Sample records for anomaly based intrusion

  1. A Survey on Anomaly Based Host Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  2. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  3. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    NASA Technical Reports Server (NTRS)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  4. A model for anomaly classification in intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Ferreira, V. O.; Galhardi, V. V.; Gonçalves, L. B. L.; Silva, R. C.; Cansian, A. M.

    2015-09-01

    Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.

  5. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yan

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm ismore » significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.« less

  6. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  7. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  8. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  9. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  10. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  11. Machine Learning in Intrusion Detection

    DTIC Science & Technology

    2005-07-01

    machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate

  12. Experiments on Adaptive Techniques for Host-Based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DRAELOS, TIMOTHY J.; COLLINS, MICHAEL J.; DUGGAN, DAVID P.

    2001-09-01

    This research explores four experiments of adaptive host-based intrusion detection (ID) techniques in an attempt to develop systems that can detect novel exploits. The technique considered to have the most potential is adaptive critic designs (ACDs) because of their utilization of reinforcement learning, which allows learning exploits that are difficult to pinpoint in sensor data. Preliminary results of ID using an ACD, an Elman recurrent neural network, and a statistical anomaly detection technique demonstrate an ability to learn to distinguish between clean and exploit data. We used the Solaris Basic Security Module (BSM) as a data source and performed considerablemore » preprocessing on the raw data. A detection approach called generalized signature-based ID is recommended as a middle ground between signature-based ID, which has an inability to detect novel exploits, and anomaly detection, which detects too many events including events that are not exploits. The primary results of the ID experiments demonstrate the use of custom data for generalized signature-based intrusion detection and the ability of neural network-based systems to learn in this application environment.« less

  13. Network Anomaly Detection Based on Wavelet Analysis

    NASA Astrophysics Data System (ADS)

    Lu, Wei; Ghorbani, Ali A.

    2008-12-01

    Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  14. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.

    PubMed

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish-Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection.

  15. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.

    PubMed

    Ganapathy, S; Yogesh, P; Kannan, A

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  16. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    PubMed Central

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  17. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network

    PubMed Central

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish–Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection. PMID:26447696

  18. Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM

    NASA Astrophysics Data System (ADS)

    Song, Jungsuk; Takakura, Hiroki; Okabe, Yasuo; Kwon, Yongjin

    Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.

  19. Confabulation Based Real-time Anomaly Detection for Wide-area Surveillance Using Heterogeneous High Performance Computing Architecture

    DTIC Science & Technology

    2015-06-01

    system accuracy. The AnRAD system was also generalized for the additional application of network intrusion detection . A self-structuring technique...to Host- based Intrusion Detection Systems using Contiguous and Discontiguous System Call Patterns,” IEEE Transactions on Computer, 63(4), pp. 807...square kilometer areas. The anomaly recognition and detection (AnRAD) system was built as a cogent confabulation network . It represented road

  20. The architecture of a network level intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.; Maccabe, A.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  1. Reassessment of the volume of the Las Aguilas mafic-ultramafic intrusives, San Luis, Argentina, based on an alternative geophysical model

    NASA Astrophysics Data System (ADS)

    Claudia, Zaffarana; Silvana, Geuna; Stella, Poma; Alberto, Patiño Douce

    2011-10-01

    In the Sierra de San Luis, Central Argentina, a belt of small and discontinuous lenses of mafic-ultramafic rocks intrude a polydeformed basement and are thought to be the cause of a local increase of the metamorphic grade from amphibolite to granulite facies conditions. This assumption was especially based on forward modelling of a huge gravity anomaly centered over the Sierra de San Luis, which lead some workers to think that a vast volume of mafic-ultramafic rocks lay in shallow levels. Here, we propose an alternative model to explain this anomaly, in which the mafic-ultramafic intrusion is not the ultimate source. Therefore, there is no need to propose a bigger size than that observed in outcrops for the mafic-ultramafic bodies. The thermal effect of the emplacement of mafic-ultramafic sills and dikes on the host rocks was estimated applying a simple analytical solution (error function) for heating of a semi-infinite half space (the country rocks) in contact with a hotter sheet of finite thickness (the mafic-ultramafic intrusion). Results indicate that the effect of the intrusion of these hot mafic magmas is local, because beyond a few hundred meters from the contact zone temperatures never exceed 600 °C, and a few km from the intrusion they barely increase 50 °C relative to the initial temperature. These results, together with the preservation of primary igneous characteristics (such as rhythmic layering) being overprinted by metamorphic textural changes, indicate that the intrusion occurred before regional deformation. It is suggested that the thermal anomaly in the Pringles Metamorphic Complex could have been mainly caused by factors inherent to their geodynamic setting.

  2. Automated Network Anomaly Detection with Learning, Control and Mitigation

    ERIC Educational Resources Information Center

    Ippoliti, Dennis

    2014-01-01

    Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…

  3. Lunar floor-fractured craters as magmatic intrusions: Geometry, modes of emplacement, associated tectonic and volcanic features, and implications for gravity anomalies

    NASA Astrophysics Data System (ADS)

    Jozwiak, Lauren M.; Head, James W.; Wilson, Lionel

    2015-03-01

    , the intrusion concentrates bending primarily at the periphery, resulting in a flat, tabular intrusion. We predict that this process will result in concentric fractures over the region of greatest bending. This location is close to the crater wall in large, flat-floored craters, as observed in the crater Humboldt, and interior to the crater over the domed floor in smaller craters, as observed in the crater Vitello. A variety of volcanic features are predicted to be associated with the solidification and degassing of the intrusion; these include: (1) surface lava flows associated with concentric fractures (e.g., in the crater Humboldt); (2) vents with no associated pyroclastic material, from the deflation of under-pressurized magmatic foam (e.g., the crater Damoiseau); and (3) vents with associated pyroclastic deposits from vulcanian eruptions of highly pressurized magmatic foam (e.g., the crater Alphonsus). The intrusion of basaltic magma beneath the crater is predicted to contribute a positive component to the Bouguer gravity anomaly; we assess the predicted Bouguer anomalies associated with FFCs and outline a process for their future interpretation. We conclude that our proposed mechanism serves as a viable formation process for FFCs and accurately predicts numerous morphologic, morphometric, and geophysical features associated with FFCs. These predictions can be further tested using GRAIL (Gravity Recovery and Interior Laboratory) data.

  4. Intrusion-based reasoning and depression: cross-sectional and prospective relationships.

    PubMed

    Berle, David; Moulds, Michelle L

    2014-01-01

    Intrusion-based reasoning refers to the tendency to form interpretations about oneself or a situation based on the occurrence of a negative intrusive autobiographical memory. Intrusion-based reasoning characterises post-traumatic stress disorder, but has not yet been investigated in depression. We report two studies that aimed to investigate this. In Study 1 both high (n = 42) and low (n = 28) dysphoric participants demonstrated intrusion-based reasoning. High-dysphoric individuals engaged in self-referent intrusion-based reasoning to a greater extent than did low-dysphoric participants. In Study 2 there were no significant differences in intrusion-based reasoning between currently depressed (n = 27) and non-depressed (n = 51) participants, and intrusion-based reasoning did not predict depressive symptoms at 6-month follow-up. Interestingly, previously (n = 26) but not currently (n = 27) depressed participants engaged in intrusion-based reasoning to a greater extent than never-depressed participants (n = 25), indicating the possibility that intrusion-based reasoning may serve as a "scar" from previous episodes. The implications of these findings are discussed.

  5. Fuzzy Kernel k-Medoids algorithm for anomaly detection problems

    NASA Astrophysics Data System (ADS)

    Rustam, Z.; Talita, A. S.

    2017-07-01

    Intrusion Detection System (IDS) is an essential part of security systems to strengthen the security of information systems. IDS can be used to detect the abuse by intruders who try to get into the network system in order to access and utilize the available data sources in the system. There are two approaches of IDS, Misuse Detection and Anomaly Detection (behavior-based intrusion detection). Fuzzy clustering-based methods have been widely used to solve Anomaly Detection problems. Other than using fuzzy membership concept to determine the object to a cluster, other approaches as in combining fuzzy and possibilistic membership or feature-weighted based methods are also used. We propose Fuzzy Kernel k-Medoids that combining fuzzy and possibilistic membership as a powerful method to solve anomaly detection problem since on numerical experiment it is able to classify IDS benchmark data into five different classes simultaneously. We classify IDS benchmark data KDDCup'99 data set into five different classes simultaneously with the best performance was achieved by using 30 % of training data with clustering accuracy reached 90.28 percent.

  6. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.F.; Maccabe, A.B.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  7. Aeromagnetic and radio echo ice-sounding measurements show much greater area of the Dufek intrusion, Antarctica

    USGS Publications Warehouse

    Behrendt, John C.; Drewry, D.J.; Jankowski, E.; Grim, M.S.

    1980-01-01

    A combined aeromagnetic and radio echo ice-sounding survey made in 1978 in Antarctica over the Dufek layered mafic intrusion suggests a minimum area of the intrusion of about 50,000 square kilometers, making it comparable in size with the Bushveld Complex of Africa. Comparisons of the magnetic and subglacial topographic profiles illustrate the usefulness of this combination of methods in studying bedrock geology beneath ice-covered areas. Magnetic anomalies range in peak-to-trough amplitude from about 50 nanoteslas over the lowermost exposed portion of the section in the Dufek Massif to about 3600 nanoteslas over the uppermost part of the section in the Forrestal Range. Theoretical magnetic anomalies, computed from a model based on the subice topography fitted to the highest amplitude observed magnetic anomalies, required normal and reversed magnetizations ranging from 10-3 to 10-2 electromagnetic units per cubic centimeter. This result is interpreted as indicating that the Dufek intrusion cooled through the Curie isotherm during one or more reversals of the earth's magnetic field. Copyright ?? 1980 AAAS.

  8. FRaC: a feature-modeling approach for semi-supervised and unsupervised anomaly detection.

    PubMed

    Noto, Keith; Brodley, Carla; Slonim, Donna

    2012-01-01

    Anomaly detection involves identifying rare data instances (anomalies) that come from a different class or distribution than the majority (which are simply called "normal" instances). Given a training set of only normal data, the semi-supervised anomaly detection task is to identify anomalies in the future. Good solutions to this task have applications in fraud and intrusion detection. The unsupervised anomaly detection task is different: Given unlabeled, mostly-normal data, identify the anomalies among them. Many real-world machine learning tasks, including many fraud and intrusion detection tasks, are unsupervised because it is impractical (or impossible) to verify all of the training data. We recently presented FRaC, a new approach for semi-supervised anomaly detection. FRaC is based on using normal instances to build an ensemble of feature models, and then identifying instances that disagree with those models as anomalous. In this paper, we investigate the behavior of FRaC experimentally and explain why FRaC is so successful. We also show that FRaC is a superior approach for the unsupervised as well as the semi-supervised anomaly detection task, compared to well-known state-of-the-art anomaly detection methods, LOF and one-class support vector machines, and to an existing feature-modeling approach.

  9. FRaC: a feature-modeling approach for semi-supervised and unsupervised anomaly detection

    PubMed Central

    Brodley, Carla; Slonim, Donna

    2011-01-01

    Anomaly detection involves identifying rare data instances (anomalies) that come from a different class or distribution than the majority (which are simply called “normal” instances). Given a training set of only normal data, the semi-supervised anomaly detection task is to identify anomalies in the future. Good solutions to this task have applications in fraud and intrusion detection. The unsupervised anomaly detection task is different: Given unlabeled, mostly-normal data, identify the anomalies among them. Many real-world machine learning tasks, including many fraud and intrusion detection tasks, are unsupervised because it is impractical (or impossible) to verify all of the training data. We recently presented FRaC, a new approach for semi-supervised anomaly detection. FRaC is based on using normal instances to build an ensemble of feature models, and then identifying instances that disagree with those models as anomalous. In this paper, we investigate the behavior of FRaC experimentally and explain why FRaC is so successful. We also show that FRaC is a superior approach for the unsupervised as well as the semi-supervised anomaly detection task, compared to well-known state-of-the-art anomaly detection methods, LOF and one-class support vector machines, and to an existing feature-modeling approach. PMID:22639542

  10. A New Intrusion Detection Method Based on Antibody Concentration

    NASA Astrophysics Data System (ADS)

    Zeng, Jie; Li, Tao; Li, Guiyang; Li, Haibo

    Antibody is one kind of protein that fights against the harmful antigen in human immune system. In modern medical examination, the health status of a human body can be diagnosed by detecting the intrusion intensity of a specific antigen and the concentration indicator of corresponding antibody from human body’s serum. In this paper, inspired by the principle of antigen-antibody reactions, we present a New Intrusion Detection Method Based on Antibody Concentration (NIDMBAC) to reduce false alarm rate without affecting detection rate. In our proposed method, the basic definitions of self, nonself, antigen and detector in the intrusion detection domain are given. Then, according to the antigen intrusion intensity, the change of antibody number is recorded from the process of clone proliferation for detectors based on the antigen classified recognition. Finally, building upon the above works, a probabilistic calculation method for the intrusion alarm production, which is based on the correlation between the antigen intrusion intensity and the antibody concen-tration, is proposed. Our theoretical analysis and experimental results show that our proposed method has a better performance than traditional methods.

  11. Modeling And Detecting Anomalies In Scada Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistical techniques that can be applied to detect anomalies in critical infrastructure networks. A SCADA system employed in liquefied natural gas (LNG) production is used as a case study.

  12. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  13. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    scenarios with multiple sensors at edge nodes for known intrusion attacks. Simulation results show improved robustness of the two-stage design based on reputation-based NNs to intrusion anomalies from compromised nodes and external intrusion attacks.

  14. Model selection for anomaly detection

    NASA Astrophysics Data System (ADS)

    Burnaev, E.; Erofeev, P.; Smolyakov, D.

    2015-12-01

    Anomaly detection based on one-class classification algorithms is broadly used in many applied domains like image processing (e.g. detection of whether a patient is "cancerous" or "healthy" from mammography image), network intrusion detection, etc. Performance of an anomaly detection algorithm crucially depends on a kernel, used to measure similarity in a feature space. The standard approaches (e.g. cross-validation) for kernel selection, used in two-class classification problems, can not be used directly due to the specific nature of a data (absence of a second, abnormal, class data). In this paper we generalize several kernel selection methods from binary-class case to the case of one-class classification and perform extensive comparison of these approaches using both synthetic and real-world data.

  15. A hybrid approach for efficient anomaly detection using metaheuristic methods.

    PubMed

    Ghanem, Tamer F; Elkilani, Wail S; Abdul-Kader, Hatem M

    2015-07-01

    Network intrusion detection based on anomaly detection techniques has a significant role in protecting networks and systems against harmful activities. Different metaheuristic techniques have been used for anomaly detector generation. Yet, reported literature has not studied the use of the multi-start metaheuristic method for detector generation. This paper proposes a hybrid approach for anomaly detection in large scale datasets using detectors generated based on multi-start metaheuristic method and genetic algorithms. The proposed approach has taken some inspiration of negative selection-based detector generation. The evaluation of this approach is performed using NSL-KDD dataset which is a modified version of the widely used KDD CUP 99 dataset. The results show its effectiveness in generating a suitable number of detectors with an accuracy of 96.1% compared to other competitors of machine learning algorithms.

  16. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  17. Distributed intrusion detection system based on grid security model

    NASA Astrophysics Data System (ADS)

    Su, Jie; Liu, Yahui

    2008-03-01

    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  18. A hybrid approach for efficient anomaly detection using metaheuristic methods

    PubMed Central

    Ghanem, Tamer F.; Elkilani, Wail S.; Abdul-kader, Hatem M.

    2014-01-01

    Network intrusion detection based on anomaly detection techniques has a significant role in protecting networks and systems against harmful activities. Different metaheuristic techniques have been used for anomaly detector generation. Yet, reported literature has not studied the use of the multi-start metaheuristic method for detector generation. This paper proposes a hybrid approach for anomaly detection in large scale datasets using detectors generated based on multi-start metaheuristic method and genetic algorithms. The proposed approach has taken some inspiration of negative selection-based detector generation. The evaluation of this approach is performed using NSL-KDD dataset which is a modified version of the widely used KDD CUP 99 dataset. The results show its effectiveness in generating a suitable number of detectors with an accuracy of 96.1% compared to other competitors of machine learning algorithms. PMID:26199752

  19. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    PubMed

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  20. Multilayer Statistical Intrusion Detection in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  1. Implementing and testing a fiber-optic polarization-based intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hajj, Rasha El; MacDonald, Gregory; Verma, Pramode; Huck, Robert

    2015-09-01

    We describe a layer-1-based intrusion detection system for fiber-optic-based networks. Layer-1-based intrusion detection represents a significant elevation in security as it prohibits an adversary from obtaining information in the first place (no cryptanalysis is possible). We describe the experimental setup of the intrusion detection system, which is based on monitoring the behavior of certain attributes of light both in unperturbed and perturbed optical fiber links. The system was tested with optical fiber links of various lengths and types, under different environmental conditions, and under changes in fiber geometry similar to what is experienced during tapping activity. Comparison of the results for perturbed and unperturbed links has shown that the state of polarization is more sensitive to intrusion activity than the degree of polarization or power of the received light. The testing was conducted in a simulated telecommunication network environment that included both underground and aerial links. The links were monitored for intrusion activity. Attempts to tap the link were easily detected with no apparent degradation in the visual quality of the real-time surveillance video.

  2. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    1999-06-01

    administrator whenever a system binary file (such as the ps, login , or ls program) is modified. Normal users have no legitimate reason to alter these files...development of EMERALD [46], which combines statistical anomaly detection from NIDES with signature verification. Specification-based intrusion detection...the creation of a single host that can act as many hosts. Daemons that provide network services—including telnetd, ftpd, and login — display banners

  3. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  4. In-situ trainable intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such thatmore » the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.« less

  5. Dental Anomalies in Permanent Teeth after Trauma in Primary Dentition.

    PubMed

    Bardellini, Elena; Amadori, Francesca; Pasini, Stefania; Majorana, Alessandra

    This retrospective study aims to evaluate the prevalence of dental anomalies in permanent teeth as a result of a trauma concerning the predecessor primary teeth. A total of 241 records of children (118 males and 123 females, mean age 3.62 ± 1.40) affected by trauma on primary teeth were analyzed. All patients were recalled to evaluate the status of the permanent successor teeth by clinical and radiographic investigations. Out of 241 patients, 106 patients (for a total of 179 traumatized primary teeth) presented at the recall. Dental anomalies on successor permanent teeth were detected in 21 patients (19.8%), for a total of 26 teeth (14.5%) and 28 anomalies. Anomalies of the eruptive process were the most observed disturbances (60.7%), followed by enamel hypoplasia (25%) and white spots (14.3%). A higher percentage of anomalies on permanent teeth was observed when trauma occurred at an age less than 36 months (38.5% of cases). Intrusive and extrusive luxation were related with the most cases of clinical disturbances in the successor permanent teeth. The results of this study highlight the risk of dental anomalies after a trauma in primary dentition, especially in early-aged children and in case of intrusive luxation.

  6. Seismic signature of active intrusions in mountain chains.

    PubMed

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  7. Seismic signature of active intrusions in mountain chains

    PubMed Central

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains. PMID:29326978

  8. Using a time lapse microgravity model for mapping seawater intrusion around Semarang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Supriyadi,, E-mail: supriyadi@mail.unnes.ac.id; Khumaedi; Yusuf, M.

