of monzonite pillows in this unit testify to another magmatic event and a floor to the granitic magma

  9. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  10. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  11. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    NASA Astrophysics Data System (ADS)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  12. Lithologic mapping of mafic intrusions in East Greenland using Landsat Thematic Mapper data

    NASA Technical Reports Server (NTRS)

    Naslund, H. Richard; Birnie, R. W.; Parr, J. T.

    1989-01-01

    The East Greenland Tertiary Igneous Province contains a variety of intrusive and extrusive rock types. The Skaergaard complex is the most well known of the intrusive centers. Landsat thematic mapping (TM) was used in conjunction with field spectrometer data to map these mafic intrusions. These intrusions are of interest as possible precious metal ore deposits. They are spectrally distinct from the surrounding Precambrian gneisses. However, subpixel contamination by snow, oxide surface coatings, lichen cover and severe topography limit the discrimination of lithologic units within the gabbro. Imagery of the Skaergaard and surrounding vicinity, and image processing and enhancement techniques are presented. Student theses and other publications resulting from this work are also listed.

  13. Simple measurement-based admission control for DiffServ access networks

    NASA Astrophysics Data System (ADS)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  14. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  15. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  16. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  17. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  18. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    PubMed

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Forensic identification of resampling operators: A semi non-intrusive approach.

    PubMed

    Cao, Gang; Zhao, Yao; Ni, Rongrong

    2012-03-10

    Recently, several new resampling operators have been proposed and successfully invalidate the existing resampling detectors. However, the reliability of such anti-forensic techniques is unaware and needs to be investigated. In this paper, we focus on the forensic identification of digital image resampling operators including the traditional type and the anti-forensic type which hides the trace of traditional resampling. Various resampling algorithms involving geometric distortion (GD)-based, dual-path-based and postprocessing-based are investigated. The identification is achieved in the manner of semi non-intrusive, supposing the resampling software could be accessed. Given an input pattern of monotone signal, polarity aberration of GD-based resampled signal's first derivative is analyzed theoretically and measured by effective feature metric. Dual-path-based and postprocessing-based resampling can also be identified by feeding proper test patterns. Experimental results on various parameter settings demonstrate the effectiveness of the proposed approach. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  20. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  1. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  2. A Citizen's Guide to Vapor Intrusion Mitigation

    EPA Pesticide Factsheets

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  3. Celebrating 50 years of SWIMs (Salt Water Intrusion Meetings)

    NASA Astrophysics Data System (ADS)

    Post, Vincent E. A.; Essink, Gualbert Oude; Szymkiewicz, Adam; Bakker, Mark; Houben, Georg; Custodio, Emilio; Voss, Clifford

    2018-06-01

    The Salt Water Intrusion Meetings, or SWIMs, are a series of meetings that focus on seawater intrusion in coastal aquifers and other salinisation processes. 2018 marks the 50th year of the SWIM and the 25th biennial meeting. The SWIM proceedings record half a century of research progress on site characterisation, geophysical and geochemical techniques, variable-density flow, modelling, and water management. The SWIM is positioning itself to remain a viable platform for discussing the coastal aquifer management challenges of the next 50 years.

  4. Posttraumatic Intrusion, Avoidance, and Social Functioning: A 20-Year Longitudinal Study

    ERIC Educational Resources Information Center

    Solomon, Zahava; Mikulincer, Mario

    2007-01-01

    The study assesses posttraumatic intrusion, avoidance, and social functioning among 214 Israeli combat veterans from the first Lebanon War with and without combat stress reaction (CSR) 1, 2, 3, and 20 years after the war. CSR veterans reported higher intrusion and avoidance than did non-CSR veterans. With time, there was a decline in these…

  5. Obsessive relational intrusion: incidence, perceived severity, and coping.

    PubMed

    Cupach, W R; Spitzberg, B H

    2000-01-01

    Two studies investigated the phenomenon of obsessive relational intrusion (ORI), defined as repeated and unwanted pursuit and invasion of one's sense of physical or symbolic privacy by another person, either stranger or acquaintance, who desires and/or presumes an intimate relationship. In Study 1, we sought to identify the incidence of a broad range of relationally intrusive behaviors, to identify the coping responses employed by victims of ORI, and to assess the associations between coping responses and ORI behaviors. Study 2 assessed the perceived degree of severity of ORI behaviors. Results revealed that each of 63 ORI behaviors was experienced by 3-78% of respondents in three different samples. Factor analysis revealed four types of ORI behavior: pursuit, violation, threat, and hyper-intimacy. Responses for coping with ORI consisted of interaction, protection, retaliation, and evasion. Virtually all intrusive behaviors were perceived to be annoying. Some types of ORI behaviors were perceived to be relatively more threatening, upsetting and privacy-invading than others. Although sex differences were not observed for the incidence of ORI or coping, women consistently perceived ORI behaviors to be more annoying, upsetting, threatening, and privacy-invading than did men.

  6. AdaBoost-based algorithm for network intrusion detection.

    PubMed

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  7. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...

  8. An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

    PubMed Central

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-01-01

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology. PMID:25268920

  9. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability

    PubMed Central

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A.

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals. PMID:25814962

  10. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    PubMed

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  11. Access Control for Home Data Sharing: Attitudes, Needs and Practices

    DTIC Science & Technology

    2009-10-01

    cameras, mobile phones and portable music players make creating and interacting with this content easy. Home users are increasingly interested in...messages, photos, home videos, journal files and home musical recordings. Many participants considered unauthorized access by strangers, acquaintances...configuration does not allow users to share different subsets of music with different people. Facebook supplies rich, customizable access controls for

  12. Climate variability modulates western US ozone air quality in spring via deep stratospheric intrusions

    PubMed Central

    Lin, Meiyun; Fiore, Arlene M.; Horowitz, Larry W.; Langford, Andrew O.; Oltmans, Samuel J.; Tarasick, David; Rieder, Harald E.

    2015-01-01

    Evidence suggests deep stratospheric intrusions can elevate western US surface ozone to unhealthy levels during spring. These intrusions can be classified as ‘exceptional events', which are not counted towards non-attainment determinations. Understanding the factors driving the year-to-year variability of these intrusions is thus relevant for effective implementation of the US ozone air quality standard. Here we use observations and model simulations to link these events to modes of climate variability. We show more frequent late spring stratospheric intrusions when the polar jet meanders towards the western United States, such as occurs following strong La Niña winters (Niño3.4<−1.0 °C). While El Niño leads to enhancements of upper tropospheric ozone, we find this influence does not reach surface air. Fewer and weaker intrusion events follow in the two springs after the 1991 volcanic eruption of Mt. Pinatubo. The linkage between La Niña and western US stratospheric intrusions can be exploited to provide a few months of lead time during which preparations could be made to deploy targeted measurements aimed at identifying these exceptional events. PMID:25964012

  13. Fronts and intrusions in the upper Deep Polar Water of the Eurasian and Makarov basins

    NASA Astrophysics Data System (ADS)