    A modeling of time-lapse microgravity anomaly due to sea water intrusion has been conducted. It used field data of aquifer cross section, aquifer thickness and lithology of research area. Those data were then processed using Grav3D and Surfer. Modeling results indicated that the intrusion of sea water resulting in a time-lapse microgravity anomalies of 0.12 to 0.18 mGal, at soil layer density of 0.15 g/cm{sup 3} to 0.3 g/cm{sup 3} and at depth of 30 to 100 m. These imply that the areas experiencing seawater intrusion were Tanjung Mas, SPBE Bandarharjo, Brass, Old Market Boom and Johar as the microgravity measured there weremore » in the range of 0.12 to 0.18 mGal and the density contrast were at 0.15 g/cm{sup 3} to 0.28 g/cm{sup 3}. Areas that experienced fluid reduction were Puri Anjasmoro, Kenconowungu and Puspowarno with microgravity changes from -0.06 mGal to -0.18 mGal.« less

  9. AdaBoost-based algorithm for network intrusion detection.

    PubMed

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  10. Anomaly Detection Based on Sensor Data in Petroleum Industry Applications

    PubMed Central

    Martí, Luis; Sanchez-Pi, Nayat; Molina, José Manuel; Garcia, Ana Cristina Bicharra

    2015-01-01

    Anomaly detection is the problem of finding patterns in data that do not conform to an a priori expected behavior. This is related to the problem in which some samples are distant, in terms of a given metric, from the rest of the dataset, where these anomalous samples are indicated as outliers. Anomaly detection has recently attracted the attention of the research community, because of its relevance in real-world applications, like intrusion detection, fraud detection, fault detection and system health monitoring, among many others. Anomalies themselves can have a positive or negative nature, depending on their context and interpretation. However, in either case, it is important for decision makers to be able to detect them in order to take appropriate actions. The petroleum industry is one of the application contexts where these problems are present. The correct detection of such types of unusual information empowers the decision maker with the capacity to act on the system in order to correctly avoid, correct or react to the situations associated with them. In that application context, heavy extraction machines for pumping and generation operations, like turbomachines, are intensively monitored by hundreds of sensors each that send measurements with a high frequency for damage prevention. In this paper, we propose a combination of yet another segmentation algorithm (YASA), a novel fast and high quality segmentation algorithm, with a one-class support vector machine approach for efficient anomaly detection in turbomachines. The proposal is meant for dealing with the aforementioned task and to cope with the lack of labeled training data. As a result, we perform a series of empirical studies comparing our approach to other methods applied to benchmark problems and a real-life application related to oil platform turbomachinery anomaly detection. PMID:25633599

  11. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  12. Ancient igneous intrusions and early expansion of the Moon revealed by GRAIL gravity gradiometry.

    PubMed

    Andrews-Hanna, Jeffrey C; Asmar, Sami W; Head, James W; Kiefer, Walter S; Konopliv, Alexander S; Lemoine, Frank G; Matsuyama, Isamu; Mazarico, Erwan; McGovern, Patrick J; Melosh, H Jay; Neumann, Gregory A; Nimmo, Francis; Phillips, Roger J; Smith, David E; Solomon, Sean C; Taylor, G Jeffrey; Wieczorek, Mark A; Williams, James G; Zuber, Maria T

    2013-02-08

    The earliest history of the Moon is poorly preserved in the surface geologic record due to the high flux of impactors, but aspects of that history may be preserved in subsurface structures. Application of gravity gradiometry to observations by the Gravity Recovery and Interior Laboratory (GRAIL) mission results in the identification of a population of linear gravity anomalies with lengths of hundreds of kilometers. Inversion of the gravity anomalies indicates elongated positive-density anomalies that are interpreted to be ancient vertical tabular intrusions or dikes formed by magmatism in combination with extension of the lithosphere. Crosscutting relationships support a pre-Nectarian to Nectarian age, preceding the end of the heavy bombardment of the Moon. The distribution, orientation, and dimensions of the intrusions indicate a globally isotropic extensional stress state arising from an increase in the Moon's radius by 0.6 to 4.9 kilometers early in lunar history, consistent with predictions of thermal models.

  13. Paleozoic mafic-intermediate intrusions (320-287 Ma) in the Kalatongke area, southern Altai, NW China: Products of protracted magmatism in a convergent tectonic setting

    NASA Astrophysics Data System (ADS)

    Qian, Zhuangzhi; Duan, Jun; Li, Chusi; Xu, Gang; Feng, Yanqing; Ren, Meng

    2018-06-01

    Numerous small mafic-intermediate intrusions are present in the Kalatongke area in the southern part of the Paleozoic Altai Orogenic Belt, NW China. Previous studies reveal that most of these intrusions were emplaced at ∼287 Ma, broadly coeval with the eruption of alkaline flood basalts at ⩽282 Ma in the Tarim Craton. The similar ages have led some researchers to believe that the Tarim flood basalts and the Kalatongke mafic-intermediate intrusions are related to the same mantle plume. New and existing geochronological and geochemical data for the mafic-intermediate intrusions in the Kalatongke area together do not support such interpretation. Most of the intrusions in this small area (4.5 × 2 km) were emplaced at ∼287 Ma but our new data reveal that older intrusive rocks with zircon U-Pb ages from 290 ± 1.5 to 320 ± 2 Ma are also present. The temporal and spatial distribution of these intrusions does not show a hotspot track as expected by the mantle plume model. The intrusive rocks have similar Nd-Hf isotope compositions (εNd = 3-9, εHf = 15-19) and are all characterized by light REE enrichments relative to heavy REE, plus pronounced negative Nb-Ta anomalies. The oldest intrusion (∼320 Ma) also shows negative Zr-Hf anomalies, which are common in arc basalts but absent in continental flood basalts. The results of mixing calculations based on Sr-Nd-Hf isotopes and selected trace elements (Th, Nb and Yb) indicate that the parental magmas for these intrusions were all enriched in Th and depleted in Nb prior to crustal contamination, similar to the magmas generated in a convergent tectonic setting from subduction to post-subduction elsewhere in the world. The results from this study remind us that temporal correlation is not a reliable tool to determine the size of a mantle plume.

  14. Gravity evidence for a shallow intrusion under Medicine Lake volcano, California.

    USGS Publications Warehouse

    Finn, C.; Williams, D.L.

    1982-01-01

    A positive gravity anomaly is associated with Medicine Lake volcano, California. Trials with different Bouguer reduction densities indicate that this positive anomaly cannot be explained by an inappropriate choice of Bouguer reduction density but must be caused by a subvolcanic body. After separating the Medicine Lake gravity high from the regional field, we were able to fit the 27mgal positive residual anomaly with a large, shallow body of high density contrast (+0.41g/cm3) and a thickness of 2.5km. We interpret this body to be an intrusion of dense material emplaced within the several-kilometres-thick older volcanic layer that probably underlies Medicine Lake volcano.-Authors

  15. An artificial bioindicator system for network intrusion detection.

    PubMed

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  16. A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data

    NASA Astrophysics Data System (ADS)

    Song, Jungsuk; Takakura, Hiroki; Okabe, Yasuo; Inoue, Daisuke; Eto, Masashi; Nakao, Koji

    Intrusion Detection Systems (IDS) have been received considerable attention among the network security researchers as one of the most promising countermeasures to defend our crucial computer systems or networks against attackers on the Internet. Over the past few years, many machine learning techniques have been applied to IDSs so as to improve their performance and to construct them with low cost and effort. Especially, unsupervised anomaly detection techniques have a significant advantage in their capability to identify unforeseen attacks, i.e., 0-day attacks, and to build intrusion detection models without any labeled (i.e., pre-classified) training data in an automated manner. In this paper, we conduct a set of experiments to evaluate and analyze performance of the major unsupervised anomaly detection techniques using real traffic data which are obtained at our honeypots deployed inside and outside of the campus network of Kyoto University, and using various evaluation criteria, i.e., performance evaluation by similarity measurements and the size of training data, overall performance, detection ability for unknown attacks, and time complexity. Our experimental results give some practical and useful guidelines to IDS researchers and operators, so that they can acquire insight to apply these techniques to the area of intrusion detection, and devise more effective intrusion detection models.

  17. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    NASA Astrophysics Data System (ADS)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  18. SAMPLING-BASED APPROACH TO INVESTIGATING VAPOR INTRUSION

    EPA Science Inventory

    Vapor intrusion is defined as the migration of volatile organic compounds (VOCs) into occupied buildings from contaminated soil or ground water. EPA recently developed guidance to facilitate assessment of vapor intrusion at sites regulated by RCRA and CERCLA. The EPA guidance e...

  19. An immunity-based anomaly detection system with sensor agents.

    PubMed

    Okamoto, Takeshi; Ishida, Yoshiteru

    2009-01-01

    This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user's command sequences on UNIX-like systems. In experiments, the immunity-based system outperformed some of the best conventional systems.

  20. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  1. Draped aeromagnetic survey in Transantarctic Mountains over the area of the Butcher Ridge igneous complex showing extent of underlying mafic intrusion

    USGS Publications Warehouse

    Behrendt, John C.; Damaske, D.; Finn, C.A.; Kyle, P.; Wilson, T.J.

    2002-01-01

    A draped aeromagnetic survey over the area surrounding the Butcher Ridge igneous complex (BRIC), Transantarctic Mountains, was acquired in 1997-1998 as part of a larger Transantarctic Mountains Aerogeophysical Research Activity survey. The BRIC is a sill-like hypoabyssal intrusion ranging in composition from tholeiitic basalt to rhyolite. An 40Ar/39 Ar age of 174 Ma and the chemical character of the basaltic rocks show the BRIC to be part of the widespread Jurassic Ferrar suite of continental tholeiitic rocks, that extends for 3500 km across Antarctica. The aeromagnetic survey shows a horseshoe-shaped pattern of anomalies reaching amplitudes as great as 1900 nT generally associated with the bedrock topography where it is exposed. It is apparent that the high-amplitude anomaly pattern is more extensive than the 10-km-long exposed outcrop, first crossed by a single 1990 aeromagnetic profile. The highest-amplitude anomalies appear south of the profile acquired in 1990 and extend out of the survey area. The new aeromagnetic data allow determination of the extent of the interpreted Butcher mafic(?) intrusion beneath exposures of Beacon sedimentary rock and ice in the area covered, as well as beneath the small BRIC exposure. The magnetic anomalies show a minimum area of 3000 km2, a much greater extent than previously inferred. Magnetic models indicate a minimum thickness of ~1-2 km for a horizontal intrusion. However, nonunique models with magnetic layers decreasing in apparent susceptibility with depth are consistent with of a 4- to 8-km-thick layered intrusion. These magnetic models indicate progressively deeper erosion of the interpreted mafic-layered body from the south to north. The erosion has removed more magnetic upper layers that mask the magnetic effects of the lower less magnetic layers. The probable minimum volume of the intrusion in the area of the survey is ~6000 km3. An alternate, but less likely, interpretation of a series of dikes can also fit the

  2. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.

  3. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    PubMed

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less

  5. Testing the differential effects of acceptance and attention-based psychological interventions on intrusive thoughts and worry.

    PubMed

    Ainsworth, B; Bolderston, H; Garner, M

    2017-04-01

    Worry is a key component of anxiety and may be an effective target for therapeutic intervention. We compared two psychological processes (attention and acceptance) on the frequency of intrusive worrying thoughts in an experimental worry task. 77 participants were randomised across three groups and completed either a 10 min attention or acceptance-based psychological exercise, or progressive muscle relaxation control. We subsequently measured anxiety, and the content and frequency of intrusive thoughts before and after a 'worry induction task'. Groups did not differ in baseline worry, anxiety or thought intrusions. Both attention and acceptance-based groups experienced fewer negative thought intrusions (post-worry) compared to the relaxation control group. The acceptance exercise had the largest effect, preventing 'worry induction'. Increases in negative intrusive thoughts predicted subjective anxiety. We provide evidence that acceptance and attention psychological exercises may reduce anxiety by reducing the negative thought intrusions that characterise worry. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  6. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  7. A DBN based anomaly targets detector for HSI

    NASA Astrophysics Data System (ADS)

    Ma, Ning; Wang, Shaojun; Yu, Jinxiang; Peng, Yu

    2017-10-01

    Due to the assumption that Hyperspectral image (HSI) should conform to Gaussian distribution, traditional Mahalanobis distance-based anomaly targets detectors perform poor because the assumption may not always hold. In order to solve those problems, a deep learning based detector, Deep Belief Network(DBN) anomaly detector(DBN-AD), was proposed to fit the unknown distribution of HSI by energy modeling, the reconstruction errors of this encode-decode processing are used for discriminating the anomaly targets. Experiments are implemented on real and synthesized HSI dataset which collection by Airborne Visible Infra-Red Imaging Spectrometer (AVIRIS). Comparing to classic anomaly detector, the proposed method shows better performance, it performs about 0.17 higher in Area Under ROC Curve (AUC) than that of Reed-Xiaoli detector(RXD) and Kernel-RXD (K-RXD).

  8. New Data Bases and Standards for Gravity Anomalies

    NASA Astrophysics Data System (ADS)

    Keller, G. R.; Hildenbrand, T. G.; Webring, M. W.; Hinze, W. J.; Ravat, D.; Li, X.

    2008-12-01

    Ever since the use of high-precision gravimeters emerged in the 1950's, gravity surveys have been an important tool for geologic studies. Recent developments that make geologically useful measurements from airborne and satellite platforms, the ready availability of the Global Positioning System that provides precise vertical and horizontal control, improved global data bases, and the increased availability of processing and modeling software have accelerated the use of the gravity method. As a result, efforts are being made to improve the gravity databases publicly available to the geoscience community by expanding their holdings and increasing the accuracy and precision of the data in them. Specifically the North American Gravity Database as well as the individual databases of Canada, Mexico, and the United States are being revised using new formats and standards to improve their coverage, standardization, and accuracy. An important part of this effort is revision of procedures and standards for calculating gravity anomalies taking into account the enhanced computational power available, modern satellite-based positioning technology, improved terrain databases, and increased interest in more accurately defining the different components of gravity anomalies. The most striking revision is the use of one single internationally accepted reference ellipsoid for the horizontal and vertical datums of gravity stations as well as for the computation of the calculated value of theoretical gravity. The new standards hardly impact the interpretation of local anomalies, but do improve regional anomalies in that long wavelength artifacts are removed. Most importantly, such new standards can be consistently applied to gravity database compilations of nations, continents, and even the entire world. Although many types of gravity anomalies have been described, they fall into three main classes. The primary class incorporates planetary effects, which are analytically prescribed, to

  9. Magnetic investigation and 2½ D gravity profile modelling across the Beattie magnetic anomaly in the southeastern Karoo Basin, South Africa

    NASA Astrophysics Data System (ADS)

    Baiyegunhi, Christopher; Gwavava, Oswald

    2017-03-01

    The southeastern Karoo Basin is considered to be one of the most prospective areas for shale gas exploration in South Africa. An interesting magnetic anomaly, the Beattie magnetic anomaly (BMA), and geologic intrusions are seen on the magnetic map. To date, the source of the BMA and interconnectivity of the igneous intrusions are not well understood. In this study, we investigate the interconnectivity of the igneous intrusions and possible location of the source of the BMA using gravity and magnetic methods. The gravity model results showed that igneous intrusions are interconnected at depth, which probably pose threat by increasing the risk of fracking the Karoo for shale gas exploration. The magnetic results revealed that the BMA becomes stronger with depth. The average depths to the top of the shallow and deep magnetic sources were estimated to be approximately 0.6 and 15 km, respectively.

  10. Slab break-off and the formation of Permian mafic-ultramafic intrusions in southern margin of Central Asian Orogenic Belt, Xinjiang, NW China

    NASA Astrophysics Data System (ADS)

    Song, Xie-Yan; Xie, Wei; Deng, Yu-Feng; Crawford, Anthony J.; Zheng, Wen-Qin; Zhou, Guo-Fu; Deng, Gang; Cheng, Song-Lin; Li, Jun

    2011-11-01

    The Baishiquan and Pobei Early Permian mafic-ultramafic intrusions were emplaced into Proterozoic metamorphic rocks in the Central Tianshan and the Beishan Fold Belt, northern Xinjiang, NW China. The Baishiquan intrusion comprises mainly gabbro, and mela-gabbro sills occurring within and along the margins of the gabbro body. In the Pobei intrusion, two distinct gabbroic packages, a lower gabbro and the main gabbro, are intruded and overlain by small cumulate wehrlite bodies. Both intrusions are characterized by enrichments of large ion lithophile elements and Th and U relative to the high field strength elements, and show strong negative Nb and Ta anomalies and positive K and Pb anomalies, leading to higher Th/Yb and Nb/Yb than in mid-ocean ridge basalt and ocean island basalt. These features are comparable with subduction-related mafic rocks and post-collisional magmas. Geological and geochemical considerations indicate that the parental magmas of the two intrusions were derived from decompression melting of ascending asthenosphere and reacted with overlying subduction-modified lithospheric mantle. We believe that these parental magmas were generated by post-collisional extension along the Chinese Tianshan, perhaps triggered by slab break-off or delamination of thickened lithosphere. Relatively lower (143Nd/144Nd)i and higher (87Sr/86Sr)i than other Permian mafic-ultramafic intrusions in the eastern Chinese Tianshan indicate that the parental magmas of these two intrusions experienced significant contamination by old crustal rocks.

  11. Identifying Threats Using Graph-based Anomaly Detection

    NASA Astrophysics Data System (ADS)

    Eberle, William; Holder, Lawrence; Cook, Diane

    Much of the data collected during the monitoring of cyber and other infrastructures is structural in nature, consisting of various types of entities and relationships between them. The detection of threatening anomalies in such data is crucial to protecting these infrastructures. We present an approach to detecting anomalies in a graph-based representation of such data that explicitly represents these entities and relationships. The approach consists of first finding normative patterns in the data using graph-based data mining and then searching for small, unexpected deviations to these normative patterns, assuming illicit behavior tries to mimic legitimate, normative behavior. The approach is evaluated using several synthetic and real-world datasets. Results show that the approach has high truepositive rates, low false-positive rates, and is capable of detecting complex structural anomalies in real-world domains including email communications, cellphone calls and network traffic.

  12. Controls on Martian Hydrothermal Systems: Application to Valley Network and Magnetic Anomaly Formation

    NASA Technical Reports Server (NTRS)

    Harrison, Keith P.; Grimm, Robert E.

    2002-01-01

    Models of hydrothermal groundwater circulation can quantify limits to the role of hydrothermal activity in Martian crustal processes. We present here the results of numerical simulations of convection in a porous medium due to the presence of a hot intruded magma chamber. The parameter space includes magma chamber depth, volume, aspect ratio, and host rock permeability and porosity. A primary goal of the models is the computation of surface discharge. Discharge increases approximately linearly with chamber volume, decreases weakly with depth (at low geothermal gradients), and is maximized for equant-shaped chambers. Discharge increases linearly with permeability until limited by the energy available from the intrusion. Changes in the average porosity are balanced by changes in flow velocity and therefore have little effect. Water/rock ratios of approximately 0.1, obtained by other workers from models based on the mineralogy of the Shergotty meteorite, imply minimum permeabilities of 10(exp -16) sq m2 during hydrothermal alteration. If substantial vapor volumes are required for soil alteration, the permeability must exceed 10(exp -15) sq m. The principal application of our model is to test the viability of hydrothermal circulation as the primary process responsible for the broad spatial correlation of Martian valley networks with magnetic anomalies. For host rock permeabilities as low as 10(exp -17) sq m and intrusion volumes as low as 50 cu km, the total discharge due to intrusions building that part of the southern highlands crust associated with magnetic anomalies spans a comparable range as the inferred discharge from the overlying valley networks.

  13. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  14. Evolutionary neural networks for anomaly detection based on the behavior of a program.