    Kuzmina, Natalia; Rudels, Bert; Zhurbas, Natalia; Lyzhkov, Dmitry

    2013-04-01

    CTD data obtained in the Arctic Basin are analyzed to describe structural features of intrusive layers and fronts encountered in the upper Deep Polar Water. This work is an extension of Arctic intrusions studies by Rudels et al. (1999) and Kuzmina et al. (2011). Numerous examples of fronts and intrusions observed in a deep layer (depth range of 600-1300 m) in the Eurasian and Makarov basins where salinity is increasing, and temperature is decreasing with depth (stable-stable thermohaline stratification), are described. The data are used to estimate hydrological parameters capable of determining different types of fronts and characterizing intrusive layers depending on the front structure. Coherence of intrusive layers is shown to get broken with the change of front structure. An evidence is found that enhanced turbulent mixing above local bottom elevations can prevent from intrusive layering. A linear stability model description of the observed intrusions is developed based on the Merryfield's (2000) assumption that interleaving is caused by differential mixing. Theoretical analysis is focused on prediction of the slopes of unstable modes at baroclinic and thermohaline fronts. Apparent vertical diffusivity due to turbulent mixing at baroclinic and thermohaline fronts is estimated on the basis of comparison of observed intrusion slopes with modeled slopes of the most unstable modes. Apparent lateral diffusivity is estimated too, based on Joyce (1980) approach. These estimates show that intrusive instability of fronts caused by differential mixing can result in sizable values of apparent lateral heat diffusivity in the deep Arctic layer that are quite comparable with those of the upper and intermediate Arctic layers (Walsh, Carmack, 2003; Kuzmina et al., 2011).

  14. Comparison of intrusion effects on maxillary incisors among mini implant anchorage, j-hook headgear and utility arch.

    PubMed

    Jain, Ravindra Kumar; Kumar, Sridhar Prem; Manjula, W S

    2014-07-01

    Intrusion of maxillary incisors is one of the most important and difficult tooth movements to achieve as a part of orthodontic therapy. A variety of techniques were used in the past to intrude the maxillary incisors before the emergence of mini implants in Orthodontics. Mini implants are temporary anchorage devices used to produce various tooth movements. The research was carried out to evaluate and compare the efficiency of producing intrusion of maxillary incisors using mini implants, utility arch and j- hook headgear. The study was conducted on 30 subjects divided into 3 Groups equally. Group 1- mini implant anchorage, Group 2 - j- hooks headgear and Group 3- utility arch were used for intrusion of the maxillary incisors. Conventional lateral cephalograms were taken before treatment and at the end of intrusion. Five cephalometric parameters were used to measure the amount of intrusion attained in each Group. Intra Group comparisons were done using student t-test and inter Group comparisons were done using ANOVA The duration of intrusion was four months in all the three Groups. In Group 1 the mean average intrusion attained was 2.1 mm, the mean average intrusion attained in Group 2 was 0.7 mm, and the mean average intrusion achieved in Group 3 was 1.4 mm with a side effect of 0.75 mm of molar extrusion. Although, both mini implants and utility arch can be used to attain significant amounts of incisor intrusion but using mini implants will produce true intrusion without any other side effects.

  15. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420...

  16. Water intrusion in thin-skinned composite honeycomb sandwich structures

    NASA Technical Reports Server (NTRS)

    Jackson, Wade C.; O'Brien, T. Kevin

    1988-01-01

    Thin-skinned composite honeycomb sandwich structures from the trailing edge of the U.S. Army's Apache and Chinook helicopters have been tested to ascertain their susceptibility to water intrusion as well as such intrusions' effects on impact damage and cyclic loading. Minimum-impact and fatigue conditions were determined which would create microcracks sufficiently large to allow the passage of water through the skins; damage sufficient for this to occur was for some skins undetectable under a 40X-magnification optical microscope. Flow rate was a function of moisture content, damage, applied strain, and pressure differences.

  17. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  18. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    NASA Astrophysics Data System (ADS)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  19. Evaluation of the effects of sea-level change and coastal canal management on saltwater intrusion in the Biscayne aquifer of south Florida, USA

    NASA Astrophysics Data System (ADS)

    Hughes, J. D.; Sifuentes, D. F.; White, J.

    2015-12-01

    Sea-level increases are expected to have an effect on the position of the freshwater-saltwater interface in the Biscayne aquifer in south Florida as a result of the low topographic relief of the area and high rates of groundwater withdrawal from the aquifer. To study the effects that future sea-level increases will have on saltwater intrusion in the Biscayne aquifer in Broward County, Florida, a three-dimensional, variable-density, groundwater-flow and transport model was developed. The model was calibrated to observed groundwater heads and chloride concentrations for a 62-year period that includes historic increases in sea level, development of a surface-water management system to control flooding, and increases in groundwater withdrawals as the area transitioned from agricultural to urban land uses. Sensitivity analyses indicate that downward leakage of saltwater from coastal canals and creeks was the primary source of saltwater to the Biscayne aquifer during the last 62-years in areas where the surface-water system is not actively managed and is tidally influenced. In areas removed from the coastal canals and creeks or under active surface-water management, historic groundwater withdrawals were the primary cause of saltwater intrusion into the aquifer. Simulation of future conditions suggests that possible increases in sea level will result in additional saltwater intrusion. Model scenarios suggest that additional saltwater intrusion will be greatest in areas where coastal canals and creeks were historically the primary source of seawater. Future saltwater intrusion in those areas, however, may be reduced by relocation of salinity-control structures.

  20. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  1. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  2. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  3. The OPL Access Control Policy Language

    NASA Astrophysics Data System (ADS)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  4. Development and Application of a Three-Dimensional Finite Element Vapor Intrusion Model

    PubMed Central

    Pennell, Kelly G.; Bozkurt, Ozgur; Suuberg, Eric M.

    2010-01-01

    Details of a three-dimensional finite element model of soil vapor intrusion, including the overall modeling process and the stepwise approach, are provided. The model is a quantitative modeling tool that can help guide vapor intrusion characterization efforts. It solves the soil gas continuity equation coupled with the chemical transport equation, allowing for both advective and diffusive transport. Three-dimensional pressure, velocity, and chemical concentration fields are produced from the model. Results from simulations involving common site features, such as impervious surfaces, porous foundation sub-base material, and adjacent structures are summarized herein. The results suggest that site-specific features are important to consider when characterizing vapor intrusion risks. More importantly, the results suggest that soil gas or subslab gas samples taken without proper regard for particular site features may not be suitable for evaluating vapor intrusion risks; rather, careful attention needs to be given to the many factors that affect chemical transport into and around buildings. PMID:19418819

  5. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...

  6. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    NASA Astrophysics Data System (ADS)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  7. Enhanced accessibility of ignored neutral and negative items in nonclinical dissociative individuals.

    PubMed

    Chiu, Chui-De

    2018-01-01

    While clinical studies showed paradoxical memory phenomena, including the intrusion and amnesia of stressful experiences that are features of dissociation, the results of laboratory studies on dissociative individuals' forgetting of experimental stimuli through cognitive control varied. Some studies demonstrated ineffective inhibition, and others found that dissociative individuals could remember fewer trauma words in a divided-attention context. Dissociative individuals may utilize superior cognitive disengagement to forget the representations. This hypothesis was tested in nonclinical individuals with high, medium, and low dissociation proneness. In the study phase, the participants learned several lists of experimental words and kept updating working memory by remembering the last four items on a list (target) and ignoring those non-target items. A recognition test was then conducted. The high dissociation group performed better on updating working memory. However, the accessibility of the representations of neutral and negative non-target items was elevated. Dissociative individuals disengaged attention effectively from items they intended to ignore, and the representations of the ignored items were more accessible when cues were available. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Mechanical response of the south flank of kilauea volcano, hawaii, to intrusive events along the rift systems

    USGS Publications Warehouse

    Dvorak, J.J.; Okamura, A.T.; English, T.T.; Koyanagi, R.Y.; Nakata, J.S.; Sako, M.K.; Tanigawa, W.T.; Yamashita, K.M.

    1986-01-01

    Increased earthquake activity and compression of the south flank of Kilauea volcano, Hawaii, have been recognized by previous investigators to accompany rift intrusions. We further detail the temporal and spatial changes in earthquake rates and ground strain along the south flank induced by six major rift intrusions which occurred between December 1971 and January 1981. The seismic response of the south flank to individual rift intrusions is immediate; the increased rate of earthquake activity lasts from 1 to 4 weeks. Horizontal strain measurements indicate that compression of the south flank usually accompanies rift intrusions and eruptions. Emplacement of an intrusion at a depth greater than about 4 km, such as the June 1982 southwest rift intrusion, however, results in a slight extension of the subaerial portion of the south flank. Horizontal strain measurements along the south flank are used to locate the January 1983 east-rift intrusion, which resulted in eruptive activity. The intrusion is modeled as a vertical rectangular sheet with constant displacement perpendicular to the plane of the sheet. This model suggests that the intrusive body that compressed the south flank in January 1983 extended from the surface to about 2.4 km depth, and was aligned along a strike of N66??E. The intrusion is approximately 11 km in length, extended beyond the January 1983 eruptive fissures, which are 8 km in length and is contained within the 14-km-long region of shallow rift earthquakes. ?? 1986.

  9. Mellin Transform-Based Correction Method for Linear Scale Inconsistency of Intrusion Events Identification in OFPS

    NASA Astrophysics Data System (ADS)

    Wang, Baocheng; Qu, Dandan; Tian, Qing; Pang, Liping

    2018-05-01

    For the problem that the linear scale of intrusion signals in the optical fiber pre-warning system (OFPS) is inconsistent, this paper presents a method to correct the scale. Firstly, the intrusion signals are intercepted, and an aggregate of the segments with equal length is obtained. Then, the Mellin transform (MT) is applied to convert them into the same scale. The spectral characteristics are obtained by the Fourier transform. Finally, we adopt back-propagation (BP) neural network to identify intrusion types, which takes the spectral characteristics as input. We carried out the field experiments and collected the optical fiber intrusion signals which contain the picking signal, shoveling signal, and running signal. The experimental results show that the proposed algorithm can effectively improve the recognition accuracy of the intrusion signals.

  10. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  11. Evaluation and analysis of non-intrusive techniques for detecting illicit substances

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Micklich, B.J.; Roche, C.T.; Fink, C.L.

    1995-12-31

    Argonne National Laboratory (ANL) and the Houston Advanced Research Center (HARC) have been tasked by the Counterdrug Technology Assessment Center of the Office of National Drug Control Policy to conduct evaluations and analyses of technologies for the non-intrusive inspection of containers for illicit substances. These technologies span the range of nuclear, X-ray, and chemical techniques used in nondestructive sample analysis. ANL has performed assessments of nuclear and X-ray inspection concepts and undertaken site visits with developers to understand the capabilities and the range of applicability of candidate systems. ANL and HARC have provided support to law enforcement agencies (LEAs), includingmore » participation in numerous field studies. Both labs have provided staff to assist in the Narcotics Detection Technology Assessment (NDTA) program for evaluating drug detection systems. Also, the two labs are performing studies of drug contamination of currency. HARC has directed technical evaluations of automated ballistics imaging and identification systems under consideration by law enforcement agencies. ANL and HARC have sponsored workshops and a symposium, and are participating in a Non-Intrusive Inspection Study being led by Dynamics Technology, Incorporated.« less

  12. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  13. Les intrusions de Wirgane (Haut Atlas occidental, Maroc): témoins d'un magmatisme syn- à tardi-cinématique hercynien? (Intrusions of Wirgane [western High Atlas, Morocco]: evidence for a syn- to late kinematic magmatism of Variscan age?)

    NASA Astrophysics Data System (ADS)

    Eddif, A.; Gasquet, D.; Hoepffner, C.; Ayad, N. Ait

    2000-11-01

    The Wirgane intrusives were emplaced into the Late Neoproterozoic to Palæozoic series of the northeast of the Moroccan western High Atlas. The intrusions exhibit a large compositional range from monzogabbro to granite, and they have suffered, together with the country rocks, part of the Variscan tectonic evolution. In the immediate vicinity of the intrusions, thermal metamorphism developed in the country rocks. According to the mineral chemistry of igneous amphibole compositions of diorites and metamorphic minerals, the depth of intrusives was estimated to be less than 11 km. Strain patterns, mapped in both the plutons and the country rocks, and microtectonic data indicate that the intrusions were emplaced in a dextral transcurrent shearing context during the Variscan Orogen. When compared with other intrusions of the western High Atlas (Tichka, Azegour), the Wirgane intrusives are considered to be related to the late stages of the Variscan Belt of Morocco.

  14. Intrusive Thoughts and Young Children's Knowledge about Thinking following a Natural Disaster

    ERIC Educational Resources Information Center

    Sprung, Manuel; Harris, Paul L.

    2010-01-01

    Background: "Hurricane Katrina" devastated the Mississippi Gulf Coast in August 2005. Intrusive re-experiencing is a common posttraumatic stress symptom. However, young children with limited introspection skills might have difficulties identifying their intrusive thoughts. Method: A sample of 165 5- to 9-year-old children were surveyed about their…

  15. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    PubMed Central

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field with scanning electron microscopy coupled to energy dispersive X-ray spectroscopy, chromatographic and spectrophotometric methods, and stable isotope tracing coupled with a mass balance of sulfur compounds. We found that Z. marina detoxified gaseous sediment-derived sulfide through incorporation and that most of the detoxification occurred in underground tissues, where sulfide intrusion was greatest. Elemental sulfur was a major detoxification compound, precipitating on the inner wall of the aerenchyma of underground tissues. Sulfide was metabolized into thiols and entered the plant sulfur metabolism as well as being stored as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments. PMID:26030258

  16. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    NASA Astrophysics Data System (ADS)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  17. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    PubMed

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  18. The petrogenesis of late Neoproterozoic mafic dyke-like intrusion in south Sinai, Egypt

    NASA Astrophysics Data System (ADS)

    Azer, M. K.; Abu El-Ela, F. F.; Ren, M.