    PubMed

    Han, Sang-Jun; Cho, Sung-Bae

    2006-06-01

    The process of learning the behavior of a given program by using machine-learning techniques (based on system-call audit data) is effective to detect intrusions. Rule learning, neural networks, statistics, and hidden Markov models (HMMs) are some of the kinds of representative methods for intrusion detection. Among them, neural networks are known for good performance in learning system-call sequences. In order to apply this knowledge to real-world problems successfully, it is important to determine the structures and weights of these call sequences. However, finding the appropriate structures requires very long time periods because there are no suitable analytical solutions. In this paper, a novel intrusion-detection technique based on evolutionary neural networks (ENNs) is proposed. One advantage of using ENNs is that it takes less time to obtain superior neural networks than when using conventional approaches. This is because they discover the structures and weights of the neural networks simultaneously. Experimental results with the 1999 Defense Advanced Research Projects Agency (DARPA) Intrusion Detection Evaluation (IDEVAL) data confirm that ENNs are promising tools for intrusion detection.

  15. Time-resolved seismic tomography detects magma intrusions at Mount Etna.

    PubMed

    Patanè, D; Barberi, G; Cocina, O; De Gori, P; Chiarabba, C

    2006-08-11

    The continuous volcanic and seismic activity at Mount Etna makes this volcano an important laboratory for seismological and geophysical studies. We used repeated three-dimensional tomography to detect variations in elastic parameters during different volcanic cycles, before and during the October 2002-January 2003 flank eruption. Well-defined anomalous low P- to S-wave velocity ratio volumes were revealed. Absent during the pre-eruptive period, the anomalies trace the intrusion of volatile-rich (>/=4 weight percent) basaltic magma, most of which rose up only a few months before the onset of eruption. The observed time changes of velocity anomalies suggest that four-dimensional tomography provides a basis for more efficient volcano monitoring and short- and midterm eruption forecasting of explosive activity.

  16. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  17. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  18. Anomaly detection in hyperspectral imagery: statistics vs. graph-based algorithms

    NASA Astrophysics Data System (ADS)

    Berkson, Emily E.; Messinger, David W.

    2016-05-01

    Anomaly detection (AD) algorithms are frequently applied to hyperspectral imagery, but different algorithms produce different outlier results depending on the image scene content and the assumed background model. This work provides the first comparison of anomaly score distributions between common statistics-based anomaly detection algorithms (RX and subspace-RX) and the graph-based Topological Anomaly Detector (TAD). Anomaly scores in statistical AD algorithms should theoretically approximate a chi-squared distribution; however, this is rarely the case with real hyperspectral imagery. The expected distribution of scores found with graph-based methods remains unclear. We also look for general trends in algorithm performance with varied scene content. Three separate scenes were extracted from the hyperspectral MegaScene image taken over downtown Rochester, NY with the VIS-NIR-SWIR ProSpecTIR instrument. In order of most to least cluttered, we study an urban, suburban, and rural scene. The three AD algorithms were applied to each scene, and the distributions of the most anomalous 5% of pixels were compared. We find that subspace-RX performs better than RX, because the data becomes more normal when the highest variance principal components are removed. We also see that compared to statistical detectors, anomalies detected by TAD are easier to separate from the background. Due to their different underlying assumptions, the statistical and graph-based algorithms highlighted different anomalies within the urban scene. These results will lead to a deeper understanding of these algorithms and their applicability across different types of imagery.

  19. Risk-Based Evaluation of Total Petroleum Hydrocarbons in Vapor Intrusion Studies

    PubMed Central

    Brewer, Roger; Nagashima, Josh; Kelley, Michael; Heskett, Marvin; Rigby, Mark

    2013-01-01

    This paper presents a quantitative method for the risk-based evaluation of Total Petroleum Hydrocarbons (TPH) in vapor intrusion investigations. Vapors from petroleum fuels are characterized by a complex mixture of aliphatic and, to a lesser extent, aromatic compounds. These compounds can be measured and described in terms of TPH carbon ranges. Toxicity factors published by USEPA and other parties allow development of risk-based, air and soil vapor screening levels for each carbon range in the same manner as done for individual compounds such as benzene. The relative, carbon range makeup of petroleum vapors can be used to develop weighted, site-specific or generic screening levels for TPH. At some critical ratio of TPH to a targeted, individual compound, the overwhelming proportion of TPH will drive vapor intrusion risk over the individual compound. This is particularly true for vapors associated with diesel and other middle distillate fuels, but can also be the case for low-benzene gasolines or even for high-benzene gasolines if an adequately conservative, target risk is not applied to individually targeted chemicals. This necessitates a re-evaluation of the reliance on benzene and other individual compounds as a stand-alone tool to evaluate vapor intrusion risk associated with petroleum. PMID:23765191

  20. 3D non-linear inversion of magnetic anomalies caused by prismatic bodies using differential evolution algorithm

    NASA Astrophysics Data System (ADS)

    Balkaya, Çağlayan; Ekinci, Yunus Levent; Göktürkler, Gökhan; Turan, Seçil

    2017-01-01

    3D non-linear inversion of total field magnetic anomalies caused by vertical-sided prismatic bodies has been achieved by differential evolution (DE), which is one of the population-based evolutionary algorithms. We have demonstrated the efficiency of the algorithm on both synthetic and field magnetic anomalies by estimating horizontal distances from the origin in both north and east directions, depths to the top and bottom of the bodies, inclination and declination angles of the magnetization, and intensity of magnetization of the causative bodies. In the synthetic anomaly case, we have considered both noise-free and noisy data sets due to two vertical-sided prismatic bodies in a non-magnetic medium. For the field case, airborne magnetic anomalies originated from intrusive granitoids at the eastern part of the Biga Peninsula (NW Turkey) which is composed of various kinds of sedimentary, metamorphic and igneous rocks, have been inverted and interpreted. Since the granitoids are the outcropped rocks in the field, the estimations for the top depths of two prisms representing the magnetic bodies were excluded during inversion studies. Estimated bottom depths are in good agreement with the ones obtained by a different approach based on 3D modelling of pseudogravity anomalies. Accuracy of the estimated parameters from both cases has been also investigated via probability density functions. Based on the tests in the present study, it can be concluded that DE is a useful tool for the parameter estimation of source bodies using magnetic anomalies.

  1. Alerts Analysis and Visualization in Network-based Intrusion Detection Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Dr. Li

    2010-08-01

    The alerts produced by network-based intrusion detection systems, e.g. Snort, can be difficult for network administrators to efficiently review and respond to due to the enormous number of alerts generated in a short time frame. This work describes how the visualization of raw IDS alert data assists network administrators in understanding the current state of a network and quickens the process of reviewing and responding to intrusion attempts. The project presented in this work consists of three primary components. The first component provides a visual mapping of the network topology that allows the end-user to easily browse clustered alerts. Themore » second component is based on the flocking behavior of birds such that birds tend to follow other birds with similar behaviors. This component allows the end-user to see the clustering process and provides an efficient means for reviewing alert data. The third component discovers and visualizes patterns of multistage attacks by profiling the attacker s behaviors.« less

  2. Min-max hyperellipsoidal clustering for anomaly detection in network security.

    PubMed

    Sarasamma, Suseela T; Zhu, Qiuming A

    2006-08-01

    A novel hyperellipsoidal clustering technique is presented for an intrusion-detection system in network security. Hyperellipsoidal clusters toward maximum intracluster similarity and minimum intercluster similarity are generated from training data sets. The novelty of the technique lies in the fact that the parameters needed to construct higher order data models in general multivariate Gaussian functions are incrementally derived from the data sets using accretive processes. The technique is implemented in a feedforward neural network that uses a Gaussian radial basis function as the model generator. An evaluation based on the inclusiveness and exclusiveness of samples with respect to specific criteria is applied to accretively learn the output clusters of the neural network. One significant advantage of this is its ability to detect individual anomaly types that are hard to detect with other anomaly-detection schemes. Applying this technique, several feature subsets of the tcptrace network-connection records that give above 95% detection at false-positive rates below 5% were identified.

  3. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena.

  4. Cybersecurity Intrusion Detection and Monitoring for Field Area Network: Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pietrowicz, Stanley

    This report summarizes the key technical accomplishments, industry impact and performance of the I2-CEDS grant entitled “Cybersecurity Intrusion Detection and Monitoring for Field Area Network”. Led by Applied Communication Sciences (ACS/Vencore Labs) in conjunction with its utility partner Sacramento Municipal Utility District (SMUD), the project accelerated research on a first-of-its-kind cybersecurity monitoring solution for Advanced Meter Infrastructure and Distribution Automation field networks. It advanced the technology to a validated, full-scale solution that detects anomalies, intrusion events and improves utility situational awareness and visibility. The solution was successfully transitioned and commercialized for production use as SecureSmart™ Continuous Monitoring. Discoveries made withmore » SecureSmart™ Continuous Monitoring led to tangible and demonstrable improvements in the security posture of the US national electric infrastructure.« less

  5. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    NASA Astrophysics Data System (ADS)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  6. Intrusive dike complexes, cumulate cores, and the extrusive growth of Hawaiian volcanoes

    USGS Publications Warehouse

    Flinders, Ashton F.; Ito, Garrett; Garcia, Michael O.; Sinton, John M.; Kauahikaua, Jim; Taylor, Brian

    2013-01-01

    The Hawaiian Islands are the most geologically studied hot-spot islands in the world yet surprisingly, the only large-scale compilation of marine and land gravity data is more than 45 years old. Early surveys served as reconnaissance studies only, and detailed analyses of the crustal-density structure have been limited. Here we present a new chain-wide gravity compilation that incorporates historical island surveys, recently published work on the islands of Hawai‘i, Kaua‘i, and Ni‘ihau, and >122,000 km of newly compiled marine gravity data. Positive residual gravity anomalies reflect dense intrusive bodies, allowing us to locate current and former volcanic centers, major rift zones, and a previously suggested volcano on Ka‘ena Ridge. By inverting the residual gravity data, we generate a 3-D view of the dense, intrusive complexes and olivine-rich cumulate cores within individual volcanoes and rift zones. We find that the Hāna and Ka‘ena ridges are underlain by particularly high-density intrusive material (>2.85 g/cm3) not observed beneath other Hawaiian rift zones. Contrary to previous estimates, volcanoes along the chain are shown to be composed of a small proportion of intrusive material (<30% by volume), implying that the islands are predominately built extrusively.

  7. Maternal psychological responses during pregnancy after ultrasonographic detection of structural fetal anomalies: A prospective longitudinal observational study

    PubMed Central

    Kaasen, Anne; Helbig, Anne; Malt, Ulrik F.; Næs, Tormod; Skari, Hans; Haugen, Guttorm

    2017-01-01

    In this longitudinal prospective observational study performed at a tertiary perinatal referral centre, we aimed to assess maternal distress in pregnancy in women with ultrasound findings of fetal anomaly and compare this with distress in pregnant women with normal ultrasound findings. Pregnant women with a structural fetal anomaly (n = 48) and normal ultrasound (n = 105) were included. We administered self-report questionnaires (General Health Questionnaire-28, Impact of Event Scale-22 [IES], and Edinburgh Postnatal Depression Scale) a few days following ultrasound detection of a fetal anomaly or a normal ultrasound (T1), 3 weeks post-ultrasound (T2), and at 30 (T3) and 36 weeks gestation (T4). Social dysfunction, health perception, and psychological distress (intrusion, avoidance, arousal, anxiety, and depression) were the main outcome measures. The median gestational age at T1 was 20 and 19 weeks in the group with and without fetal anomaly, respectively. In the fetal anomaly group, all psychological distress scores were highest at T1. In the group with a normal scan, distress scores were stable throughout pregnancy. At all assessments, the fetal anomaly group scored significantly higher (especially on depression-related questions) compared to the normal scan group, except on the IES Intrusion and Arousal subscales at T4, although with large individual differences. In conclusion, women with a known fetal anomaly initially had high stress scores, which gradually decreased, resembling those in women with a normal pregnancy. Psychological stress levels were stable and low during the latter half of gestation in women with a normal pregnancy. PMID:28350879

  8. Anomaly Detection in Nanofibrous Materials by CNN-Based Self-Similarity.

    PubMed

    Napoletano, Paolo; Piccoli, Flavio; Schettini, Raimondo

    2018-01-12

    Automatic detection and localization of anomalies in nanofibrous materials help to reduce the cost of the production process and the time of the post-production visual inspection process. Amongst all the monitoring methods, those exploiting Scanning Electron Microscope (SEM) imaging are the most effective. In this paper, we propose a region-based method for the detection and localization of anomalies in SEM images, based on Convolutional Neural Networks (CNNs) and self-similarity. The method evaluates the degree of abnormality of each subregion of an image under consideration by computing a CNN-based visual similarity with respect to a dictionary of anomaly-free subregions belonging to a training set. The proposed method outperforms the state of the art.

  9. Anomaly Detection in Nanofibrous Materials by CNN-Based Self-Similarity

    PubMed Central

    Schettini, Raimondo

    2018-01-01

    Automatic detection and localization of anomalies in nanofibrous materials help to reduce the cost of the production process and the time of the post-production visual inspection process. Amongst all the monitoring methods, those exploiting Scanning Electron Microscope (SEM) imaging are the most effective. In this paper, we propose a region-based method for the detection and localization of anomalies in SEM images, based on Convolutional Neural Networks (CNNs) and self-similarity. The method evaluates the degree of abnormality of each subregion of an image under consideration by computing a CNN-based visual similarity with respect to a dictionary of anomaly-free subregions belonging to a training set. The proposed method outperforms the state of the art. PMID:29329268

  10. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability

    PubMed Central

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A.

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals. PMID:25814962

  11. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    PubMed

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  12. A new intrusion prevention model using planning knowledge graph

    NASA Astrophysics Data System (ADS)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  13. Usefulness of DARPA dataset for intrusion detection system evaluation

    NASA Astrophysics Data System (ADS)

    Thomas, Ciza; Sharma, Vishwas; Balakrishnan, N.

    2008-03-01

    The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion Detection Systems, which has contributed tremendously to the research progress in that field. The DARPA IDS evaluation dataset has been criticized and considered by many as a very outdated dataset, unable to accommodate the latest trend in attacks. Then naturally the question arises as to whether the detection systems have improved beyond detecting these old level of attacks. If not, is it worth thinking of this dataset as obsolete? The paper presented here tries to provide supporting facts for the use of the DARPA IDS evaluation dataset. The two commonly used signature-based IDSs, Snort and Cisco IDS, and two anomaly detectors, the PHAD and the ALAD, are made use of for this evaluation purpose and the results support the usefulness of DARPA dataset for IDS evaluation.

  14. Geophysical Evidence for Magma Intrusion across the Non-Transform Offset between the Famous and North Famous segments of The Mid-Atlantic Ridge

    NASA Astrophysics Data System (ADS)

    Giusti, M.; Dziak, R. P.; Maia, M.; Perrot, J.; Sukhovich, A.

    2017-12-01

    In August of 2010 an unusually large earthquake sequence of >700 events occurred at the Famous and North Famous segments (36.5-37°N) of the Mid-Atlantic Ridge (MAR), recorded by an array of five hydrophones moored on the MAR flanks. The swarm extended spatially >70 km across the two segments. The non-transform offset (NTO) separating the two segements, which is thought to act as strucutural barrier, did not appear to impede or block the earthquake's spatial distribution. Broadband acoustic energy (1-30 Hz) was also observed and accompanied the onset of the swarm, lasting >20 hours. A total of 18 earthquakes from the swarm were detected teleseismically, four had Centroid-Moment Tensor (CMT) solutions derived. The CMT solutions indicated three normal faulting events, and one non-double couple (explosion) event. The spatio-temporal distribution of the seismicity and broadband energy show evidence of two magma dike intrusions at the North Famous segment, with one intrusion crossing the NTO. This is the first evidence for an intrusion event detected on the MAR south of the Azores since the 2001 Lucky Strike intrusion. Gravimetric data were required to identify whether or not the Famous area is indeed comprised of two segments down to the level of the upper mantle. A high resolution gravity anomaly map of the two segments has been realized, based on a two-dimensional polygons model (Chapman, 1979) and will be compared to gravimetric data originated from SUDACORES experiment (1998, Atalante ship, IFREMER research team). Combined with the earthquake observations, this gravity anomaly map should provide a better understanding the geodynamic processes of this non-transform offset and of the deep magmatic system driving the August 2010 swarm.

  15. A two-stage flow-based intrusion detection model for next-generation networks.

    PubMed

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  16. A two-stage flow-based intrusion detection model for next-generation networks

    PubMed Central

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results. PMID:29329294

  17. Evaluation of Anomaly Detection Method Based on Pattern Recognition

    NASA Astrophysics Data System (ADS)

    Fontugne, Romain; Himura, Yosuke; Fukuda, Kensuke

    The number of threats on the Internet is rapidly increasing, and anomaly detection has become of increasing importance. High-speed backbone traffic is particularly degraded, but their analysis is a complicated task due to the amount of data, the lack of payload data, the asymmetric routing and the use of sampling techniques. Most anomaly detection schemes focus on the statistical properties of network traffic and highlight anomalous traffic through their singularities. In this paper, we concentrate on unusual traffic distributions, which are easily identifiable in temporal-spatial space (e.g., time/address or port). We present an anomaly detection method that uses a pattern recognition technique to identify anomalies in pictures representing traffic. The main advantage of this method is its ability to detect attacks involving mice flows. We evaluate the parameter set and the effectiveness of this approach by analyzing six years of Internet traffic collected from a trans-Pacific link. We show several examples of detected anomalies and compare our results with those of two other methods. The comparison indicates that the only anomalies detected by the pattern-recognition-based method are mainly malicious traffic with a few packets.

  18. Research on intrusion detection based on Kohonen network and support vector machine

    NASA Astrophysics Data System (ADS)

    Shuai, Chunyan; Yang, Hengcheng; Gong, Zeweiyi

    2018-05-01

    In view of the problem of low detection accuracy and the long detection time of support vector machine, which directly applied to the network intrusion detection system. Optimization of SVM parameters can greatly improve the detection accuracy, but it can not be applied to high-speed network because of the long detection time. a method based on Kohonen neural network feature selection is proposed to reduce the optimization time of support vector machine parameters. Firstly, this paper is to calculate the weights of the KDD99 network intrusion data by Kohonen network and select feature by weight. Then, after the feature selection is completed, genetic algorithm (GA) and grid search method are used for parameter optimization to find the appropriate parameters and classify them by support vector machines. By comparing experiments, it is concluded that feature selection can reduce the time of parameter optimization, which has little influence on the accuracy of classification. The experiments suggest that the support vector machine can be used in the network intrusion detection system and reduce the missing rate.

  19. A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data

    PubMed Central

    Goldstein, Markus; Uchida, Seiichi

    2016-01-01

    Anomaly detection is the process of identifying unexpected items or events in datasets, which differ from the norm. In contrast to standard classification tasks, anomaly detection is often applied on unlabeled data, taking only the internal structure of the dataset into account. This challenge is known as unsupervised anomaly detection and is addressed in many practical applications, for example in network intrusion detection, fraud detection as well as in the life science and medical domain. Dozens of algorithms have been proposed in this area, but unfortunately the research community still lacks a comparative universal evaluation as well as common publicly available datasets. These shortcomings are addressed in this study, where 19 different unsupervised anomaly detection algorithms are evaluated on 10 different datasets from multiple application domains. By publishing the source code and the datasets, this paper aims to be a new well-funded basis for unsupervised anomaly detection research. Additionally, this evaluation reveals the strengths and weaknesses of the different approaches for the first time. Besides the anomaly detection performance, computational effort, the impact of parameter settings as well as the global/local anomaly detection behavior is outlined. As a conclusion, we give an advise on algorithm selection for typical real-world tasks. PMID:27093601

  20. A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data.

    PubMed

    Goldstein, Markus; Uchida, Seiichi

    2016-01-01

    Anomaly detection is the process of identifying unexpected items or events in datasets, which differ from the norm. In contrast to standard classification tasks, anomaly detection is often applied on unlabeled data, taking only the internal structure of the dataset into account. This challenge is known as unsupervised anomaly detection and is addressed in many practical applications, for example in network intrusion detection, fraud detection as well as in the life science and medical domain. Dozens of algorithms have been proposed in this area, but unfortunately the research community still lacks a comparative universal evaluation as well as common publicly available datasets. These shortcomings are addressed in this study, where 19 different unsupervised anomaly detection algorithms are evaluated on 10 different datasets from multiple application domains. By publishing the source code and the datasets, this paper aims to be a new well-funded basis for unsupervised anomaly detection research. Additionally, this evaluation reveals the strengths and weaknesses of the different approaches for the first time. Besides the anomaly detection performance, computational effort, the impact of parameter settings as well as the global/local anomaly detection behavior is outlined. As a conclusion, we give an advise on algorithm selection for typical real-world tasks.