    2012-08-01

    New field, petrographical and geochemical studies are presented here for the late Neoproterozoic Rimm intrusion (˜15 km long) exposed in the southern Sinai Peninsula, Egypt in the northernmost Arabian-Nubian Shield (ANS). Field relations indicate that the Rimm intrusion is younger than the surrounding metamorphic rocks and calc-alkaline syn-tectonic granodiorite and it was not affected by regional metamorphism. The anorogenic peralkaline granite of Gebel Serbal crosscuts the Rimm intrusion. The Rimm intrusion is made up of several consanguineous rock types with gradational contacts. It is composed chiefly of pyroxene-hornblende gabbro, hornblende gabbro and minor quartz diorite. The chemical composition of the mafic minerals indicated that the studied rocks derived from calc-alkaline mafic magma. Geochemically, the studied rocks are characterized by enrichment in LILE relative to HFSE and LREE relative to HREE [(Ce/Yb)N = 4.50-6.36]. Quartz diorite display slightly concave HREE pattern and slightly negative Eu-anomaly [(Eu/Eu*)n = 0.91] which may be the result of fractionation of amphibole and plagioclase from the source melt, respectively. The Rimm intrusion evolved from mafic mantle magma into different type rocks by fractional crystallization with minor crustal contamination. The initial magma corresponds to pyroxene-hornblende gabbro and the crystallization of hornblende was caused by slight H2O increase in magma after crystallization of near-liquidus clinopyroxene and Ca-rich plagioclase. Amphiboles geobarometer indicate that the gabbroic rocks of the Rimm intrusion crystallized at pressures between 4.8 and 6.4 Kb, while quartz diorite crystallized at 1.3-2.1 Kb. Crystallization temperatures range between 800 and 926 °C for the gabbros and between 667 and 784 °C for the quartz diorite. The Rimm intrusion represents a post-orogenic phase formed during the crustal thinning and extension of the Arabian-Nubian Shield.

  19. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...

  20. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  1. Mental Imagery and Post-Traumatic Stress Disorder: A Neuroimaging and Experimental Psychopathology Approach to Intrusive Memories of Trauma

    PubMed Central

    Clark, Ian A.; Mackay, Clare E.

    2015-01-01

    This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of post-traumatic stress disorder (PTSD). However, key questions, including those involving etiology, remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma) memory, involuntary recall, negative emotions, attention hijacking, and mental imagery. Each component part is considered in turn, both behaviorally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory, and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them. PMID:26257660

  2. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    PubMed

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p < .01, but was unrelated to physiological responses to trauma reminder images (ps > .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  3. Intrusive [r] and Optimal Epenthetic Consonants

    ERIC Educational Resources Information Center

    Uffmann, Christian

    2007-01-01

    This paper argues against the view of intrusive [r] as a synchronically arbitrary insertion process. Instead, it is seen as a phonologically natural process, which can be modelled within the framework of Optimality Theory (OT). Insertion of [r] in phonologically restricted environments is a consequence of a more general theory of consonant…

  4. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT.

    PubMed

    Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime

    2017-08-26

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.

  5. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT

    PubMed Central

    Carro, Belen; Sanchez-Esguevillas, Antonio

    2017-01-01

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host’s network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery. PMID:28846608

  6. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    PubMed

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  7. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.

    PubMed

    Ganapathy, S; Yogesh, P; Kannan, A

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  8. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    NASA Astrophysics Data System (ADS)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  9. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    PubMed Central

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  10. Testing a model of the relationship between childhood sexual abuse and psychosis in a first-episode psychosis group: the role of hallucinations and delusions, posttraumatic intrusions, and selective attention.

    PubMed

    Bendall, Sarah; Hulbert, Carol Anne; Alvarez-Jimenez, Mario; Allott, Kelly; McGorry, Patrick D; Jackson, Henry James

    2013-11-01

    Several theories suggest that posttraumatic intrusive symptoms are central to the relationship between childhood trauma (CT) and hallucinations and delusions in psychosis. Biased selective attention has been implicated as a cognitive process underlying posttraumatic intrusions. The current study sought to test theories of the relationship between childhood sexual abuse (CSA), hallucinations and delusions, posttraumatic intrusions, and selective attention in first-episode psychosis (FEP). Twenty-eight people with FEP and 21 nonclinical controls were assessed for CT and psychotic and posttraumatic stress symptoms and completed an emotional Stroop test using CSA-related and other words. Those with FEP and CSA had more severe hallucinations and delusions than those with FEP and without CSA. They also reported posttraumatic intrusions at clinical levels and showed selective attention to CSA-related words. The results are consistent with the posttraumatic intrusions account of hallucinations and delusions in those with CSA and psychosis.

  11. Deformation signals from InSAR time series analysis related to the 2007 and 2011 east rift zone intrusions at Kilauea Volcano, Hawaii

    NASA Astrophysics Data System (ADS)

    Baker, S.; Amelung, F.

    2011-12-01

    Located on the Big Island of Hawaii, Kilauea volcano is one of the most active volcanoes on Earth with continuous eruptive activity since 1983. The eruptive activity is predominately from the Pu'u O'o vent within the east rift zone, but periodic intrusions occur in the upper east rift zone between the summit and Pu'u O'o. These intrusions occur as dikes typically accompanied by fissure openings and eruptions of small volumes of lava. Interferometric synthetic aperture radar (InSAR) provides surface displacement measurements showing how the ground moves before, during, and after these intrusions. Given the recent increase in the number of active or planned SAR satellites and the more frequent repeat-pass times, InSAR is proving to be a valuable monitoring tool for volcanic hazards. Using data from Radarsat-1, Envisat, ALOS, and TerraSAR-X satellites, we generate line-of-sight InSAR time series using the small baseline subset (SBAS) which provides dense spatial and temporal coverage at Kilauea covering the 17 June 2007 and 5 March 2011 intrusions. For these two events, the summit caldera area switches from deflation to inflation months to years before both intrusions, and just prior to the intrusions we observe increased rates of inflation accompanied by elevated seismic activity in the upper east rift zone. Observations of the intrusion relate surface displacement and the response of the summit caldera area provide insight into the shallow magmatic system and the connectivity of the system. By combining InSAR time series with other geophysical data sets (such as seismic or GPS), we obtain more details about the associated hazard and a better understanding of the time-dependent relationship between what we are measuring and the controlling processes at the volcano.

  12. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  13. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  14. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    PubMed

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  15. Multi-User Low Intrusive Occupancy Detection

    PubMed Central

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  16. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth

    PubMed Central

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.

    2013-01-01

    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  17. An artificial bioindicator system for network intrusion detection.

    PubMed

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  18. Is mindfulness-based therapy an effective intervention for obsessive-intrusive thoughts: a case series.