  1. Magnetic anomalies along the contact between sedimentary and igneous rocks:

    NASA Astrophysics Data System (ADS)

    Kletetschka, G.; Speer, A. J.; Wasilewski, P. J.

    2002-05-01

    Intrusion of the Liberty Hill granite (South Carolina) into the surrounding shale causes a distinct aureole along the metamorphic contact. The aureole is divided by five isograds, which are the result of a sequence of continuous reactions. One consequence of the continuous reactions is production of contrasting proportion of magnetite and exsolved titanohematite. The continuous change in the relative amounts of these two minerals, controls the magnetic properties of the hornfelses. This causes magnetic anomaly changes associated with the aureole with inflexions occurring at the isograds. The maximum intensity of the magnetic anomaly coincides with the maximum abundance of titanohematite. The anomaly sharply drops when stable remanence of titanohematite is replaced by unstable remanence of magnetite. Magnetic properties of the aureole, which is the contact between igneous and sedimentary rocks, demonstrate an example of magnetic remanence acquisition in petrological environment that is likely to occur on planet Mars.

  2. Geophysical Character and Geochemical Evolution of the Mesoproterozoic Figueira Branca Intrusive Suite, SW Amazon Craton (Brazil)

    NASA Astrophysics Data System (ADS)

    Louro, Vinicius; Cawood, Peter; Mantovani, Marta

    2016-04-01

    The Jauru Terrain hosts the Figueira Branca Intrusive Suite (FBS) in the SW of the Amazon Craton (Brazil). The FBS is a series of 1425 Ma layered mafic intrusions, previously interpreted as anorogenic. The FBS area is located in foreland to the Santa Helena orogen, formed by the subduction of the Rio Alegre Terrain under the Jauru Terrain. Potential field methods (magnetic and gravity), gamma-ray spectrometry, geochemical and isotope data were used to characterize and to model the extent of FBS magmatism, the distribution of faults and shear zones in the area, to evaluate affinities of the magmatic activity, and the relation between the FBS and the Santa Helena orogen. The geophysical methods identified three anomalies corresponding with FBS outcrops. A fourth anomaly with significantly higher amplitude was observed to the north of the three anomalies. From south to north, the anomalies were named Indiavaí, Azteca, Figueira Branca and Jauru. These anomalies were modeled and indicated a northwest-southeast trend, parallel to regional shear zones. The gamma-ray data enabled the collection of 50 samples from the FBS rocks, the Alto Jauru group that hosts the FBS, from nearby intrusive suites, and the Rio Alegre Terrain. The 30 freshest samples were analyzed by X-ray fluorescence for oxides and some trace elements, 20 by ICP-MS for Rare-Earth Elements and 10 for Nd-Sr isotope analyses. The FBS samples were gabbros and gabbro-norites with Nb/Yb-Th/Yb and TiO2/Yb-Nb/Yb ratios indicating varying degrees of crustal interaction. The TiO2/Yb-Nb/Yb data suggested a subduction related component and the ɛNd-ɛSr indicated a juvenile source. Samples from coeval adjacent intermediate magma suites displayed similar characteristics, which suggest derivation from a bimodal source probably related with the subduction of the Rio Alegre Terrain. We interpreted the tectonic setting of the FBS as a result of a roll-back of the subducted slab, which resulted in rejuvenation of the

  3. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks

    PubMed Central

    Yan, Jing; Li, Xiaolei; Luo, Xiaoyuan; Guan, Xinping

    2017-01-01

    Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs consist of two kinds of nodes, i.e., sensor nodes (SNs), which cannot move autonomously, and actuator nodes (ANs), which can move autonomously according to the performance requirement. With the cooperation of SNs and ANs, the intruder detection probability is defined. Then, a virtual lattice-based monitor (VLM) algorithm is proposed to detect the intruder. In order to reduce the redundancy of communication links and improve detection probability, an optimal and coordinative lattice-based monitor patrolling (OCLMP) algorithm is further provided for UWSNs, wherein an equal price search strategy is given for ANs to find the shortest patrolling path. Under VLM and OCLMP algorithms, the detection probabilities are calculated, while the topology connectivity can be guaranteed. Finally, simulation results are presented to show that the proposed method in this paper can improve the detection accuracy and save the energy consumption compared with the conventional methods. PMID:28531127

  4. The petrogenesis of late Neoproterozoic mafic dyke-like intrusion in south Sinai, Egypt

    NASA Astrophysics Data System (ADS)

    Azer, M. K.; Abu El-Ela, F. F.; Ren, M.

    2012-08-01

    New field, petrographical and geochemical studies are presented here for the late Neoproterozoic Rimm intrusion (˜15 km long) exposed in the southern Sinai Peninsula, Egypt in the northernmost Arabian-Nubian Shield (ANS). Field relations indicate that the Rimm intrusion is younger than the surrounding metamorphic rocks and calc-alkaline syn-tectonic granodiorite and it was not affected by regional metamorphism. The anorogenic peralkaline granite of Gebel Serbal crosscuts the Rimm intrusion. The Rimm intrusion is made up of several consanguineous rock types with gradational contacts. It is composed chiefly of pyroxene-hornblende gabbro, hornblende gabbro and minor quartz diorite. The chemical composition of the mafic minerals indicated that the studied rocks derived from calc-alkaline mafic magma. Geochemically, the studied rocks are characterized by enrichment in LILE relative to HFSE and LREE relative to HREE [(Ce/Yb)N = 4.50-6.36]. Quartz diorite display slightly concave HREE pattern and slightly negative Eu-anomaly [(Eu/Eu*)n = 0.91] which may be the result of fractionation of amphibole and plagioclase from the source melt, respectively. The Rimm intrusion evolved from mafic mantle magma into different type rocks by fractional crystallization with minor crustal contamination. The initial magma corresponds to pyroxene-hornblende gabbro and the crystallization of hornblende was caused by slight H2O increase in magma after crystallization of near-liquidus clinopyroxene and Ca-rich plagioclase. Amphiboles geobarometer indicate that the gabbroic rocks of the Rimm intrusion crystallized at pressures between 4.8 and 6.4 Kb, while quartz diorite crystallized at 1.3-2.1 Kb. Crystallization temperatures range between 800 and 926 °C for the gabbros and between 667 and 784 °C for the quartz diorite. The Rimm intrusion represents a post-orogenic phase formed during the crustal thinning and extension of the Arabian-Nubian Shield.

  5. Acute maternal social dysfunction, health perception and psychological distress after ultrasonographic detection of a fetal structural anomaly.

    PubMed

    Kaasen, A; Helbig, A; Malt, U F; Naes, T; Skari, H; Haugen, G

    2010-08-01

    To predict acute psychological distress in pregnant women following detection of a fetal structural anomaly by ultrasonography, and to relate these findings to a comparison group. A prospective, observational study. Tertiary referral centre for fetal medicine. One hundred and eighty pregnant women with a fetal structural anomaly detected by ultrasound (study group) and 111 with normal ultrasound findings (comparison group) were included within a week following sonographic examination after gestational age 12 weeks (inclusion period: May 2006 to February 2009). Social dysfunction and health perception were assessed by the corresponding subscales of the General Health Questionnaire (GHQ-28). Psychological distress was assessed using the Impact of Events Scale (IES-22), Edinburgh Postnatal Depression Scale (EPDS) and the anxiety and depression subscales of the GHQ-28. Fetal anomalies were classified according to severity and diagnostic or prognostic ambiguity at the time of assessment. Social dysfunction, health perception and psychological distress (intrusion, avoidance, arousal, anxiety, depression). The least severe anomalies with no diagnostic or prognostic ambiguity induced the lowest levels of IES intrusive distress (P = 0.025). Women included after 22 weeks of gestation (24%) reported significantly higher GHQ distress than women included earlier in pregnancy (P = 0.003). The study group had significantly higher levels of psychosocial distress than the comparison group on all psychometric endpoints. Psychological distress was predicted by gestational age at the time of assessment, severity of the fetal anomaly, and ambiguity concerning diagnosis or prognosis.

  6. The Impact of Moisture Intrusions from Lower Latitudes on Arctic Net Surface Radiative Fluxes and Sea Ice Growth in Fall and Winter

    NASA Astrophysics Data System (ADS)

    Hegyi, B. M.; Taylor, P. C.

    2017-12-01

    The fall and winter seasons mark an important period in the evolution of Arctic sea ice, where energy is transferred away from the surface to facilitate the cooling of the surface and the growth of Arctic sea ice extent and thickness. Climatologically, these seasons are characterized by distinct periods of increased and reduced surface cooling and sea ice growth. Periods of reduced sea ice growth and surface cooling are associated with cloudy conditions and the transport of warm and moist air from lower latitudes, termed moisture intrusions. In the research presented, we explore the regional and Arctic-wide impact of moisture intrusions on the surface net radiative fluxes and sea ice growth for each fall and winter season from 2000/01-2015/16, utilizing MERRA2 reanalysis data, PIOMAS sea ice thickness data, and daily CERES radiative flux data. Consistent with previous studies, we find that positive anomalies in downwelling longwave surface flux are associated with increased temperature and water vapor content in the atmospheric column contained within the moisture intrusions. Interestingly, there are periods of increased downwelling LW flux anomalies that persist for one week or longer (i.e. longer than synoptic timescales) that are associated with persistent poleward flux of warm, moist air from lower latitudes. These persistent anomalies significantly reduce the regional growth of Arctic sea ice, and may in part explain the interannual variability of fall and winter Arctic sea ice growth.

  7. Alerts Visualization and Clustering in Network-based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administratormore » with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.« less

  8. 3D numerical modelling of negative apparent conductivity anomalies in loop-loop electromagnetic measurements: a case study at a dacite intrusion in Sugisawa, Akita Prefecture, Japan

    NASA Astrophysics Data System (ADS)

    Selepeng, Ame Thato; Sakanaka, Shin'ya; Nishitani, Tadashi

    2017-04-01

    Under certain geological conditions, low induction number electromagnetic (LIN-EM) instruments are known to produce negative apparent conductivity (σa) responses. This is particularly the case when the shallow subsurface is characterised by highly conductive bodies, however little attention has been given to this issue in the research literature. To analyse negative σa anomalies and their causative structures, we make use of a 3D integral equation forward modelling technique based on a 3D weighting function. We present 3D numerical modelling results over a volcanic tuff body intruded by several dacite dikes, in Sugisawa, Akita Prefecture, Japan. Apparent conductivity data were acquired using a Geonics EM-34-3 system in the horizontal magnetic dipole (HMD) and vertical magnetic dipole (VMD) operating modes. Our 3D model resolved the horizontal and vertical extent of the dacite dikes and also delineated a high conductive zone between the volcanic tuff and the intrusive dacite dikes. This zone is the causative structure for negative σa responses in the VMD data, and is interpreted to be an alteration zone. Interestingly, the negative σa response was absent when the instrument alignment azimuth was changed, implying an anisotropic effect on the EM signature in the study area. The true conductivity model achieved by 3D forward modelling is shown to compare favourably with the DC resistivity data acquired in the same area.

  9. A Survey of Artificial Immune System Based Intrusion Detection

    PubMed Central

    Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  10. A survey of artificial immune system based intrusion detection.

    PubMed

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  11. The anomaly data base of screwworm information

    NASA Technical Reports Server (NTRS)

    Giddings, L. E.

    1976-01-01

    Standard statistical processing of anomaly data in the screwworm eradication data system is possible from data compiled on magnetic tapes with the Univac 1108 computer. The format and organization of the data in the data base, which is also available on dedicated disc storage, are described.

  12. Novel Hyperspectral Anomaly Detection Methods Based on Unsupervised Nearest Regularized Subspace

    NASA Astrophysics Data System (ADS)

    Hou, Z.; Chen, Y.; Tan, K.; Du, P.

    2018-04-01

    Anomaly detection has been of great interest in hyperspectral imagery analysis. Most conventional anomaly detectors merely take advantage of spectral and spatial information within neighboring pixels. In this paper, two methods of Unsupervised Nearest Regularized Subspace-based with Outlier Removal Anomaly Detector (UNRSORAD) and Local Summation UNRSORAD (LSUNRSORAD) are proposed, which are based on the concept that each pixel in background can be approximately represented by its spatial neighborhoods, while anomalies cannot. Using a dual window, an approximation of each testing pixel is a representation of surrounding data via a linear combination. The existence of outliers in the dual window will affect detection accuracy. Proposed detectors remove outlier pixels that are significantly different from majority of pixels. In order to make full use of various local spatial distributions information with the neighboring pixels of the pixels under test, we take the local summation dual-window sliding strategy. The residual image is constituted by subtracting the predicted background from the original hyperspectral imagery, and anomalies can be detected in the residual image. Experimental results show that the proposed methods have greatly improved the detection accuracy compared with other traditional detection method.

  13. A simple Bouguer gravity anomaly map of southwestern Saudi Arabia and an initial interpretation

    USGS Publications Warehouse

    Gettings, M.E.

    1983-01-01

    with gravity highs contain a large proportion of gabbroic and dioritic intrusive rocks and that the bulk density of the upper crust associated with some of the batholithic complexes has been lowered by the large-scale intrusion of granitic material at depth, as well as by that exposed at the surface. A comparison of known base and precious metals occurrences with the Bouguer gravity anomaly field shows, in some cases, a correlation between such occurrences and the features of the gravity anomaly map. Several areas were identified between known mineral occurrences along gravity-defined structures that may contain mineral deposits if the lithologic environment is favorable.

  14. A robust background regression based score estimation algorithm for hyperspectral anomaly detection

    NASA Astrophysics Data System (ADS)

    Zhao, Rui; Du, Bo; Zhang, Liangpei; Zhang, Lefei

    2016-12-01

    Anomaly detection has become a hot topic in the hyperspectral image analysis and processing fields in recent years. The most important issue for hyperspectral anomaly detection is the background estimation and suppression. Unreasonable or non-robust background estimation usually leads to unsatisfactory anomaly detection results. Furthermore, the inherent nonlinearity of hyperspectral images may cover up the intrinsic data structure in the anomaly detection. In order to implement robust background estimation, as well as to explore the intrinsic data structure of the hyperspectral image, we propose a robust background regression based score estimation algorithm (RBRSE) for hyperspectral anomaly detection. The Robust Background Regression (RBR) is actually a label assignment procedure which segments the hyperspectral data into a robust background dataset and a potential anomaly dataset with an intersection boundary. In the RBR, a kernel expansion technique, which explores the nonlinear structure of the hyperspectral data in a reproducing kernel Hilbert space, is utilized to formulate the data as a density feature representation. A minimum squared loss relationship is constructed between the data density feature and the corresponding assigned labels of the hyperspectral data, to formulate the foundation of the regression. Furthermore, a manifold regularization term which explores the manifold smoothness of the hyperspectral data, and a maximization term of the robust background average density, which suppresses the bias caused by the potential anomalies, are jointly appended in the RBR procedure. After this, a paired-dataset based k-nn score estimation method is undertaken on the robust background and potential anomaly datasets, to implement the detection output. The experimental results show that RBRSE achieves superior ROC curves, AUC values, and background-anomaly separation than some of the other state-of-the-art anomaly detection methods, and is easy to implement

  15. Acceptance- and imagery-based strategies can reduce chocolate cravings: A test of the elaborated-intrusion theory of desire.

    PubMed

    Schumacher, Sophie; Kemps, Eva; Tiggemann, Marika

    2017-06-01

    The elaborated-intrusion theory of desire proposes that craving is a two-stage process whereby initial intrusions about a desired target are subsequently elaborated with mental imagery. The present study tested whether the craving reduction strategies of cognitive defusion and guided imagery could differentially target the intrusion and elaboration stages, respectively, and thus differentially impact the craving process. Participants were randomly assigned to a cognitive defusion, a guided imagery or a mind-wandering control condition. Pre- and post-intervention chocolate-related thoughts, intrusiveness of thoughts, vividness of imagery, craving intensity, and chocolate consumption were compared. Experiment 1 recruited a general sample of young women (n = 94), whereas Experiment 2 recruited a sample of chocolate cravers who wanted to reduce their chocolate consumption (n = 97). Across both experiments, cognitive defusion lowered intrusiveness of thoughts, vividness of imagery and craving intensity. Guided imagery reduced chocolate-related thoughts, intrusiveness, vividness and craving intensity for chocolate cravers (Experiment 2), but not for the general sample (Experiment 1). There were no group differences in chocolate consumption in either experiment. Results add to existing evidence supporting the elaborated-intrusion theory of desire in the food domain, and suggest that acceptance- and imagery-based techniques have potential for use in combatting problematic cravings. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. CHAMP: a locally adaptive unmixing-based hyperspectral anomaly detection algorithm

    NASA Astrophysics Data System (ADS)

    Crist, Eric P.; Thelen, Brian J.; Carrara, David A.

    1998-10-01

    Anomaly detection offers a means by which to identify potentially important objects in a scene without prior knowledge of their spectral signatures. As such, this approach is less sensitive to variations in target class composition, atmospheric and illumination conditions, and sensor gain settings than would be a spectral matched filter or similar algorithm. The best existing anomaly detectors generally fall into one of two categories: those based on local Gaussian statistics, and those based on linear mixing moles. Unmixing-based approaches better represent the real distribution of data in a scene, but are typically derived and applied on a global or scene-wide basis. Locally adaptive approaches allow detection of more subtle anomalies by accommodating the spatial non-homogeneity of background classes in a typical scene, but provide a poorer representation of the true underlying background distribution. The CHAMP algorithm combines the best attributes of both approaches, applying a linear-mixing model approach in a spatially adaptive manner. The algorithm itself, and teste results on simulated and actual hyperspectral image data, are presented in this paper.

  17. Method for Real-Time Model Based Structural Anomaly Detection

    NASA Technical Reports Server (NTRS)

    Urnes, James M., Sr. (Inventor); Smith, Timothy A. (Inventor); Reichenbach, Eric Y. (Inventor)

    2015-01-01

    A system and methods for real-time model based vehicle structural anomaly detection are disclosed. A real-time measurement corresponding to a location on a vehicle structure during an operation of the vehicle is received, and the real-time measurement is compared to expected operation data for the location to provide a modeling error signal. A statistical significance of the modeling error signal to provide an error significance is calculated, and a persistence of the error significance is determined. A structural anomaly is indicated, if the persistence exceeds a persistence threshold value.

  18. Model-Based Anomaly Detection for a Transparent Optical Transmission System

    NASA Astrophysics Data System (ADS)

    Bengtsson, Thomas; Salamon, Todd; Ho, Tin Kam; White, Christopher A.

    In this chapter, we present an approach for anomaly detection at the physical layer of networks where detailed knowledge about the devices and their operations is available. The approach combines physics-based process models with observational data models to characterize the uncertainties and derive the alarm decision rules. We formulate and apply three different methods based on this approach for a well-defined problem in optical network monitoring that features many typical challenges for this methodology. Specifically, we address the problem of monitoring optically transparent transmission systems that use dynamically controlled Raman amplification systems. We use models of amplifier physics together with statistical estimation to derive alarm decision rules and use these rules to automatically discriminate between measurement errors, anomalous losses, and pump failures. Our approach has led to an efficient tool for systematically detecting anomalies in the system behavior of a deployed network, where pro-active measures to address such anomalies are key to preventing unnecessary disturbances to the system's continuous operation.

  19. Petroleum Vapor Intrusion

    EPA Pesticide Factsheets

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  20. Evidential reasoning research on intrusion detection

    NASA Astrophysics Data System (ADS)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  1. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    NASA Astrophysics Data System (ADS)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  2. Vascular Anomalies (Part I): Classification and Diagnostics of Vascular Anomalies.

    PubMed

    Sadick, Maliha; Müller-Wille, René; Wildgruber, Moritz; Wohlgemuth, Walter A

    2018-06-06

     Vascular anomalies are a diagnostic and therapeutic challenge. They require dedicated interdisciplinary management. Optimal patient care relies on integral medical evaluation and a classification system established by experts in the field, to provide a better understanding of these complex vascular entities.  A dedicated classification system according to the International Society for the Study of Vascular Anomalies (ISSVA) and the German Interdisciplinary Society of Vascular Anomalies (DiGGefA) is presented. The vast spectrum of diagnostic modalities, ranging from ultrasound with color Doppler, conventional X-ray, CT with 4 D imaging and MRI as well as catheter angiography for appropriate assessment is discussed.  Congenital vascular anomalies are comprised of vascular tumors, based on endothelial cell proliferation and vascular malformations with underlying mesenchymal and angiogenetic disorder. Vascular tumors tend to regress with patient's age, vascular malformations increase in size and are subdivided into capillary, venous, lymphatic, arterio-venous and combined malformations, depending on their dominant vasculature. According to their appearance, venous malformations are the most common representative of vascular anomalies (70 %), followed by lymphatic malformations (12 %), arterio-venous malformations (8 %), combined malformation syndromes (6 %) and capillary malformations (4 %).  The aim is to provide an overview of the current classification system and diagnostic characterization of vascular anomalies in order to facilitate interdisciplinary management of vascular anomalies.   · Vascular anomalies are comprised of vascular tumors and vascular malformations, both considered to be rare diseases.. · Appropriate treatment depends on correct classification and diagnosis of vascular anomalies, which is based on established national and international classification systems, recommendations and guidelines.. · In the classification

  3. Petrologic model of the northern Mississippi Embayment based on satellite magnetic and ground-based geophysical data

    NASA Technical Reports Server (NTRS)

    Thomas, H. H.

    1984-01-01

    A petrologic model of the northern Mississippi Embayment, derived from gravity, seismic and rift data, is evaluated by converting the model to a magnetization model which is compared with satellite magnetic anomaly models. A magnetization contrast of approximately -0.54 A/m, determined from the petrologic model of the embayment compares favorably to values of -0.62 A/m and -0.45 A/m from a Magsat United States Apparent Magnetization Contrast Map and a published POGO magnetization contrast model, respectively. The petrologic model suggests that the magnetic anomaly low associated with the Mississippi Embayment may be largely due to the intrusion under non-oxidizing conditions of low Curie temperature gabbroic material at the base of the crust of the embayment. Near-surface mafic plutons, bordering the Mississippi Valley Graben, appear from aeromagnetic data to have higher magnetizations than the deeper gabbroic material; however, it is impossible to ascertain if this is due to compositional differences or similar material at shallower (lower temperature) depths. These results indicate that variations in the Curie temperatures of intrusions accompanying rifting may account for a large part of the wide range of magnetic anomalies associated with presently inactive rifts with normal heat flow.

  4. Crustal high-velocity anomaly at the East European Craton margin in SE Poland (TESZ) modelled by 3-D seismic tomography of refracted and reflected arrivals

    NASA Astrophysics Data System (ADS)

    Środa, Piotr; Dec, Monika

    2016-04-01

    The area of Trans-European Suture Zone in SE Poland represents a contact of major tectonic units of different consolidation age - from the Precambrian East European Craton, through Palaeozoic West European Platform to Cenozoic Carpathian orogen. The region was built by several phases of crustal accretion, which resulted in a complex collage of tectonic blocks. In 2000, this region was studied by several seismic wide-angle profiles of CELEBRATION 2000 experiment, providing a dense coverage of seismic data in SE Poland and allowing for detailed investigations of the crustal structure and properties in this area. Beneath the marginal part of the EEC, the 2-D modelling of in-line data form several CELEBRATION profiles revealed a prominent high P-wave velocity anomaly in the upper crust, with Vp of 6.7-7.1 km/s, starting at 10-16 km depth (e.g., Środa et al., 2006). Anomalously high velocities are observed in the area located approximately beneath Lublin trough, to the NE of Teisseyre-Tornquist Zone. Based on 3-D tomography of first arrivals of in- and off-line CELEBRATION 2000 recordings (Malinowski et al., 2008), elevated velocities are also reported in the same area and seem to continue to the SW, off the craton margin. Gravimetric modelling also revealed anomalously high density in the same region at similar depths. High seismic velocities and densities are interpreted as indicative for a pronounced mafic intrusion, possibly related to extensional processes at the EEC margin. Previous 3-D models of the high-velocity intrusion were based on first arrivals (crustal refractions) only. In this study, also off-line reflections (not modelled up to now) are used, in order to enlarge the data set and to better constrain the geometry and properties of the velocity anomaly. A code for 3-D joint tomographic inversion of refracted and reflected arrivals, with model parametrization allowing for velocity discontinuities was used (Rawlinson, 2007). With this approach, besides the

  5. Assessment of Mitigation Systems on Vapor Intrusion ...

    EPA Pesticide Factsheets

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor environments are often negatively pressurized with respect to outdoor air and soil gas (for example, from exhaust fans or the stack effect), and this pressure difference allows soil gas containing subsurface vapors to flow into indoor air through advection. In addition, concentration differentials cause VOCs and radon to migrate from areas of higher to lower concentrations through diffusion, which is another cause of vapor intrusion. Current practice for evaluating the vapor intrusion pathway involves a multiple line of evidence approach based on direct measurements in groundwater, external soil gas, subslab soil gas, and/or indoor air. No single line of evidence is considered definitive, and direct measurements of vapor intrusion can be costly, especially where significant spatial and temporal variability require repeated measurements at multiple locations to accurately assess the chronic risks of long-term exposure to volatile organic compounds (VOCs) like chloroform, perchloroethylene (PCE), and trichloroethylene (TCE).

  6. Randomized subspace-based robust principal component analysis for hyperspectral anomaly detection

    NASA Astrophysics Data System (ADS)

    Sun, Weiwei; Yang, Gang; Li, Jialin; Zhang, Dianfa

    2018-01-01

    A randomized subspace-based robust principal component analysis (RSRPCA) method for anomaly detection in hyperspectral imagery (HSI) is proposed. The RSRPCA combines advantages of randomized column subspace and robust principal component analysis (RPCA). It assumes that the background has low-rank properties, and the anomalies are sparse and do not lie in the column subspace of the background. First, RSRPCA implements random sampling to sketch the original HSI dataset from columns and to construct a randomized column subspace of the background. Structured random projections are also adopted to sketch the HSI dataset from rows. Sketching from columns and rows could greatly reduce the computational requirements of RSRPCA. Second, the RSRPCA adopts the columnwise RPCA (CWRPCA) to eliminate negative effects of sampled anomaly pixels and that purifies the previous randomized column subspace by removing sampled anomaly columns. The CWRPCA decomposes the submatrix of the HSI data into a low-rank matrix (i.e., background component), a noisy matrix (i.e., noise component), and a sparse anomaly matrix (i.e., anomaly component) with only a small proportion of nonzero columns. The algorithm of inexact augmented Lagrange multiplier is utilized to optimize the CWRPCA problem and estimate the sparse matrix. Nonzero columns of the sparse anomaly matrix point to sampled anomaly columns in the submatrix. Third, all the pixels are projected onto the complemental subspace of the purified randomized column subspace of the background and the anomaly pixels in the original HSI data are finally exactly located. Several experiments on three real hyperspectral images are carefully designed to investigate the detection performance of RSRPCA, and the results are compared with four state-of-the-art methods. Experimental results show that the proposed RSRPCA outperforms four comparison methods both in detection performance and in computational time.

  7. Is mindfulness-based therapy an effective intervention for obsessive-intrusive thoughts: a case series.

    PubMed

    Wilkinson-Tough, Megan; Bocci, Laura; Thorne, Kirsty; Herlihy, Jane

    2010-01-01

    Despite the efficacy of cognitive-behavioural interventions in improving the experience of obsessions and compulsions, some people do not benefit from this approach. The present research uses a case series design to establish whether mindfulness-based therapy could benefit those experiencing obsessive-intrusive thoughts by targeting thought-action fusion and thought suppression. Three participants received a relaxation control intervention followed by a six-session mindfulness-based intervention which emphasized daily practice. Following therapy all participants demonstrated reductions in Yale-Brown Obsessive-Compulsive Scale scores to below clinical levels, with two participants maintaining this at follow-up. Qualitative analysis of post-therapy feedback suggested that mindfulness skills such as observation, awareness and acceptance were seen as helpful in managing thought-action fusion and suppression. Despite being limited by small participant numbers, these results suggest that mindfulness may be beneficial to some people experiencing intrusive unwanted thoughts and that further research could establish the possible efficacy of this approach in larger samples. Copyright (c) 2009 John Wiley & Sons, Ltd.

  8. A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Sainani, Varsha

    The increasing number of network security related incidents have made it necessary for the organizations to actively protect their sensitive data with network intrusion detection systems (IDSs). IDSs are expected to analyze a large volume of data while not placing a significantly added load on the monitoring systems and networks. This requires good data mining strategies which take less time and give accurate results. In this study, a novel data mining assisted multiagent-based intrusion detection system (DMAS-IDS) is proposed, particularly with the support of multiclass supervised classification. These agents can detect and take predefined actions against malicious activities, and data mining techniques can help detect them. Our proposed DMAS-IDS shows superior performance compared to central sniffing IDS techniques, and saves network resources compared to other distributed IDS with mobile agents that activate too many sniffers causing bottlenecks in the network. This is one of the major motivations to use a distributed model based on multiagent platform along with a supervised classification technique.

  9. An automatically tuning intrusion detection system.

    PubMed

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  10. Case-Based Multi-Sensor Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Schwartz, Daniel G.; Long, Jidong

    2009-08-01

    Multi-sensor intrusion detection systems (IDSs) combine the alerts raised by individual IDSs and possibly other kinds of devices such as firewalls and antivirus software. A critical issue in building a multi-sensor IDS is alert-correlation, i.e., determining which alerts are caused by the same attack. This paper explores a novel approach to alert correlation using case-based reasoning (CBR). Each case in the CBR system's library contains a pattern of alerts raised by some known attack type, together with the identity of the attack. Then during run time, the alert streams gleaned from the sensors are compared with the patterns in the cases, and a match indicates that the attack described by that case has occurred. For this purpose the design of a fast and accurate matching algorithm is imperative. Two such algorithms were explored: (i) the well-known Hungarian algorithm, and (ii) an order-preserving matching of our own device. Tests were conducted using the DARPA Grand Challenge Problem attack simulator. These showed that the both matching algorithms are effective in detecting attacks; but the Hungarian algorithm is inefficient; whereas the order-preserving one is very efficient, in fact runs in linear time.

  11. Stress reaction process-based hierarchical recognition algorithm for continuous intrusion events in optical fiber prewarning system

    NASA Astrophysics Data System (ADS)

    Qu, Hongquan; Yuan, Shijiao; Wang, Yanping; Yang, Dan

    2018-04-01

    To improve the recognition performance of optical fiber prewarning system (OFPS), this study proposed a hierarchical recognition algorithm (HRA). Compared with traditional methods, which employ only a complex algorithm that includes multiple extracted features and complex classifiers to increase the recognition rate with a considerable decrease in recognition speed, HRA takes advantage of the continuity of intrusion events, thereby creating a staged recognition flow inspired by stress reaction. HRA is expected to achieve high-level recognition accuracy with less time consumption. First, this work analyzed the continuity of intrusion events and then presented the algorithm based on the mechanism of stress reaction. Finally, it verified the time consumption through theoretical analysis and experiments, and the recognition accuracy was obtained through experiments. Experiment results show that the processing speed of HRA is 3.3 times faster than that of a traditional complicated algorithm and has a similar recognition rate of 98%. The study is of great significance to fast intrusion event recognition in OFPS.

  12. Mellin Transform-Based Correction Method for Linear Scale Inconsistency of Intrusion Events Identification in OFPS

    NASA Astrophysics Data System (ADS)

    Wang, Baocheng; Qu, Dandan; Tian, Qing; Pang, Liping

    2018-05-01

    For the problem that the linear scale of intrusion signals in the optical fiber pre-warning system (OFPS) is inconsistent, this paper presents a method to correct the scale. Firstly, the intrusion signals are intercepted, and an aggregate of the segments with equal length is obtained. Then, the Mellin transform (MT) is applied to convert them into the same scale. The spectral characteristics are obtained by the Fourier transform. Finally, we adopt back-propagation (BP) neural network to identify intrusion types, which takes the spectral characteristics as input. We carried out the field experiments and collected the optical fiber intrusion signals which contain the picking signal, shoveling signal, and running signal. The experimental results show that the proposed algorithm can effectively improve the recognition accuracy of the intrusion signals.

  13. A Hypergraph and Arithmetic Residue-based Probabilistic Neural Network for classification in Intrusion Detection Systems.

    PubMed

    Raman, M R Gauthama; Somu, Nivethitha; Kirthivasan, Kannan; Sriram, V S Shankar

    2017-08-01

    Over the past few decades, the design of an intelligent Intrusion Detection System (IDS) remains an open challenge to the research community. Continuous efforts by the researchers have resulted in the development of several learning models based on Artificial Neural Network (ANN) to improve the performance of the IDSs. However, there exists a tradeoff with respect to the stability of ANN architecture and the detection rate for less frequent attacks. This paper presents a novel approach based on Helly property of Hypergraph and Arithmetic Residue-based Probabilistic Neural Network (HG AR-PNN) to address the classification problem in IDS. The Helly property of Hypergraph was exploited for the identification of the optimal feature subset and the arithmetic residue of the optimal feature subset was used to train the PNN. The performance of HG AR-PNN was evaluated using KDD CUP 1999 intrusion dataset. Experimental results prove the dominance of HG AR-PNN classifier over the existing classifiers with respect to the stability and improved detection rate for less frequent attacks. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    USGS Publications Warehouse

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  15. Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy

    DTIC Science & Technology

    2014-03-27

    20 Intrusion Detection...alarms ( Rem ). ............................................................................................................. 86 Figure 25. TP% for...literature concerning the focus areas of this research. The focus areas include SCADA vulnerabilities, information theory, and intrusion detection

  16. Behavioral economics without anomalies.

    PubMed Central

    Rachlin, H

    1995-01-01

    Behavioral economics is often conceived as the study of anomalies superimposed on a rational system. As research has progressed, anomalies have multiplied until little is left of rationality. Another conception of behavioral economics is based on the axiom that value is always maximized. It incorporates so-called anomalies either as conflicts between temporal patterns of behavior and the individual acts comprising those patterns or as outcomes of nonexponential time discounting. This second conception of behavioral economics is both empirically based and internally consistent. PMID:8551195

  17. Residual Error Based Anomaly Detection Using Auto-Encoder in SMD Machine Sound.

    PubMed

    Oh, Dong Yul; Yun, Il Dong

    2018-04-24

    Detecting an anomaly or an abnormal situation from given noise is highly useful in an environment where constantly verifying and monitoring a machine is required. As deep learning algorithms are further developed, current studies have focused on this problem. However, there are too many variables to define anomalies, and the human annotation for a large collection of abnormal data labeled at the class-level is very labor-intensive. In this paper, we propose to detect abnormal operation sounds or outliers in a very complex machine along with reducing the data-driven annotation cost. The architecture of the proposed model is based on an auto-encoder, and it uses the residual error, which stands for its reconstruction quality, to identify the anomaly. We assess our model using Surface-Mounted Device (SMD) machine sound, which is very complex, as experimental data, and state-of-the-art performance is successfully achieved for anomaly detection.

  18. Tactile sensor of hardness recognition based on magnetic anomaly detection

    NASA Astrophysics Data System (ADS)

    Xue, Lingyun; Zhang, Dongfang; Chen, Qingguang; Rao, Huanle; Xu, Ping

    2018-03-01

    Hardness, as one kind of tactile sensing, plays an important role in the field of intelligent robot application such as gripping, agricultural harvesting, prosthetic hand and so on. Recently, with the rapid development of magnetic field sensing technology with high performance, a number of magnetic sensors have been developed for intelligent application. The tunnel Magnetoresistance(TMR) based on magnetoresistance principal works as the sensitive element to detect the magnetic field and it has proven its excellent ability of weak magnetic detection. In the paper, a new method based on magnetic anomaly detection was proposed to detect the hardness in the tactile way. The sensor is composed of elastic body, ferrous probe, TMR element, permanent magnet. When the elastic body embedded with ferrous probe touches the object under the certain size of force, deformation of elastic body will produce. Correspondingly, the ferrous probe will be forced to displace and the background magnetic field will be distorted. The distorted magnetic field was detected by TMR elements and the output signal at different time can be sampled. The slope of magnetic signal with the sampling time is different for object with different hardness. The result indicated that the magnetic anomaly sensor can recognize the hardness rapidly within 150ms after the tactile moment. The hardness sensor based on magnetic anomaly detection principal proposed in the paper has the advantages of simple structure, low cost, rapid response and it has shown great application potential in the field of intelligent robot.

  19. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    USGS Publications Warehouse

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    The conterminous United States hosts numerous volumetrically significant and geographically dispersed granitoid intrusions that range in age from 1.50 to 1.32 billion years before present (Ga). Although previously referred to as A-type granites, most are better described as ferroan granites. These granitoid intrusions are distributed in the northern and central Rocky Mountains, the Southwest, the northern midcontinent, and a swath largely buried beneath Phanerozoic cover across the Great Plains and into the southern midcontinent. These intrusions, with ages that are bimodally distributed between about 1.455–1.405 Ga and 1.405–1.320 Ga, are dispersed nonsystematically with respect to age across their spatial extents. Globally, although A-type or ferroan granites are genetically associated with rare-metal deposits, most U.S. 1.4 Ga granitoid intrusions do not contain significant deposits. Exceptions are the light rare-earth element deposit at Mountain Pass, California, and the iron oxide-apatite and iron oxide-copper-gold deposits in southeast Missouri.Most of the U.S. 1.4 Ga granitoid intrusions are composed of hornblende ± biotite or biotite ± muscovite monzogranite, commonly with prominent alkali feldspar megacrysts; however, modal compositions vary widely. These intrusions include six of the eight commonly identified subtypes of ferroan granite: alkali-calcic and calc-alkalic peraluminous subtypes; alkalic, alkali-calcic, and calc-alkalic metaluminous subtypes; and the alkalic peralkaline subtype. The U.S. 1.4 Ga granitoid intrusions also include variants of these subtypes that have weakly magnesian compositions. Extreme large-ion lithophile element enrichments typical of ferroan granites elsewhere are absent among these intrusions. Chondrite-normalized rare-earth element patterns for these intrusions have modest negative slopes and moderately developed negative europium anomalies. Their radiogenic isotopic compositions are consistent with mixing involving

  20. State of the Practice of Intrusion Detection Technologies

    DTIC Science & Technology

    2000-01-01

    security incident response teams ) - the role of IDS in threat management, such as defining alarm severity, monitoring, alerting, and policy-based...attacks in an effort to sneak under the radar of security specialists and intrusion detection software, a U.S. Navy network security team said today...to get the smoking gun," said Stephen Northcutt, head of the Shadow intrusion detection team at the Naval Surface Warfare Center. "To know what’s

  1. The importance of context: evidence that contextual representations increase intrusive memories.

    PubMed

    Pearson, David G; Ross, Fiona D C; Webster, Victoria L

    2012-03-01

    Intrusive memories appear to enter consciousness via involuntary rather than deliberate recollection. Some clinical accounts of PTSD seek to explain this phenomenon by making a clear distinction between the encoding of sensory-based and contextual representations. Contextual representations have been claimed to actively reduce intrusions by anchoring encoded perceptual data for an event in memory. The current analogue trauma study examined this hypothesis by manipulating contextual information independently from encoded sensory-perceptual information. Participants' viewed images selected from the International Affective Picture System that depicted scenes of violence and bodily injury. Images were viewed either under neutral conditions or paired with contextual information. Two experiments revealed a significant increase in memory intrusions for images paired with contextual information in comparison to the same images viewed under neutral conditions. In contrast to the observed increase in intrusion frequency there was no effect of contextual representations on voluntary memory for the images. The vividness and emotionality of memory intrusions were also unaffected. The analogue trauma paradigm may fail to replicate the effect of extreme stress on encoding postulated to occur during PTSD. These findings question the assertion that intrusive memories develop from a lack of integration between sensory-based and contextual representations in memory. Instead it is argued contextual representations play a causal role in increasing the frequency of intrusions by increasing the sensitivity of memory to involuntary retrieval by associated internal and external cues. Copyright © 2011 Elsevier Ltd. All rights reserved.