    PubMed

    Wilkinson-Tough, Megan; Bocci, Laura; Thorne, Kirsty; Herlihy, Jane

    2010-01-01

    Despite the efficacy of cognitive-behavioural interventions in improving the experience of obsessions and compulsions, some people do not benefit from this approach. The present research uses a case series design to establish whether mindfulness-based therapy could benefit those experiencing obsessive-intrusive thoughts by targeting thought-action fusion and thought suppression. Three participants received a relaxation control intervention followed by a six-session mindfulness-based intervention which emphasized daily practice. Following therapy all participants demonstrated reductions in Yale-Brown Obsessive-Compulsive Scale scores to below clinical levels, with two participants maintaining this at follow-up. Qualitative analysis of post-therapy feedback suggested that mindfulness skills such as observation, awareness and acceptance were seen as helpful in managing thought-action fusion and suppression. Despite being limited by small participant numbers, these results suggest that mindfulness may be beneficial to some people experiencing intrusive unwanted thoughts and that further research could establish the possible efficacy of this approach in larger samples. Copyright (c) 2009 John Wiley & Sons, Ltd.

  19. Intrusion Detection System Visualization of Network Alerts

    DTIC Science & Technology

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  20. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  1. Perceptual processing during trauma, priming and the development of intrusive memories

    PubMed Central

    Sündermann, Oliver; Hauschildt, Marit; Ehlers, Anke

    2013-01-01

    Background Intrusive reexperiencing in posttraumatic stress disorder (PTSD) is commonly triggered by stimuli with perceptual similarity to those present during the trauma. Information processing theories suggest that perceptual processing during the trauma and enhanced perceptual priming contribute to the easy triggering of intrusive memories by these cues. Methods Healthy volunteers (N = 51) watched neutral and trauma picture stories on a computer screen. Neutral objects that were unrelated to the content of the stories briefly appeared in the interval between the pictures. Dissociation and data-driven processing (as indicators of perceptual processing) and state anxiety during the stories were assessed with self-report questionnaires. After filler tasks, participants completed a blurred object identification task to assess priming and a recognition memory task. Intrusive memories were assessed with telephone interviews 2 weeks and 3 months later. Results Neutral objects were more strongly primed if they occurred in the context of trauma stories than if they occurred during neutral stories, although the effect size was only moderate (ηp2=.08) and only significant when trauma stories were presented first. Regardless of story order, enhanced perceptual priming predicted intrusive memories at 2-week follow-up (N = 51), but not at 3 months (n = 40). Data-driven processing, dissociation and anxiety increases during the trauma stories also predicted intrusive memories. Enhanced perceptual priming and data-driven processing were associated with lower verbal intelligence. Limitations It is unclear to what extent these findings generalize to real-life traumatic events and whether they are specific to negative emotional events. Conclusions The results provide some support for the role of perceptual processing and perceptual priming in reexperiencing symptoms. PMID:23207970

  2. An Optimal Method for Detecting Internal and External Intrusion in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.

    Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

  3. Volumetric measurement of root resorption following molar mini-screw implant intrusion using cone beam computed tomography.

    PubMed

    Li, Wen; Chen, Fei; Zhang, Feng; Ding, Wanghui; Ye, Qingsong; Shi, Jiejun; Fu, Baiping

    2013-01-01

    Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. 1. The volumes of 32 teeth were measured using CBCT and laser scanning to verify the accuracy of CBCT. 2. Twelve overerupted molars from adult patients were investigated in this study. After mini-screw implants were inserted into the buccal and palatal alveolar bones, 150 g of force was applied to the mini-screw implants on each side to intrude the molars. CBCT images of all patients were taken immediately prior to intrusion and after intrusion. The volumes of the roots were calculated using the Mimics software program. The differences between the pre-intrusion and post-intrusion root volumes were statistically evaluated with a paired-samples t-test. In addition, the losses of the roots were statistically compared with each other using one-way analysis of variance at the P<0.05 level. No statistically significant volume differences were observed between the physical (laser scanning) and CBCT measurements (P>0.05). The overerupted molars were significantly intruded (P<0.05), and the average intrusion was 3.30±1.60 mm. The differences between the pre-intrusion and post-intrusion root volumes were statistically significant for all of the roots investigated (P<0.05). The roots were sorted by volume loss in descending order as follows: mesiobuccal, palatal, and distobuccal. Statistical significance was achieved among the three roots. The average total resorption for each tooth was 58.39±1.54 mm(3). Volume measurement using CBCT was able to effectively evaluate root resorption caused by mini-screw intrusion. The highest volume loss was observed in the mesiobuccal root among the three roots of

  4. Volumetric Measurement of Root Resorption following Molar Mini-Screw Implant Intrusion Using Cone Beam Computed Tomography

    PubMed Central

    Li, Wen; Chen, Fei; Zhang, Feng; Ding, Wanghui; Ye, Qingsong; Shi, Jiejun; Fu, Baiping

    2013-01-01

    Objective Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. Materials and Methods 1. The volumes of 32 teeth were measured using CBCT and laser scanning to verify the accuracy of CBCT. 2. Twelve overerupted molars from adult patients were investigated in this study. After mini-screw implants were inserted into the buccal and palatal alveolar bones, 150 g of force was applied to the mini-screw implants on each side to intrude the molars. CBCT images of all patients were taken immediately prior to intrusion and after intrusion. The volumes of the roots were calculated using the Mimics software program. The differences between the pre-intrusion and post-intrusion root volumes were statistically evaluated with a paired-samples t-test. In addition, the losses of the roots were statistically compared with each other using one-way analysis of variance at the P<0.05 level. Results No statistically significant volume differences were observed between the physical (laser scanning) and CBCT measurements (P>0.05). The overerupted molars were significantly intruded (P<0.05), and the average intrusion was 3.30±1.60 mm. The differences between the pre-intrusion and post-intrusion root volumes were statistically significant for all of the roots investigated (P<0.05). The roots were sorted by volume loss in descending order as follows: mesiobuccal, palatal, and distobuccal. Statistical significance was achieved among the three roots. The average total resorption for each tooth was 58.39±1.54 mm3. Conclusion Volume measurement using CBCT was able to effectively evaluate root resorption caused by mini-screw intrusion. The highest volume loss was observed

  5. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    PubMed Central

    Alcalá, José M.; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-01-01

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented. PMID:28208672

  6. Temporal associations and prior-list intrusions in free recall.

    PubMed

    Zaromb, Franklin M; Howard, Marc W; Dolan, Emily D; Sirotin, Yevgeniy B; Tully, Michele; Wingfield, Arthur; Kahana, Michael J

    2006-07-01

    When asked to recall the words from a just-presented target list, subjects occasionally recall words that were not on the list. These intrusions either appeared on earlier lists (prior-list intrusions, or PLIs) or had not appeared over the course of the experiment (extra-list intrusions). The authors examined the factors that elicit PLIs in free recall. A reanalysis of earlier studies revealed that PLIs tend to come from semantic associates as well as from recently studied lists, with the rate of PLIs decreasing sharply with list recency. The authors report 3 new experiments in which some items in a given list also appeared on earlier lists. Although repetition enhanced recall of list items, subjects were significantly more likely to make PLIs following the recall of repeated items, suggesting that temporal associations formed in earlier lists can induce recall errors. The authors interpret this finding as evidence for the interacting roles of associative and contextual retrieval processes in recall. Although contextual information helps to focus recall on words in the target list, it does not form an impermeable boundary between current- and prior-list experiences. Copyright 2006 APA, all rights reserved.