  2. Precursor Analysis for Flight- and Ground-Based Anomaly Risk Significance Determination

    NASA Technical Reports Server (NTRS)

    Groen, Frank

    2010-01-01

    This slide presentation reviews the precursor analysis for flight and ground based anomaly risk significance. It includes information on accident precursor analysis, real models vs. models, and probabilistic analysis.

  3. Igneous intrusion models for floor fracturing in lunar craters

    NASA Technical Reports Server (NTRS)

    Wichman, R. W.; Schultz, P. H.

    1991-01-01

    Lunar floor-fractured craters are primarily located near the maria and frequently contain ponded mare units and dark mantling deposits. Fracturing is confined to the crater interior, often producing a moat-like feature near the floor edge, and crater depth is commonly reduced by uplift of the crater floor. Although viscous relaxation of crater topography can produce such uplift, the close association of modification with surface volcanism supports a model linking floor fracture to crater-centered igneous intrusions. The consequences of two intrusion models for the lunar interior are quantitatively explored. The first model is based on terrestrial laccoliths and describes a shallow intrusion beneath the crater. The second model is based on cone sheet complexes where surface deformation results from a deeper magma chamber. Both models, their fit to observed crater modifications and possible implications for local volcanism are described.

  4. Paleomagnetic determinations on Lanzarote from magnetic and gravity anomalies: Implications for the early history of the Canary Islands

    NASA Astrophysics Data System (ADS)

    Blanco-Montenegro, I.; Montesinos, F. G.; GarcíA, A.; Vieira, R.; VillalaíN, J. J.

    2005-12-01

    The Bouguer and aeromagnetic anomaly maps of Lanzarote show a gravity high and a dipolar magnetic anomaly over the central part of the island, indicating one isolated source. Assuming that the structure responsible for both anomalies is the same, a methodology has been designed to estimate the total magnetization vector of the source, which is interpreted as a large intrusive body (mafic core) positioned as a result of magma rising to the surface during the early stages of growth of Lanzarote. Considering its geometry to be known from a previous three-dimensional (3-D) gravity model, the approach proposed in this paper is based on the delineation of magnetic contacts through analysis of the horizontal gradient of the reduced-to-the-pole anomaly map, comparison between the gravity and the pseudogravity anomalies, and 3-D forward magnetic modeling. The total magnetization vector obtained by this method is defined by a module of 4.5 A m-1 and a direction D = -20° and I = 30°. Comparing the paleomagnetic pole, obtained from this direction, with the apparent polar wander path of Africa for the last 160 Myr, it is concluded that the main component of the total magnetization vector is probably a primary natural remanent magnetization (NRM) which could have been acquired between 60 and 100 Ma. This result suggests that the emplacement of magmas at shallow depths linked to the beginning of volcanism in Lanzarote took place during the Upper Cretaceous, thus providing the first evidence of a timeline for the early formative stages of this volcanic island.

  5. Theory and experiments in model-based space system anomaly management

    NASA Astrophysics Data System (ADS)

    Kitts, Christopher Adam

    This research program consists of an experimental study of model-based reasoning methods for detecting, diagnosing and resolving anomalies that occur when operating a comprehensive space system. Using a first principles approach, several extensions were made to the existing field of model-based fault detection and diagnosis in order to develop a general theory of model-based anomaly management. Based on this theory, a suite of algorithms were developed and computationally implemented in order to detect, diagnose and identify resolutions for anomalous conditions occurring within an engineering system. The theory and software suite were experimentally verified and validated in the context of a simple but comprehensive, student-developed, end-to-end space system, which was developed specifically to support such demonstrations. This space system consisted of the Sapphire microsatellite which was launched in 2001, several geographically distributed and Internet-enabled communication ground stations, and a centralized mission control complex located in the Space Technology Center in the NASA Ames Research Park. Results of both ground-based and on-board experiments demonstrate the speed, accuracy, and value of the algorithms compared to human operators, and they highlight future improvements required to mature this technology.

  6. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE must...

  7. Using Unix system auditing for detecting network intrusions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators knowmore » what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.« less

  8. A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems

    DTIC Science & Technology

    2002-04-01

    Based Approach to Intrusion Detection System Evaluation for Distributed Real - Time Systems Authors: G. A. Fink, B. L. Chappell, T. G. Turner, and...Distributed, Security. 1 Introduction Processing and cost requirements are driving future naval combat platforms to use distributed, real - time systems of...distributed, real - time systems . As these systems grow more complex, the timing requirements do not diminish; indeed, they may become more constrained

  9. The Effects of Saltwater Intrusion to Flood Mitigation Project

    NASA Astrophysics Data System (ADS)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  10. [Analysis of intrusion errors in free recall].

    PubMed

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  11. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    PubMed

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  12. Cognitive avoidance of intrusive memories: recall vantage perspective and associations with depression.

    PubMed

    Williams, Alishia D; Moulds, Michelle L

    2007-06-01

    Although recent research demonstrates that intrusive memories represent an overlapping cognitive feature of depression and post-traumatic stress disorder (PTSD), there is still a general paucity of research investigating the prevalence and maintenance of intrusive memories in depression. The current study investigated the association between a range of cognitive avoidant mechanisms that characterize PTSD samples (i.e., suppression, rumination, emotional detachment, and an observer vantage perspective) and intrusive memories of negative autobiographical events in relation to dysphoria. Hypotheses were based on the proposition that employment of these cognitive mechanisms would hinder the emotional processing of the negative event, thus contributing to the maintenance of intrusions. Results supported an association between negative intrusive memories, dysphoria, and avoidant mechanisms. Significant differences were also found between field and observer memories and measures of emotional detachment and rumination. Implications relating to intrusive memory maintenance and treatment approaches are discussed.

  13. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grana, Justin; Wolpert, David; Neil, Joshua

    The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less

  14. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

    DOE PAGES

    Grana, Justin; Wolpert, David; Neil, Joshua; ...

    2016-03-11

    The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less

  15. A Model-Based Anomaly Detection Approach for Analyzing Streaming Aircraft Engine Measurement Data

    NASA Technical Reports Server (NTRS)

    Simon, Donald L.; Rinehart, Aidan W.

    2014-01-01

    This paper presents a model-based anomaly detection architecture designed for analyzing streaming transient aircraft engine measurement data. The technique calculates and monitors residuals between sensed engine outputs and model predicted outputs for anomaly detection purposes. Pivotal to the performance of this technique is the ability to construct a model that accurately reflects the nominal operating performance of the engine. The dynamic model applied in the architecture is a piecewise linear design comprising steady-state trim points and dynamic state space matrices. A simple curve-fitting technique for updating the model trim point information based on steadystate information extracted from available nominal engine measurement data is presented. Results from the application of the model-based approach for processing actual engine test data are shown. These include both nominal fault-free test case data and seeded fault test case data. The results indicate that the updates applied to improve the model trim point information also improve anomaly detection performance. Recommendations for follow-on enhancements to the technique are also presented and discussed.

  16. A Model-Based Anomaly Detection Approach for Analyzing Streaming Aircraft Engine Measurement Data

    NASA Technical Reports Server (NTRS)

    Simon, Donald L.; Rinehart, Aidan Walker

    2015-01-01

    This paper presents a model-based anomaly detection architecture designed for analyzing streaming transient aircraft engine measurement data. The technique calculates and monitors residuals between sensed engine outputs and model predicted outputs for anomaly detection purposes. Pivotal to the performance of this technique is the ability to construct a model that accurately reflects the nominal operating performance of the engine. The dynamic model applied in the architecture is a piecewise linear design comprising steady-state trim points and dynamic state space matrices. A simple curve-fitting technique for updating the model trim point information based on steadystate information extracted from available nominal engine measurement data is presented. Results from the application of the model-based approach for processing actual engine test data are shown. These include both nominal fault-free test case data and seeded fault test case data. The results indicate that the updates applied to improve the model trim point information also improve anomaly detection performance. Recommendations for follow-on enhancements to the technique are also presented and discussed.

  17. Congenital basis of posterior fossa anomalies

    PubMed Central

    Cotes, Claudia; Bonfante, Eliana; Lazor, Jillian; Jadhav, Siddharth; Caldas, Maria; Swischuk, Leonard

    2015-01-01

    The classification of posterior fossa congenital anomalies has been a controversial topic. Advances in genetics and imaging have allowed a better understanding of the embryologic development of these abnormalities. A new classification schema correlates the embryologic, morphologic, and genetic bases of these anomalies in order to better distinguish and describe them. Although they provide a better understanding of the clinical aspects and genetics of these disorders, it is crucial for the radiologist to be able to diagnose the congenital posterior fossa anomalies based on their morphology, since neuroimaging is usually the initial step when these disorders are suspected. We divide the most common posterior fossa congenital anomalies into two groups: 1) hindbrain malformations, including diseases with cerebellar or vermian agenesis, aplasia or hypoplasia and cystic posterior fossa anomalies; and 2) cranial vault malformations. In addition, we will review the embryologic development of the posterior fossa and, from the perspective of embryonic development, will describe the imaging appearance of congenital posterior fossa anomalies. Knowledge of the developmental bases of these malformations facilitates detection of the morphological changes identified on imaging, allowing accurate differentiation and diagnosis of congenital posterior fossa anomalies. PMID:26246090

  18. Intrusion detection: systems and models

    NASA Technical Reports Server (NTRS)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  19. Sulfide mineralization associated with arc magmatism in the Qilian Block, western China: zircon U-Pb age and Sr-Nd-Os-S isotope constraints from the Yulonggou and Yaqu gabbroic intrusions

    NASA Astrophysics Data System (ADS)

    Zhang, Zhao-Wei; Li, Wen-Yuan; Gao, Yong-Bao; Li, Chusi; Ripley, Edward M.; Kamo, Sandra

    2014-02-01

    The sulfide-bearing Yulonggou and Yaqu mafic intrusions are located in the southern margin of the Qilian Block, Qinghai Province, western China. They are small dike-like bodies mainly composed of gabbros and diorites. Disseminated sulfides (pyrrhotite, pentlandite, and chalcopyrite) are present as concordant lenses within the intrusions. Precise CA-ID-TIMS zircon U-Pb dating yields the crystallization ages of 443.39 ± 0.42 and 440.74 ± 0.33 Ma for the Yulonggou and Yaqu intrusions, respectively. Whole rock samples from both intrusions show light rare earth element (REE) enrichments relative to heavy REE and pronounced negative Nb-Ta anomalies relative to Th and La, which are consistent with the products of arc basaltic magmatism. The Yulonggou intrusion has negative ɛ Nd values from -5.7 to -7.7 and elevated (87Sr/86Sr) i ratios from 0.711 to 0.714. In contrast, the Yaqu intrusion has higher ɛ Nd values from -4.1 to +8.4 and lower (87Sr/86Sr) i ratios from 0.705 to 0.710. The δ34S values of sulfide separates from the Yulonggou and Yaqu deposits vary from 0.8 to 2.4 ‰ and from 2 to 4.3 ‰, respectively. The γ Os values of sulfide separates from the Yulonggou and Yaqu deposits vary between 80 and 123 and between 963 and 1,191, respectively. Higher γ Os values coupled with higher δ34S values for the Yaqu deposit relative to the Yulonggou deposit indicate that external sulfur played a bigger role in sulfide mineralization in the Yaqu intrusion than in the Yulonggou intrusion. Mixing calculations using Sr-Nd isotope data show that contamination with siliceous crustal materials is more pronounced in the Yulonggou intrusion (up to 20 wt%) than in the Yaqu intrusion (<15 wt%). The distribution of sulfides in both intrusions is consistent with multiple emplacements of sulfide-saturated magmas from depth. The Yulonggou and Yaqu sulfide deposits are not economically valuable under current market condition due to small sizes and low Ni grades, which can be explained

  20. GBAS Ionospheric Anomaly Monitoring Based on a Two-Step Approach

    PubMed Central

    Zhao, Lin; Yang, Fuxin; Li, Liang; Ding, Jicheng; Zhao, Yuxin

    2016-01-01

    As one significant component of space environmental weather, the ionosphere has to be monitored using Global Positioning System (GPS) receivers for the Ground-Based Augmentation System (GBAS). This is because an ionospheric anomaly can pose a potential threat for GBAS to support safety-critical services. The traditional code-carrier divergence (CCD) methods, which have been widely used to detect the variants of the ionospheric gradient for GBAS, adopt a linear time-invariant low-pass filter to suppress the effect of high frequency noise on the detection of the ionospheric anomaly. However, there is a counterbalance between response time and estimation accuracy due to the fixed time constants. In order to release the limitation, a two-step approach (TSA) is proposed by integrating the cascaded linear time-invariant low-pass filters with the adaptive Kalman filter to detect the ionospheric gradient anomaly. The performance of the proposed method is tested by using simulated and real-world data, respectively. The simulation results show that the TSA can detect ionospheric gradient anomalies quickly, even when the noise is severer. Compared to the traditional CCD methods, the experiments from real-world GPS data indicate that the average estimation accuracy of the ionospheric gradient improves by more than 31.3%, and the average response time to the ionospheric gradient at a rate of 0.018 m/s improves by more than 59.3%, which demonstrates the ability of TSA to detect a small ionospheric gradient more rapidly. PMID:27240367

  1. Cup-shaped Intrusions, Morphology and Emplacement Mechanism Investigate Through Analogue Modelling

    NASA Astrophysics Data System (ADS)

    Mathieu, L.; van Wyk de Vries, B.

    2007-12-01

    We investigate the morphology of large-scale shallow-depth magma intrusions and sub-volcanic complexes with analogue models. Intrusions of analogue magma are done in a granular material that can contain a ductile layer. The model surface is flat to model the formation of plutonic intrusions and it is overlain by a cone when modelling late sub-volcanic complexes. For flat-top models, we obtain cup-shaped intrusions fed by dykes. Cup-shaped intrusions are inverted-cone like bodies. They are different from saucer-shaped intrusions as they possess neither a well developed sill-base, nor an outer rim. However, like saucers, cups are shallow depth intrusions that dome the country rocks. They initiate from an advancing dyke and first develop an inverted-cone like morphology. Then, the central thickness increases and thrusts form at the edge of the domed country rocks. At this stage, the intrusions progressively involve toward a lopolith shape. By using analogue magma of various viscosities we have been able to constrain key relationships: higher intrusion viscosity causes deeper initiation and the deeper they initiate, the larger is the intrusion diameter. A natural example of such intrusion might by the circles of volcanoes like the Azufre-Lastaria (Peru) that might be overlain be a large-scale cup-shaped intrusion. When adding a cone at the surface of the model and, sometimes, a thin ductile layer in the substratum, the morphology of cup-shaped intrusions vary. Note that the ductile layer of our models is not thick enough to induce the gravitational spreading of the cone. Generally, cup-shaped intrusions are asymmetric in cross section and elliptical in plan view. Their formation creates extension structures in the cone (croissant-shaped rift, straight rift or normal fault) and thrusts in some sectors below the cone. Both types of structures are bordered by strike-slip faults. Cups and saucers share many similarities, but differ probably in the fact that saucers are

  2. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Design of an Evolutionary Approach for Intrusion Detection

    PubMed Central

    2013-01-01

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The proposed approach can generate a pool of noninferior solutions and ensembles thereof having optimized trade-offs values of multiple conflicting objectives. In this paper, a three-phase, approach is proposed to generate solutions to a simple chromosome design in the first phase. In the first phase, a Pareto front of noninferior individual solutions is approximated. In the second phase of the proposed approach, the entire solution set is further refined to determine effective ensemble solutions considering solution interaction. In this phase, another improved Pareto front of ensemble solutions over that of individual solutions is approximated. The ensemble solutions in improved Pareto front reported improved detection results based on benchmark datasets for intrusion detection. In the third phase, a combination method like majority voting method is used to fuse the predictions of individual solutions for determining prediction of ensemble solution. Benchmark datasets, namely, KDD cup 1999 and ISCX 2012 dataset, are used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover individual solutions and ensemble solutions thereof with a good support and a detection rate from benchmark datasets (in comparison with well-known ensemble methods like bagging and boosting). In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting

  4. Texture-Based Automated Lithological Classification Using Aeromagenetic Anomaly Images

    USGS Publications Warehouse

    Shankar, Vivek

    2009-01-01

    This report consists of a thesis submitted to the faculty of the Department of Electrical and Computer Engineering, in partial fulfillment of the requirements for the degree of Master of Science, Graduate College, The University of Arizona, 2004 Aeromagnetic anomaly images are geophysical prospecting tools frequently used in the exploration of metalliferous minerals and hydrocarbons. The amplitude and texture content of these images provide a wealth of information to geophysicists who attempt to delineate the nature of the Earth's upper crust. These images prove to be extremely useful in remote areas and locations where the minerals of interest are concealed by basin fill. Typically, geophysicists compile a suite of aeromagnetic anomaly images, derived from amplitude and texture measurement operations, in order to obtain a qualitative interpretation of the lithological (rock) structure. Texture measures have proven to be especially capable of capturing the magnetic anomaly signature of unique lithological units. We performed a quantitative study to explore the possibility of using texture measures as input to a machine vision system in order to achieve automated classification of lithological units. This work demonstrated a significant improvement in classification accuracy over random guessing based on a priori probabilities. Additionally, a quantitative comparison between the performances of five classes of texture measures in their ability to discriminate lithological units was achieved.

  5. [Simultaneous intrusion and retraction of the anterior teeth using a three-piece base arch].

    PubMed

    Liu, D; Bai, D; Wang, C; Sun, W; Guo, J; Xi, R

    2000-06-01

    To evaluate the effects of the three-piece base arch on overbite correction of Class II malocclusion. 20 patients with high angle, flared incisors were treated using a three-piece base arch appliance. The intrusion force of four upper incisors was adjusted to approximately 50 g. The line of force action was 2 mm distally to the resistant center(RC) and the retraction force was 20 g, the right and left posterior segments were joined by a palatal bar. Cephalograms were taken before treatment (T1) and six months after treatment (T2). The upper molars moved mesially 0.60 +/- 0.35 mm and the distance of the vertical extrusion was 0.80 +/- 0.52 mm. The distances of the upper central incisor retraction and intrusion were -4.20 +/- 2.12 mm and 3.10 +/- 0.54 mm respectively. The RC of the central incisor retracted -4.12 +/- 1.96 mm and intruded 3.20 +/- 0.66 mm. The axial inclination of the upper incisor-palatal plane changed from 123.21 degrees +/- 4.26 degrees to 116.00 degrees +/- 3.96 degrees. The three-piece segmented approach can effectively intrude and retract the upper anterior teeth for flared incisors and deep overbite.