  7. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  8. Internet use, Facebook intrusion, and depression: Results of a cross-sectional study.

    PubMed

    Błachnio, A; Przepiórka, A; Pantic, I

    2015-09-01

    Facebook has become a very popular social networking platform today, particularly among adolescents and young adults, profoundly changing the way they communicate and interact. However, some reports have indicated that excessive Facebook use might have detrimental effects on mental health and be associated with certain psychological problems. Because previous findings on the relationship between Facebook addiction and depression were not unambiguous, further investigation was required. The main objective of our study was to examine the potential associations between Internet use, depression, and Facebook intrusion. A total of 672 Facebook users took part in the cross-sectional study. The Facebook Intrusion Questionnaire and the Center for Epidemiologic Studies Depression Scale were used. For collecting the data, the snowball sampling procedure was used. We showed that depression can be a predictor of Facebook intrusion. Our results provides additional evidence that daily Internet use time in minutes, gender, and age are also predictors of Facebook intrusion: that Facebook intrusion can be predicted by being male, young age, and an extensive number of minutes spent online. On the basis of this study, it is possible to conclude that there are certain demographic - variables, such as age, gender, or time spent online - that may help in outlining the profile of a user who may be in danger of becoming addicted to Facebook. This piece of knowledge may serve for prevention purposes. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  9. Extruded upper first molar intrusion: Comparison between unilateral and bilateral miniscrew anchorage.

    PubMed

    Sugii, Mari Miura; Barreto, Bruno de Castro Ferreira; Francisco Vieira-Júnior, Waldemir; Simone, Katia Regina Izola; Bacchi, Ataís; Caldas, Ricardo Armini

    2018-01-01

    The aim of his study was to evaluate the stress on tooth and alveolar bone caused by orthodontic intrusion forces in a supraerupted upper molar, by using a three-dimensional Finite Element Method (FEM). A superior maxillary segment was modeled in the software SolidWorks 2010 (SolidWorks Corporation, Waltham, MA, USA) containing: cortical and cancellous bone, supraerupted first molar, periodontal tissue and orthodontic components. A finite element model has simulated intrusion forces of 4N onto a tooth, directed to different mini-screw locations. Three different intrusion mechanics vectors were simulated: anchoring on a buccal mini-implant; anchoring on a palatal mini-implant and the association of both anchorage systems. All analyses were performed considering the minimum principal stress and total deformation. Qualitative analyses exhibited stress distribution by color maps. Quantitative analysis was performed with a specific software for reading and solving numerical equations (ANSYS Workbench 14, Ansys, Canonsburg, Pennsylvania, USA). Intrusion forces applied from both sides (buccal and palatal) resulted in a more homogeneous stress distribution; no high peak of stress was detected and it has allowed a vertical resultant movement. Buccal or palatal single-sided forces resulted in concentrated stress zones with higher values and tooth tipping to respective force side. Unilateral forces promoted higher stress in root apex and higher dental tipping. The bilateral forces promoted better distribution without evidence of dental tipping. Bilateral intrusion technique suggested lower probability of root apex resorption.

  10. A Gulf Stream-derived pycnocline intrusion on the Middle Atlantic Bight shelf

    NASA Astrophysics Data System (ADS)

    Gawarkiewicz, Glen; McCarthy, Robert K.; Barton, Kenneth; Masse, Ann K.; Church, Thomas M.

    1990-12-01

    Saline intrusions from the upper slope onto the outer shelf are frequently observed at the pycnocline along the shelfbreak front in the Middle Atlantic Bight during the summer. A brief cruise was conducted in July, 1986 between Baltimore and Washington Canyons to examine along-shelf variability of pycnocline salinity intrusions. A particularly saline intrusion of 35.8 Practical Salinity Units (PSU) was observed between 20 and 40 m in a water depth of 70 to 80 m. The along-shelf extent was at least 40 km. The cooler, sub-pycnocline outer shelf water was displaced 15 km shoreward of the shelfbreak. A Gulf Stream filament was present in the slope region prior to the hydrographic sampling, but was not visible in thermal imagery during the hydrographic sampling. Temperature-salinity characteristics of the intrusion suggest that it was a mixture of Gulf Stream water and slope water, possibly from the filament. The shoreward penetration of saline water was most pronounced at the pycnocline and penetrated the shelfbreak front, with salinities as high as 35.0 PSU reaching as far shoreward as the 35 m isobath. These pycnocline intrusions may be an important mechanism for the transport of Gulf Stream-derived water onto the shelf during the summer. The presence of filaments or other Gulf Stream-derived water on the upper slope may account for some of the along-front variability of the pycnocline salinity maximum that has previously been observed.

  11. Acute effects of alcohol on the development of intrusive memories.

    PubMed

    Bisby, James A; Brewin, Chris R; Leitz, Julie R; Valerie Curran, H

    2009-07-01

    Post-traumatic stress disorder is characterised by repeated intrusive imagery of the traumatic event. Despite alcohol's impairing effect on memory and frequent involvement in real-life trauma, virtually nothing is known of the interaction between alcohol and trauma memory. We aimed to investigate the acute alcohol effects on spontaneous memories following a trauma film as well as explicit memory for the film. Utilising an independent-group double-blind design, 48 healthy volunteers were randomly allocated to receive alcohol of 0.4 or 0.8 g/kg or a matched placebo drink. A stressful film was viewed post-drink. Skin conductance was monitored throughout and mood and dissociative symptoms were indexed. Volunteers recorded their spontaneous memories of the film daily in an online diary over the following week. Their explicit memory for both gist and details of the film was tested on day 7. Intriguingly, an inverted 'U' alcohol dose-response was observed on intrusive memories with a low dose of alcohol increasing memory intrusions while a high dose decreased intrusions. In contrast, explicit memory performance after 7 days showed a linear dose-response effect of alcohol with both recall and recognition decreasing as dose increased. These findings highlight a striking differential pattern of alcohol's effects on spontaneous memories as compared with explicit memories. Alcohol's effect on spontaneous memories may reflect a dose-dependent impairment of two separate memory systems integral to the processing of different aspects of a traumatic event.