  6. Rule-based expert system for maritime anomaly detection

    NASA Astrophysics Data System (ADS)

    Roy, Jean

    2010-04-01

    Maritime domain operators/analysts have a mandate to be aware of all that is happening within their areas of responsibility. This mandate derives from the needs to defend sovereignty, protect infrastructures, counter terrorism, detect illegal activities, etc., and it has become more challenging in the past decade, as commercial shipping turned into a potential threat. In particular, a huge portion of the data and information made available to the operators/analysts is mundane, from maritime platforms going about normal, legitimate activities, and it is very challenging for them to detect and identify the non-mundane. To achieve such anomaly detection, they must establish numerous relevant situational facts from a variety of sensor data streams. Unfortunately, many of the facts of interest just cannot be observed; the operators/analysts thus use their knowledge of the maritime domain and their reasoning faculties to infer these facts. As they are often overwhelmed by the large amount of data and information, automated reasoning tools could be used to support them by inferring the necessary facts, ultimately providing indications and warning on a small number of anomalous events worthy of their attention. Along this line of thought, this paper describes a proof-of-concept prototype of a rule-based expert system implementing automated rule-based reasoning in support of maritime anomaly detection.

  7. Gravity Anomalies in the Northern Hawaiian Islands: Evidence for an Alternative Magma Chamber on Kauai and a Conjoined Niihau-Kauai Island

    NASA Astrophysics Data System (ADS)

    Flinders, A. F.; Ito, G.; Garcia, M.; Kim, S.; Appelgate, B.

    2008-12-01

    The shield stage evolution of the islands of Kauai and Niihau are poorly understood. Previous land-based gravity surveys provide only a coarse constraint on the observed gravitational field. Questions as to whether the island of Kauai was formed by a single or multiple shields and the developmental relationship between these neighboring islands are still debated. Our new land-based gravity survey of Kauai and ship-board gravity surveys around both islands identified large complete Bouguer gravitational anomalies under Kauai's Lihue Basin and offshore in the Kaulakahi Channel, a 30-km-long bathymetric ridge connecting the two islands. These gravitational highs are consistent in size and magnitude with those of other Hawaiian islands and imply local zones of high density crust, most likely attributed to magmatic intrusions; e.g. former magma chambers, or rift zones. The Lihue Basin anomaly observed is offset 20 km east from the geologically mapped caldera region. This offset implies either the unlikely case that the shield stage plumbing system connecting the magma chamber and caldera could have been inclined by up to 75 degrees from the vertical, or that the currently mapped caldera is a late feature, unrelated to shield volcanism. The location of the gravitational anomaly, in the Kaulakahi Channel, 20 km east of Niihau is consistent with geologic mapping, which indicates that Niihau is a remnant of an ancient shield volcano centered east of the island. The proximity of the Niihau gravitational anomaly 10 km from the western edge of Kauai supports the hypothesis that the two volcanoes were part of the same island.

  8. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET

    PubMed Central

    N. Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  9. Intelligent detection and identification in fiber-optical perimeter intrusion monitoring system based on the FBG sensor network

    NASA Astrophysics Data System (ADS)

    Wu, Huijuan; Qian, Ya; Zhang, Wei; Li, Hanyu; Xie, Xin

    2015-12-01

    A real-time intelligent fiber-optic perimeter intrusion detection system (PIDS) based on the fiber Bragg grating (FBG) sensor network is presented in this paper. To distinguish the effects of different intrusion events, a novel real-time behavior impact classification method is proposed based on the essential statistical characteristics of signal's profile in the time domain. The features are extracted by the principal component analysis (PCA), which are then used to identify the event with a K-nearest neighbor classifier. Simulation and field tests are both carried out to validate its effectiveness. The average identification rate (IR) for five sample signals in the simulation test is as high as 96.67%, and the recognition rate for eight typical signals in the field test can also be achieved up to 96.52%, which includes both the fence-mounted and the ground-buried sensing signals. Besides, critically high detection rate (DR) and low false alarm rate (FAR) can be simultaneously obtained based on the autocorrelation characteristics analysis and a hierarchical detection and identification flow.

  10. Integrity Verification for SCADA Devices Using Bloom Filters and Deep Packet Inspection

    DTIC Science & Technology

    2014-03-27

    prevent intrusions in smart grids [PK12]. Parthasarathy proposed an anomaly detection based IDS that takes into account system state. In his implementation...Security, 25(7):498–506, 10 2006. [LMV12] O. Linda, M. Manic, and T. Vollmer. Improving cyber-security of smart grid systems via anomaly detection and...6 2012. 114 [PK12] S. Parthasarathy and D. Kundur. Bloom filter based intrusion detection for smart grid SCADA. In Electrical & Computer Engineering

  11. Frequency characteristics of geomagnetic induction anomalies in Saurashtra region

    NASA Astrophysics Data System (ADS)

    Kumar, P. V. Vijaya; Rao, P. B. V. Subba; Rao, C. K.; Singh, A. K.; Rao, P. Rama

    2017-10-01

    Magnetovariational studies were carried out along four different EW profiles in Saurashtra region in different phases, during January 2007-March 2012. Transient geomagnetic field variations (X, Y horizontal field and Z vertical field components) recorded along these profiles are analyzed to infer the electrical conductivity distribution of the region. The vertical field transfer functions which depict the characteristics of electrical conductivity distribution are presented in the form of induction arrows. From the spatial distribution of these arrows, it is inferred that the sediments filling the offshore basins have more conductivity than those basins in Saurashtra region. Z/ H pseudo sections along the four profiles in conjunction with tectonics and other geophysical methods permit to infer that the conductivity anomaly in the eastern part of the profiles is associated with the crustal/lithosphere thinning. The possible cause for these anomalies may be explained in terms of partial melts associated with mafic intrusions, related to Deccan and pre-Deccan volcanism. High resistive block related to underplating mantle material has been reflected in 1D models of long period magnetotelluric data and its thickness reduces from west to east. Lithosphere-asthenosphere boundary varies from 80 to 100 km.

  12. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    DTIC Science & Technology

    2012-03-01

    Functionality Description Persistence mechanism Mimicry technique Camouflage malware image: • renaming its image • appending its image to victim...particular industrial plant . Exactly which one was targeted still remains unknown, however a majority of the attacks took place in Iran [24]. Due... plant to unstable phase and eventually physical damage. It is interesting to note that a particular block of code - block DB8061 is automatically

  13. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    PubMed

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p < .01, but was unrelated to physiological responses to trauma reminder images (ps > .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  14. The Response of a Branch of Puget Sound, Washington to the 2014 North Pacific Warm Anomaly

    NASA Astrophysics Data System (ADS)

    Mickett, J.; Newton, J.; Devol, A.; Krembs, C.; Ruef, W.

    2016-02-01

    The flow of the unprecedentedly-warm upper-ocean North Pacific "Blob" water into Puget Sound, Washington, caused local extreme water property anomalies that extended from the arrival of the water inshore in the fall of 2014 through 2015. Here we report on moored and seaplane observations from Hood Canal, a branch of Puget Sound, where temperature was more than 2σ above climatology for much of the year with maximum temperature anomalies at depth and at the surface +2.5 °C and +7 °C respectively. The low density of the oceanic warm "Blob" water resulted in weak deep water flushing in Hood Canal in the fall of 2014, which combined with a lack of wintertime flushing to result in anomalously-low dissolved oxygen (DO) concentrations at depth. Late-summer 2015 DO values were the lowest in a decade of mooring observations and more than 2σ below climatology. The anomalously low density of the deep basin water allowed a very early onset of the annually-occurring, late-summer intrusion, which first entered Hood Canal at the end of July compared to the usual arrival in early to mid-September. In late August this intrusion conspired with an early fall storm to lift the very low DO deep water to surface at the south end of Hood Canal, causing a significant fish kill event.

  15. Characterization of pore structure in cement-based materials using pressurization-depressurization cycling mercury intrusion porosimetry (PDC-MIP)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhou Jian, E-mail: Jian.Zhou@tudelft.n; Ye Guang, E-mail: g.ye@tudelft.n; Magnel Laboratory for Concrete Research, Department of Structural Engineering, Ghent University, Technologiepark-Zwijnaarde 904 B-9052, Ghent

    2010-07-15

    Numerous mercury intrusion porosimetry (MIP) studies have been carried out to investigate the pore structure in cement-based materials. However, the standard MIP often results in an underestimation of large pores and an overestimation of small pores because of its intrinsic limitation. In this paper, an innovative MIP method is developed in order to provide a more accurate estimation of pore size distribution. The new MIP measurements are conducted following a unique mercury intrusion procedure, in which the applied pressure is increased from the minimum to the maximum by repeating pressurization-depressurization cycles instead of a continuous pressurization followed by a continuousmore » depressurization. Accordingly, this method is called pressurization-depressurization cycling MIP (PDC-MIP). By following the PDC-MIP testing sequence, the volumes of the throat pores and the corresponding ink-bottle pores can be determined at every pore size. These values are used to calculate pore size distribution by using the newly developed analysis method. This paper presents an application of PDC-MIP on the investigation of the pore size distribution in cement-based materials. The experimental results of PDC-MIP are compared with those measured by standard MIP. The PDC-MIP is further validated with the other experimental methods and numerical tool, including nitrogen sorption, backscanning electron (BSE) image analysis, Wood's metal intrusion porosimetry (WMIP) and the numerical simulation by the cement hydration model HYMOSTRUC3D.« less

  16. Anomaly-specified virtual dimensionality

    NASA Astrophysics Data System (ADS)

    Chen, Shih-Yu; Paylor, Drew; Chang, Chein-I.

    2013-09-01

    Virtual dimensionality (VD) has received considerable interest where VD is used to estimate the number of spectral distinct signatures, denoted by p. Unfortunately, no specific definition is provided by VD for what a spectrally distinct signature is. As a result, various types of spectral distinct signatures determine different values of VD. There is no one value-fit-all for VD. In order to address this issue this paper presents a new concept, referred to as anomaly-specified VD (AS-VD) which determines the number of anomalies of interest present in the data. Specifically, two types of anomaly detection algorithms are of particular interest, sample covariance matrix K-based anomaly detector developed by Reed and Yu, referred to as K-RXD and sample correlation matrix R-based RXD, referred to as R-RXD. Since K-RXD is only determined by 2nd order statistics compared to R-RXD which is specified by statistics of the first two orders including sample mean as the first order statistics, the values determined by K-RXD and R-RXD will be different. Experiments are conducted in comparison with widely used eigen-based approaches.

  17. Intrusion Detection in Database Systems

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Sohrabi, Mina; Rafsanjani, Marjan Kuchaki

    Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated.

  18. Network Intrusion Detection Based on a General Regression Neural Network Optimized by an Improved Artificial Immune Algorithm

    PubMed Central

    Wu, Jianfa; Peng, Dahao; Li, Zhuping; Zhao, Li; Ling, Huanzhang

    2015-01-01

    To effectively and accurately detect and classify network intrusion data, this paper introduces a general regression neural network (GRNN) based on the artificial immune algorithm with elitist strategies (AIAE). The elitist archive and elitist crossover were combined with the artificial immune algorithm (AIA) to produce the AIAE-GRNN algorithm, with the aim of improving its adaptivity and accuracy. In this paper, the mean square errors (MSEs) were considered the affinity function. The AIAE was used to optimize the smooth factors of the GRNN; then, the optimal smooth factor was solved and substituted into the trained GRNN. Thus, the intrusive data were classified. The paper selected a GRNN that was separately optimized using a genetic algorithm (GA), particle swarm optimization (PSO), and fuzzy C-mean clustering (FCM) to enable a comparison of these approaches. As shown in the results, the AIAE-GRNN achieves a higher classification accuracy than PSO-GRNN, but the running time of AIAE-GRNN is long, which was proved first. FCM and GA-GRNN were eliminated because of their deficiencies in terms of accuracy and convergence. To improve the running speed, the paper adopted principal component analysis (PCA) to reduce the dimensions of the intrusive data. With the reduction in dimensionality, the PCA-AIAE-GRNN decreases in accuracy less and has better convergence than the PCA-PSO-GRNN, and the running speed of the PCA-AIAE-GRNN was relatively improved. The experimental results show that the AIAE-GRNN has a higher robustness and accuracy than the other algorithms considered and can thus be used to classify the intrusive data. PMID:25807466

  19. Network intrusion detection based on a general regression neural network optimized by an improved artificial immune algorithm.

    PubMed

    Wu, Jianfa; Peng, Dahao; Li, Zhuping; Zhao, Li; Ling, Huanzhang

    2015-01-01

    To effectively and accurately detect and classify network intrusion data, this paper introduces a general regression neural network (GRNN) based on the artificial immune algorithm with elitist strategies (AIAE). The elitist archive and elitist crossover were combined with the artificial immune algorithm (AIA) to produce the AIAE-GRNN algorithm, with the aim of improving its adaptivity and accuracy. In this paper, the mean square errors (MSEs) were considered the affinity function. The AIAE was used to optimize the smooth factors of the GRNN; then, the optimal smooth factor was solved and substituted into the trained GRNN. Thus, the intrusive data were classified. The paper selected a GRNN that was separately optimized using a genetic algorithm (GA), particle swarm optimization (PSO), and fuzzy C-mean clustering (FCM) to enable a comparison of these approaches. As shown in the results, the AIAE-GRNN achieves a higher classification accuracy than PSO-GRNN, but the running time of AIAE-GRNN is long, which was proved first. FCM and GA-GRNN were eliminated because of their deficiencies in terms of accuracy and convergence. To improve the running speed, the paper adopted principal component analysis (PCA) to reduce the dimensions of the intrusive data. With the reduction in dimensionality, the PCA-AIAE-GRNN decreases in accuracy less and has better convergence than the PCA-PSO-GRNN, and the running speed of the PCA-AIAE-GRNN was relatively improved. The experimental results show that the AIAE-GRNN has a higher robustness and accuracy than the other algorithms considered and can thus be used to classify the intrusive data.

  20. Saltwater intrusion monitoring in Florida

    USGS Publications Warehouse

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  1. Layered intrusions of the Duluth Complex, Minnesota, USA

    USGS Publications Warehouse

    Miller, J.D.; Ripley, E.M.; ,

    1996-01-01

    The Duluth Complex and associated subvolcanic intrusions comprise a large (5000 km2) intrusive complex in northeastern Minnesota that was emplaced into comagmatic volcanics during the development of the 1.1 Ga Midcontinent rift in North America. In addition to anorthositic and felsic intrusions, the Duluth Complex is composed of many individual mafic layered intrusions of tholeiitic affinity. The cumulate stratigraphies and cryptic variations of six of the better exposed and better studied intrusions are described here to demonstrate the variability in their cumulus mineral paragenesis.

  2. A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    NASA Astrophysics Data System (ADS)

    Phit, Thyda; Abe, Kôki

    We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that our system can detect typical attacks within a reasonable amount of delay time.

  3. Improved image of intrusive bodies at Newberry Volcano, Oregon, based on 3D gravity modelling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bonneville, Alain H.; Cladouhos, Trenton; Rose, Kelly K.

    Beneath Newberry Volcano is one of the largest geothermal heat reservoirs in the western United States and it has been extensively studied for the last 40 years. Several magmatic intrusions have been recognized at depths between 2.5 and 8 km and some of them identified as suitable targets for enhanced geothermal energy and tested during two previous EGS campaigns. These subsurface structures have been intersected by three deep wells and imaged by various geophysical methods including seismic tomography and magnetotellurics. Although three high quality gravity surveys were completed between 2006 and 2010 as part of various projects, a complete synthesismore » and interpretation of the gravity data has not yet been performed. Regional gravity data also exist in the vicinity of the Newberry volcano and have been added to these surveys to constitute a dataset with a total of 1418 gravity measurements. When coupled with existing geologic and geophysical data and models, this new gravity dataset provides important constraints on the depth and contours of the magmatic bodies previously identified by other methods and thus greatly contributing to facilitate any future drilling and stimulation works. Using the initial structures discovered by seismic tomography, inversion of gravity data has been performed. Shape, density values and depths of various bodies were allowed to vary and three main bodies have been identified. Densities of the middle and lower intrusive bodies (~2.6-2.7 g/cm3) are consistent with rhyolite, basalt or granites. Modeled density of the near-surface caldera body match that of a low density tephra material and the density of the shallow ring structures contained in the upper kilometer correspond to that of welded tuff or low-density rhyolites. Modeled bodies are in reality a composite of thin layers; however, average densities of the modeled gravity bodies are in good agreement with the density log obtained in one well located on the western flank

  4. ANOMALY STRUCTURE OF SUPERGRAVITY AND ANOMALY CANCELLATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butter, Daniel; Gaillard, Mary K.

    2009-06-10

    We display the full anomaly structure of supergravity, including new D-term contributions to the conformal anomaly. This expression has the super-Weyl and chiral U(1){sub K} transformation properties that are required for implementation of the Green-Schwarz mechanism for anomaly cancellation. We outline the procedure for full anomaly cancellation. Our results have implications for effective supergravity theories from the weakly coupled heterotic string theory.

  5. Sulfide intrusion in the tropical seagrasses Thalassia testudinum and Syringodium filiforme

    NASA Astrophysics Data System (ADS)

    Holmer, Marianne; Pedersen, Ole; Krause-Jensen, Dorte; Olesen, Birgit; Hedegård Petersen, Malene; Schopmeyer, Stephanie; Koch, Marguerite; Lomstein, Bente Aa.; Jensen, Henning S.

    2009-11-01

    Sulfur and oxygen dynamics in the seagrasses Thalassia testudinum and Syringodium filiforme and their sediments were studied in the US Virgin Islands (USVI) in order to explore sulfide intrusion into tropical seagrasses. Four study sites were selected based on the iron concentration in sediments and on proximity to anthropogenic nutrient sources. Meadow characteristics (shoot density, above- and below-ground biomass, nutrient content) were sampled along with sediment biogeochemistry. Sulfide intrusion was high in T. testudinum, as up to 96% of total sulfur in the plant was derived from sediment-derived sulfides. The sulfide intrusion was negatively correlated to the turnover of sulfides in the sediments regulated by both plant parameters and sediment sulfur pools. Sediment iron content played an indirect role by affecting sulfide turnover rates. Leaf production was negatively correlated with sulfide intrusion suggesting that active growth reduced sulfide intrusion. Sulfide intrusion was lower in S. filiforme (up to 44%) compared to T. testudinum consistent with a higher internal nighttime oxygen concentrations found for S. filiforme. When S. filiforme can take advantage of its ability to maintain high internal oxygen concentrations, as was the case on the USVI, it could increase its success in colonizing unvegetated disturbed sediments with potentially high sulfide concentrations.

  6. Vapor Intrusion

    EPA Pesticide Factsheets

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  7. From intrusive to oscillating thoughts.

    PubMed

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  8. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability maymore » also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system« less

  9. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    PubMed

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  10. WISESight : a multispectral smart video-track intrusion monitor.

    DOT National Transportation Integrated Search

    2015-05-01

    International Electronic Machines : Corporation (IEM) developed, tested, and : validated a unique smart video-based : intrusion monitoring system for use at : highway-rail grade crossings. The system : used both thermal infrared (IR) and : visible/ne...