  12. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    USGS Publications Warehouse

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  13. HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

    DTIC Science & Technology

    2003-01-01

    securing the routing protocols of mobile ad hoc wireless net- works has been done in prevention. Intrusion detection systems play a complimentary...TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified...hops of A would be unable to communicate with B and vice versa [1]. 1.2 The role of intrusion detection in security In order to provide reliable

  14. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    NASA Astrophysics Data System (ADS)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  15. Hypomanic Experience in Young Adults Confers Vulnerability to Intrusive Imagery After Experimental Trauma

    PubMed Central

    Malik, Aiysha; Goodwin, Guy M.; Hoppitt, Laura

    2014-01-01

    Emotional mental imagery occurs across anxiety disorders, yet is neglected in bipolar disorder despite high anxiety comorbidity. Furthermore, a heightened susceptibility to developing intrusive mental images of stressful events in bipolar disorder and people vulnerable to it (with hypomanic experience) has been suggested. The current study assessed, prospectively, whether significant hypomanic experience (contrasting groups scoring high vs. low on the Mood Disorder Questionnaire, MDQ) places individuals at increased risk of visual reexperiencing after experimental stress. A total of 110 young adults watched a trauma film and recorded film-related intrusive images for 6 days. Compared to the low MDQ group, the high MDQ group experienced approximately twice as many intrusive images, substantiated by convergent measures. Findings suggest hypomanic experience is associated with developing more frequent intrusive imagery of a stressor. Because mental imagery powerfully affects emotion, such imagery may contribute to bipolar mood instability and offer a cognitive treatment target. PMID:25419498

  16. Grammatical Constraints on Language Switching: Language Control is not Just Executive Control

    PubMed Central

    Gollan, Tamar H.; Goldrick, Matthew

    2016-01-01

    The current study investigated the roles of grammaticality and executive control on bilingual language selection by examining production speed and failures of language control, or intrusion errors (e.g., saying el instead of the), in young and aging bilinguals. Production of mixed-language connected speech was elicited by asking Spanish-English bilinguals to read aloud paragraphs that had mostly grammatical (conforming to naturally occurring constraints) or mostly ungrammatical (haphazard mixing) language switches, and low or high switching rate. Mixed-language speech was slower and less accurate when switch-rate was high, but especially (for speed) or only (for intrusion errors) if switches were also ungrammatical. Executive function ability (measured with a variety of tasks in young bilinguals in Experiment 1, and aging bilinguals in Experiment 2), slowed production and increased intrusion rate in a generalized fashion, but with little or no interaction with grammaticality. Aging effects appeared to reflect reduced monitoring ability (evidenced by a lower rate of self-corrected intrusions). These results demonstrate robust effects of grammatical encoding on language selection, and imply that executive control influences bilingual language production only after sentence planning and lexical selection. PMID:27667899

  17. Contextual representations increase analogue traumatic intrusions: evidence against a dual-representation account of peri-traumatic processing.

    PubMed

    Pearson, David G

    2012-12-01

    Information processing accounts of post-traumatic stress disorder (PTSD) state that intrusive memories emerge due to a lack of integration between perceptual and contextual trauma representations in autobiographical memory. This hypothesis was tested experimentally using an analogue trauma paradigm in which participants viewed an aversive film designed to elicit involuntary recollections. Participants viewed scenes from the film either paired with contextual information or with the contextual information omitted. After viewing the film participants were asked to record for one week any involuntary intrusions for the film using a provided intrusions diary. The results revealed a significant increase in analogue intrusions for the film when viewed with contextual information in comparison to when the film was viewed with the contextual information omitted. In contrast there was no effect of contextual information on valence ratings or voluntary memory for the film, or on the reported vividness and emotionality of the intrusions. The analogue trauma paradigm may have failed to reproduce the effect of extreme stress on encoding that is postulated to occur during PTSD. The findings have potential implications for trauma intervention as they suggest that the contextual understanding of a scene during encoding can be integral to the subsequent occurrence of traumatic intrusions. The pattern of results found in the study are inconsistent with dual-representation accounts of intrusive memory formation, and instead provide new evidence that contextual representations play a casual role in increasing the frequency of involuntary intrusions for traumatic material. Copyright © 2012 Elsevier Ltd. All rights reserved.

  18. Intrusive imagery in severe health anxiety: Prevalence, nature and links with memories and maintenance cycles

    PubMed Central

    Muse, Kate; McManus, Freda; Hackmann, Ann; Williams, Matthew; Williams, Mark

    2010-01-01

    Increased understanding of the nature and role of intrusive imagery has contributed to the development of effective treatment protocols for some anxiety disorders. However, intrusive imagery in severe health anxiety (hypochondriasis) has been comparatively neglected. Hence, the current study investigates the prevalence, nature and content of intrusive imagery in 55 patients who met DSM-IV-TR (APA, 2000) criteria for the diagnosis of hypochondriasis. A semi-structured interview was used to assess the prevalence, nature and possible role of intrusive imagery in this disorder. Over 78% of participants reported experiencing recurrent, distressing intrusive images, the majority (72%) of which either were a memory of an earlier event or were strongly associated with a memory. The images tended to be future orientated, and were reliably categorised into four themes: i) being told ‘the bad news’ that you have a serious/life threatening-illness (6.9%), ii) suffering from a serious or life-threatening illness (34.5%), iii) death and dying due to illness (22.4%) and iv) impact of own death or serious illness on loved ones (36.2%). Participants reported responding to experiencing intrusive images by engaging in avoidance, checking, reassurance seeking, distraction and rumination. Potential treatment implications and links to maintenance cycles are considered. PMID:20627270

  19. Weighted link graphs: a distributed IDS for secondary intrusion detection and defense

    NASA Astrophysics Data System (ADS)

    Zhou, Mian; Lang, Sheau-Dong

    2005-03-01

    While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer"s compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.

  20. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  1. WISESight : a multispectral smart video-track intrusion monitor.

    DOT National Transportation Integrated Search

    2015-05-01

    International Electronic Machines : Corporation (IEM) developed, tested, and : validated a unique smart video-based : intrusion monitoring system for use at : highway-rail grade crossings. The system : used both thermal infrared (IR) and : visible/ne...

  2. Session Types for Access and Information Flow Control

    NASA Astrophysics Data System (ADS)

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.

  3. Natural tooth intrusion and reversal in implant-assisted prosthesis: evidence of and a hypothesis for the occurrence.

    PubMed

    Sheets, C G; Earthmann, J C

    1993-12-01

    Based on clinical observation, a hypothesis of the mechanism of intrusion of natural teeth in an implant-assisted prosthesis is suggested. Engineering principles are presented that establish an energy absorption model as it relates to the implant-assisted prosthesis. In addition, in the course of patient treatment it has been discovered that the intrusion of natural teeth can be reversed. Patient histories that demonstrate intrusion reversal are reviewed. The possible mechanisms for the intrusion/reversal phenomenon are presented and preventative recommendations are given.

  4. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  5. Biological intrusion of low-level-waste trench covers

    NASA Astrophysics Data System (ADS)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  6. Quantification of the intrusion process at Kīlauea volcano, Hawai'i

    NASA Astrophysics Data System (ADS)

    Wright, Thomas L.; Marsh, Bruce

    2016-12-01

    The characteristic size of two types of intrusions identified beneath Kīlauea's East Rift zone are uniquely estimated by combining time constraints from fractional crystallization and the rates of magma solidification during cooling. Some intrusions were rapidly emplaced as dikes, but stalled before reaching the surface, and cooled and crystallized to feed later fractionated eruptions. More specifically, using the observed time interval between initial emplacement and eruption of fractionated lava, whose degree of fractionation is estimated from petrologic mixing calculations, the extent of solidification or cooling needed to produce this amount of fractionation can be directly inferred. And from the known erupted volumes the spatial extent or size of this fractionated volume can be analytically related to the full size of the source body itself. Two examples yield dike widths of 82 and 68 m. Other intrusions remain close to the east rift magma transport path and are observed to last for decades or longer as viable magma bodies that may participate in feeding later eruptions. The thickness of semi-permanent reservoirs near the East Rift Zone magma transport path can be estimated by assuming a resupply rate that is sufficiently frequent to restrict cooling to < 10 °C. It is inferred that both types of intrusions likely began as dike offshoots from the East Rift Zone magma transport path, but the frequently resupplied bodies may have later been converted to sills or laccoliths of heights estimated at 43-62 m. Our modeled intrusions contrast with models of rapidly emplaced thinner dikes feeding shallow intrusions, which are accompanied by intense rift earthquake swarms and are often associated with eruptions. These calculations show that long-term heating of the wallrock of the magma transport paths serves to slow conduit cooling, which may be partly responsible for sustaining long East Rift Zone eruptions. Adjacent to the vertical transport path beneath K

  7. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  8. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  9. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  10. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  11. Intrusive Method for Uncertainty Quantification in a Multiphase Flow Solver

    NASA Astrophysics Data System (ADS)

    Turnquist, Brian; Owkes, Mark

    2016-11-01

    Uncertainty quantification (UQ) is a necessary, interesting, and often neglected aspect of fluid flow simulations. To determine the significance of uncertain initial and boundary conditions, a multiphase flow solver is being created which extends a single phase, intrusive, polynomial chaos scheme into multiphase flows. Reliably estimating the impact of input uncertainty on design criteria can help identify and minimize unwanted variability in critical areas, and has the potential to help advance knowledge in atomizing jets, jet engines, pharmaceuticals, and food processing. Use of an intrusive polynomial chaos method has been shown to significantly reduce computational cost over non-intrusive collocation methods such as Monte-Carlo. This method requires transforming the model equations into a weak form through substitution of stochastic (random) variables. Ultimately, the model deploys a stochastic Navier Stokes equation, a stochastic conservative level set approach including reinitialization, as well as stochastic normals and curvature. By implementing these approaches together in one framework, basic problems may be investigated which shed light on model expansion, uncertainty theory, and fluid flow in general. NSF Grant Number 1511325.

  12. Intrusive Rock Database for the Digital Geologic Map of Utah

    USGS Publications Warehouse

    Nutt, C.J.; Ludington, Steve

    2003-01-01

    Digital geologic maps offer the promise of rapid and powerful answers to geologic questions using Geographic Information System software (GIS). Using modern GIS and database methods, a specialized derivative map can be easily prepared. An important limitation can be shortcomings in the information provided in the database associated with the digital map, a database which is often based on the legend of the original map. The purpose of this report is to show how the compilation of additional information can, when prepared as a database that can be used with the digital map, be used to create some types of derivative maps that are not possible with the original digital map and database. This Open-file Report consists of computer files with information about intrusive rocks in Utah that can be linked to the Digital Geologic Map of Utah (Hintze et al., 2000), an explanation of how to link the databases and map, and a list of references for the databases. The digital map, which represents the 1:500,000-scale Geologic Map of Utah (Hintze, 1980), can be obtained from the Utah Geological Survey (Map 179DM). Each polygon in the map has a unique identification number. We selected the polygons identified on the geologic map as intrusive rock, and constructed a database (UT_PLUT.xls) that classifies the polygons into plutonic map units (see tables). These plutonic map units are the key information that is used to relate the compiled information to the polygons on the map. The map includes a few polygons that were coded as intrusive on the state map but are largely volcanic rock; in these cases we note the volcanic rock names (rhyolite and latite) as used in the original sources Some polygons identified on the digital state map as intrusive rock were misidentified; these polygons are noted in a separate table of the database, along with some information about their true character. Fields may be empty because of lack of information from references used or difficulty in finding

  13. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  14. Erosion and intrusion of silicone rubber scleral buckle. Presentation and management.

    PubMed

    Nguyen, Q D; Lashkari, K; Hirose, T; Pruett, R C; McMeel, J W; Schepens, C L

    2001-01-01

    To describe the clinical presentation and management of erosion and intrusion of silicone rubber implants that are used in scleral buckling procedures for the treatment of retinal detachment. The authors identified four patients from their practices during the last 20 years (1978-1998) who had erosion or intrusion of silicone rubber scleral buckles that were used to manage retinal detachment. Approximately 4400 scleral buckling procedures were performed during this period. A retrospective review of the medical records of all patients was performed. Factors that influenced management decisions concerning the intruding buckle are emphasized. All four patients had myopia. The interval between placement of the scleral buckle and development of intrusion ranged from 1 to 20 years. The buckles were intrascleral in three cases and episcleral in one. Recurrent detachment and vitreous hemorrhage were indications for surgical intervention in three cases. After the surgical removal of buckling elements, visual acuity stabilized in all patients and the retina remained attached in all cases. Erosion and intrusion of scleral buckle are rare complications of scleral buckling procedures. The intruding buckle may be left intact unless there is significant threat to the integrity of ocular structures, recurrent detachment, or hemorrhage. Manipulation of the encircling band or buckle does not necessarily alter the visual acuity or the status of the retina.

  15. Intrusion-Tolerant Location Information Services in Intelligent Vehicular Networks

    NASA Astrophysics Data System (ADS)

    Yan, Gongjun; Yang, Weiming; Shaner, Earl F.; Rawat, Danda B.

    Intelligent Vehicular Networks, known as Vehicle-to-Vehicle and Vehicle-to-Roadside wireless communications (also called Vehicular Ad hoc Networks), are revolutionizing our daily driving with better safety and more infortainment. Most, if not all, applications will depend on accurate location information. Thus, it is of importance to provide intrusion-tolerant location information services. In this paper, we describe an adaptive algorithm that detects and filters the false location information injected by intruders. Given a noisy environment of mobile vehicles, the algorithm estimates the high resolution location of a vehicle by refining low resolution location input. We also investigate results of simulations and evaluate the quality of the intrusion-tolerant location service.

  16. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    PubMed

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  17. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks

    PubMed Central

    Navia, Marlon; Campelo, Jose C.; Bonastre, Alberto; Ors, Rafael; Capella, Juan V.; Serrano, Juan J.

    2015-01-01

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature. PMID:26393604

  18. 76 FR 14660 - Public Comment on the Development of Final Guidance for Evaluating the Vapor Intrusion to Indoor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... Groundwater and Soils (Subsurface Vapor Intrusion Guidance) AGENCY: Environmental Protection Agency (EPA... Pathway from Contaminated Groundwater and Soil (Subsurface Vapor Intrusion Guidance). A draft of the... Evaluating Vapor Intrusion to Indoor Air Pathway from Contaminated Groundwater and Soil (Subsurface Vapor...

  19. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  20. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610