  11. Anomaly Detection and Life Pattern Estimation for the Elderly Based on Categorization of Accumulated Data

    NASA Astrophysics Data System (ADS)

    Mori, Taketoshi; Ishino, Takahito; Noguchi, Hiroshi; Shimosaka, Masamichi; Sato, Tomomasa

    2011-06-01

    We propose a life pattern estimation method and an anomaly detection method for elderly people living alone. In our observation system for such people, we deploy some pyroelectric sensors into the house and measure the person's activities all the time in order to grasp the person's life pattern. The data are transferred successively to the operation center and displayed to the nurses in the center in a precise way. Then, the nurses decide whether the data is the anomaly or not. In the system, the people whose features in their life resemble each other are categorized as the same group. Anomalies occurred in the past are shared in the group and utilized in the anomaly detection algorithm. This algorithm is based on "anomaly score." The "anomaly score" is figured out by utilizing the activeness of the person. This activeness is approximately proportional to the frequency of the sensor response in a minute. The "anomaly score" is calculated from the difference between the activeness in the present and the past one averaged in the long term. Thus, the score is positive if the activeness in the present is higher than the average in the past, and the score is negative if the value in the present is lower than the average. If the score exceeds a certain threshold, it means that an anomaly event occurs. Moreover, we developed an activity estimation algorithm. This algorithm estimates the residents' basic activities such as uprising, outing, and so on. The estimation is shown to the nurses with the "anomaly score" of the residents. The nurses can understand the residents' health conditions by combining these two information.

  12. Thutmose - Investigation of Machine Learning-Based Intrusion Detection Systems

    DTIC Science & Technology

    2016-06-01

    research is being done to incorporate the field of machine learning into intrusion detection. Machine learning is a branch of artificial intelligence (AI...adversarial drift." Proceedings of the 2013 ACM workshop on Artificial intelligence and security. ACM. (2013) Kantarcioglu, M., Xi, B., and Clifton, C. "A...34 Proceedings of the 4th ACM workshop on Security and artificial intelligence . ACM. (2011) Dua, S., and Du, X. Data Mining and Machine Learning in

  13. Automated Virtual Machine Introspection for Host-Based Intrusion Detection

    DTIC Science & Technology

    2009-03-01

    boxes represent the code and data sections of each process in memory with arrows representing hooks planted by malware to jump to the malware code...a useful indication of intrusion, it is also susceptible to mimicry and concurrency attacks [Pro03,Wat07]. Additionally, most research abstracts away...sequence of system calls that accomplishes his or her intent [WS02]. This “ mimicry attack” takes advantage of the fact that many HIDS discard the pa

  14. High Order Non-Stationary Markov Models and Anomaly Propagation Analysis in Intrusion Detection System (IDS)

    DTIC Science & Technology

    2007-02-01

    almost identical system call sequences and triggering the same alarm at different hosts. The alarm propagation effect can be used to distinguish “true...different hosts. The alarm propagation effect can be used to distinguish “true alarms” from “false positives”. At the host-level, a new anomaly...0H ( ) ( )∑∑ = = ⎟⎟ ⎠ ⎞ ⎜⎜ ⎝ ⎛ − + − = 2 1 1, 2 2 2 2 1 1 ),( ),(),()( ),( ),(),()( k m ji jiT jiTjiTiN jiT jiTjiTiNW where - marginal observed

  15. Anomalies.

    ERIC Educational Resources Information Center

    Online-Offline, 1999

    1999-01-01

    This theme issue on anomalies includes Web sites, CD-ROMs and software, videos, books, and additional resources for elementary and junior high school students. Pertinent activities are suggested, and sidebars discuss UFOs, animal anomalies, and anomalies from nature; and resources covering unexplained phenonmenas like crop circles, Easter Island,…

  16. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments

    PubMed Central

    Avalappampatty Sivasamy, Aneetha; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better. PMID:26357668

  17. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments.

    PubMed

    Sivasamy, Aneetha Avalappampatty; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T(2) method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T(2) statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.

  18. Comparison of U-spatial statistics and C-A fractal models for delineating anomaly patterns of porphyry-type Cu geochemical signatures in the Varzaghan district, NW Iran

    NASA Astrophysics Data System (ADS)

    Ghezelbash, Reza; Maghsoudi, Abbas

    2018-05-01

    The delineation of populations of stream sediment geochemical data is a crucial task in regional exploration surveys. In this contribution, uni-element stream sediment geochemical data of Cu, Au, Mo, and Bi have been subjected to two reliable anomaly-background separation methods, namely, the concentration-area (C-A) fractal and the U-spatial statistics methods to separate geochemical anomalies related to porphyry-type Cu mineralization in northwest Iran. The quantitative comparison of the delineated geochemical populations using the modified success-rate curves revealed the superiority of the U-spatial statistics method over the fractal model. Moreover, geochemical maps of investigated elements revealed strongly positive correlations between strong anomalies and Oligocene-Miocene intrusions in the study area. Therefore, follow-up exploration programs should focus on these areas.

  19. A system for distributed intrusion detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snapp, S.R.; Brentano, J.; Dias, G.V.

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of ourmore » present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.« less

  20. An Excel®-based visualization tool of 2-D soil gas concentration profiles in petroleum vapor intrusion

    PubMed Central

    Verginelli, Iason; Yao, Yijun; Suuberg, Eric M.

    2017-01-01

    In this study we present a petroleum vapor intrusion tool implemented in Microsoft® Excel® using Visual Basic for Applications (VBA) and integrated within a graphical interface. The latter helps users easily visualize two-dimensional soil gas concentration profiles and indoor concentrations as a function of site-specific conditions such as source strength and depth, biodegradation reaction rate constant, soil characteristics and building features. This tool is based on a two-dimensional explicit analytical model that combines steady-state diffusion-dominated vapor transport in a homogeneous soil with a piecewise first-order aerobic biodegradation model, in which rate is limited by oxygen availability. As recommended in the recently released United States Environmental Protection Agency's final Petroleum Vapor Intrusion guidance, a sensitivity analysis and a simplified Monte Carlo uncertainty analysis are also included in the spreadsheet. PMID:28163564

  1. An Excel®-based visualization tool of 2-D soil gas concentration profiles in petroleum vapor intrusion.

    PubMed

    Verginelli, Iason; Yao, Yijun; Suuberg, Eric M

    2016-01-01

    In this study we present a petroleum vapor intrusion tool implemented in Microsoft ® Excel ® using Visual Basic for Applications (VBA) and integrated within a graphical interface. The latter helps users easily visualize two-dimensional soil gas concentration profiles and indoor concentrations as a function of site-specific conditions such as source strength and depth, biodegradation reaction rate constant, soil characteristics and building features. This tool is based on a two-dimensional explicit analytical model that combines steady-state diffusion-dominated vapor transport in a homogeneous soil with a piecewise first-order aerobic biodegradation model, in which rate is limited by oxygen availability. As recommended in the recently released United States Environmental Protection Agency's final Petroleum Vapor Intrusion guidance, a sensitivity analysis and a simplified Monte Carlo uncertainty analysis are also included in the spreadsheet.

  2. Research on artificial neural network intrusion detection photochemistry based on the improved wavelet analysis and transformation

    NASA Astrophysics Data System (ADS)

    Li, Hong; Ding, Xue

    2017-03-01

    This paper combines wavelet analysis and wavelet transform theory with artificial neural network, through the pretreatment on point feature attributes before in intrusion detection, to make them suitable for improvement of wavelet neural network. The whole intrusion classification model gets the better adaptability, self-learning ability, greatly enhances the wavelet neural network for solving the problem of field detection invasion, reduces storage space, contributes to improve the performance of the constructed neural network, and reduces the training time. Finally the results of the KDDCup99 data set simulation experiment shows that, this method reduces the complexity of constructing wavelet neural network, but also ensures the accuracy of the intrusion classification.

  3. Non-Intrusive Impedance-Based Cable Tester

    NASA Technical Reports Server (NTRS)

    Medelius, Pedro J. (Inventor); Simpson, Howard J. (Inventor)

    1999-01-01

    A non-intrusive electrical cable tester determines the nature and location of a discontinuity in a cable through application of an oscillating signal to one end of the cable. The frequency of the oscillating signal is varied in increments until a minimum, close to zero voltage is measured at a signal injection point which is indicative of a minimum impedance at that point. The frequency of the test signal at which the minimum impedance occurs is then employed to determine the distance to the discontinuity by employing a formula which relates this distance to the signal frequency and the velocity factor of the cable. A numerically controlled oscillator is provided to generate the oscillating signal, and a microcontroller automatically controls operation of the cable tester to make the desired measurements and display the results. The device is contained in a portable housing which may be hand held to facilitate convenient use of the device in difficult to access locations.

  4. Water Intrusion Problems in Transit Tunnels

    DOT National Transportation Integrated Search

    1986-05-01

    This report presents the findings of five case studies in which an in-depth analysis was made of tunnel water intrusion problems in transit tunnels. Water intrusion parameters of transit systems in Atlanta, Boston, Buffalo, New York and Washington, D...

  5. Fronts and intrusions in the upper Deep Polar Water of the Eurasian and Makarov basins

    NASA Astrophysics Data System (ADS)

    Kuzmina, Natalia; Rudels, Bert; Zhurbas, Natalia; Lyzhkov, Dmitry

    2013-04-01

    CTD data obtained in the Arctic Basin are analyzed to describe structural features of intrusive layers and fronts encountered in the upper Deep Polar Water. This work is an extension of Arctic intrusions studies by Rudels et al. (1999) and Kuzmina et al. (2011). Numerous examples of fronts and intrusions observed in a deep layer (depth range of 600-1300 m) in the Eurasian and Makarov basins where salinity is increasing, and temperature is decreasing with depth (stable-stable thermohaline stratification), are described. The data are used to estimate hydrological parameters capable of determining different types of fronts and characterizing intrusive layers depending on the front structure. Coherence of intrusive layers is shown to get broken with the change of front structure. An evidence is found that enhanced turbulent mixing above local bottom elevations can prevent from intrusive layering. A linear stability model description of the observed intrusions is developed based on the Merryfield's (2000) assumption that interleaving is caused by differential mixing. Theoretical analysis is focused on prediction of the slopes of unstable modes at baroclinic and thermohaline fronts. Apparent vertical diffusivity due to turbulent mixing at baroclinic and thermohaline fronts is estimated on the basis of comparison of observed intrusion slopes with modeled slopes of the most unstable modes. Apparent lateral diffusivity is estimated too, based on Joyce (1980) approach. These estimates show that intrusive instability of fronts caused by differential mixing can result in sizable values of apparent lateral heat diffusivity in the deep Arctic layer that are quite comparable with those of the upper and intermediate Arctic layers (Walsh, Carmack, 2003; Kuzmina et al., 2011).

  6. A hyperspectral imagery anomaly detection algorithm based on local three-dimensional orthogonal subspace projection

    NASA Astrophysics Data System (ADS)

    Zhang, Xing; Wen, Gongjian

    2015-10-01

    Anomaly detection (AD) becomes increasingly important in hyperspectral imagery analysis with many practical applications. Local orthogonal subspace projection (LOSP) detector is a popular anomaly detector which exploits local endmembers/eigenvectors around the pixel under test (PUT) to construct background subspace. However, this subspace only takes advantage of the spectral information, but the spatial correlat ion of the background clutter is neglected, which leads to the anomaly detection result sensitive to the accuracy of the estimated subspace. In this paper, a local three dimensional orthogonal subspace projection (3D-LOSP) algorithm is proposed. Firstly, under the jointly use of both spectral and spatial information, three directional background subspaces are created along the image height direction, the image width direction and the spectral direction, respectively. Then, the three corresponding orthogonal subspaces are calculated. After that, each vector along three direction of the local cube is projected onto the corresponding orthogonal subspace. Finally, a composite score is given through the three direction operators. In 3D-LOSP, the anomalies are redefined as the target not only spectrally different to the background, but also spatially distinct. Thanks to the addition of the spatial information, the robustness of the anomaly detection result has been improved greatly by the proposed 3D-LOSP algorithm. It is noteworthy that the proposed algorithm is an expansion of LOSP and this ideology can inspire many other spectral-based anomaly detection methods. Experiments with real hyperspectral images have proved the stability of the detection result.

  7. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT.

    PubMed

    Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime

    2017-08-26

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.

  8. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT

    PubMed Central

    Carro, Belen; Sanchez-Esguevillas, Antonio

    2017-01-01

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host’s network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery. PMID:28846608

  9. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

    PubMed Central

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-01-01

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu–Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors. PMID:23529146

  10. A distributed signature detection method for detecting intrusions in sensor systems.

    PubMed

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-03-25

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

  11. New Non-Intrusive Inspection Technologies for Nuclear Security and Nonproliferation

    NASA Astrophysics Data System (ADS)

    Ledoux, Robert J.

    2015-10-01

    Comprehensive monitoring of the supply chain for nuclear materials has historically been hampered by non-intrusive inspection systems that have such large false alarm rates that they are impractical in the flow of commerce. Passport Systems, Inc. (Passport) has developed an active interrogation system which detects fissionable material, high Z material, and other contraband in land, sea and air cargo. Passport's design utilizes several detection modalities including high resolution imaging, passive radiation detection, effective-Z (EZ-3D™) anomaly detection, Prompt Neutrons from Photofission (PNPF), and Nuclear Resonance Fluorescence (NRF) isotopic identification. These technologies combine to: detect fissionable, high-Z, radioactive and contraband materials, differentiate fissionable materials from high-Z shielding materials, and isotopically identify actinides, Special Nuclear Materials (SNM), and other contraband (e.g. explosives, drugs, nerve agents). Passport's system generates a 3-D image of the scanned object which contains information such as effective-Z and density, as well as a 2-D image and isotopic and fissionable information for regions of interest.

  12. Geological and geographical investigations of an Apollo 9 photo anomaly near Point of Pines, Arizona

    USGS Publications Warehouse

    Bromfield, Calvin S.; Eaton, G.P.; Peterson, D.L.; Ratte, J.C.

    1972-01-01

    An infrared photograph of southeastern Arizona, taken during the Apollo 9 multispectral terrain photography experiment in 1969, reveals a ringlike feature, some 3-4 miles (5-6 kin) in diameter, on the Natanes Plateau, 35 miles (56 kin) north of the town of Safford. Because the feature occurs in an area of nearly flat lying Tertiary volcanic rocks, the possibilities of its being a small collapse caldera or an exposed circular intrusive body were considered. Geological and geophysical studies of the area were made to test these hypotheses. The local stratigraphic section consists of approximately 1,500 feet (457 m) of Oligocene and perhaps older volcanic rocks, resting on a moderately irregular basement surface carved from nearly flat lying trending Basin-and-Range faults define a broad horst within which two arcuate cross faults, with 300-600 feet (91-183 m) of displacement, bound a downdropped area. Deep erosion along these faults has created a polygonal network of canyons which constitutes the 'ring' seen on the photograph. A mild arching of the volcanic rocks within the ring is suggested by structure contours on the base of the youngest flows. A sharp 350-gamma positive aeromagnetic anomaly is centered within the ring. In its southwest quadrant the anomaly has an elongate extension that trends northwest along an adjoining Basin-and-Range fault. Associated with both is a subtle gravity low. The geophysical data thus suggest the presence of a small blind silicic pluton, possibly of middle Tertiary or younger age. Although it can be argued that the arcuate faults and mild arching of the volcanic pile are related to this postulated pluton, no evidence of hydrothermal alteration or thermal metamorphism of the country rocks was seen. Thus if a pluton is present and of postvolcanic age, it must have been emplaced as a relatively cool dry body; or alternatively, it is older than the surface volcanic rocks. In either instance, its magnetic expression contrasts with that

  13. Rapid laccolith intrusion driven by explosive volcanic eruption

    NASA Astrophysics Data System (ADS)

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-11-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ~0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ~20-200 m and overpressures (~1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  14. Rapid laccolith intrusion driven by explosive volcanic eruption.

    PubMed

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  15. DeepAnomaly: Combining Background Subtraction and Deep Learning for Detecting Obstacles and Anomalies in an Agricultural Field.

    PubMed

    Christiansen, Peter; Nielsen, Lars N; Steen, Kim A; Jørgensen, Rasmus N; Karstoft, Henrik

    2016-11-11

    Convolutional neural network (CNN)-based systems are increasingly used in autonomous vehicles for detecting obstacles. CNN-based object detection and per-pixel classification (semantic segmentation) algorithms are trained for detecting and classifying a predefined set of object types. These algorithms have difficulties in detecting distant and heavily occluded objects and are, by definition, not capable of detecting unknown object types or unusual scenarios. The visual characteristics of an agriculture field is homogeneous, and obstacles, like people, animals and other obstacles, occur rarely and are of distinct appearance compared to the field. This paper introduces DeepAnomaly, an algorithm combining deep learning and anomaly detection to exploit the homogenous characteristics of a field to perform anomaly detection. We demonstrate DeepAnomaly as a fast state-of-the-art detector for obstacles that are distant, heavily occluded and unknown. DeepAnomaly is compared to state-of-the-art obstacle detectors including "Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks" (RCNN). In a human detector test case, we demonstrate that DeepAnomaly detects humans at longer ranges (45-90 m) than RCNN. RCNN has a similar performance at a short range (0-30 m). However, DeepAnomaly has much fewer model parameters and (182 ms/25 ms =) a 7.28-times faster processing time per image. Unlike most CNN-based methods, the high accuracy, the low computation time and the low memory footprint make it suitable for a real-time system running on a embedded GPU (Graphics Processing Unit).

  16. DeepAnomaly: Combining Background Subtraction and Deep Learning for Detecting Obstacles and Anomalies in an Agricultural Field

    PubMed Central

    Christiansen, Peter; Nielsen, Lars N.; Steen, Kim A.; Jørgensen, Rasmus N.; Karstoft, Henrik

    2016-01-01

    Convolutional neural network (CNN)-based systems are increasingly used in autonomous vehicles for detecting obstacles. CNN-based object detection and per-pixel classification (semantic segmentation) algorithms are trained for detecting and classifying a predefined set of object types. These algorithms have difficulties in detecting distant and heavily occluded objects and are, by definition, not capable of detecting unknown object types or unusual scenarios. The visual characteristics of an agriculture field is homogeneous, and obstacles, like people, animals and other obstacles, occur rarely and are of distinct appearance compared to the field. This paper introduces DeepAnomaly, an algorithm combining deep learning and anomaly detection to exploit the homogenous characteristics of a field to perform anomaly detection. We demonstrate DeepAnomaly as a fast state-of-the-art detector for obstacles that are distant, heavily occluded and unknown. DeepAnomaly is compared to state-of-the-art obstacle detectors including “Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks” (RCNN). In a human detector test case, we demonstrate that DeepAnomaly detects humans at longer ranges (45–90 m) than RCNN. RCNN has a similar performance at a short range (0–30 m). However, DeepAnomaly has much fewer model parameters and (182 ms/25 ms =) a 7.28-times faster processing time per image. Unlike most CNN-based methods, the high accuracy, the low computation time and the low memory footprint make it suitable for a real-time system running on a embedded GPU (Graphics Processing Unit). PMID:27845717

  17. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    PubMed Central

    Alcalá, José M.; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-01-01

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented. PMID:28208672

  18. A research using hybrid RBF/Elman neural networks for intrusion detection system secure model

    NASA Astrophysics Data System (ADS)

    Tong, Xiaojun; Wang, Zhu; Yu, Haining

    2009-10-01

    A hybrid RBF/Elman neural network model that can be employed for both anomaly detection and misuse detection is presented in this paper. The IDSs using the hybrid neural network can detect temporally dispersed and collaborative attacks effectively because of its memory of past events. The RBF network is employed as a real-time pattern classification and the Elman network is employed to restore the memory of past events. The IDSs using the hybrid neural network are evaluated against the intrusion detection evaluation data sponsored by U.S. Defense Advanced Research Projects Agency (DARPA). Experimental results are presented in ROC curves. Experiments show that the IDSs using this hybrid neural network improve the detection rate and decrease the false positive rate effectively.

  19. Conditional anomaly detection methods for patient–management alert systems

    PubMed Central

    Valko, Michal; Cooper, Gregory; Seybert, Amy; Visweswaran, Shyam; Saul, Melissa; Hauskrecht, Milos

    2010-01-01

    Anomaly detection methods can be very useful in identifying unusual or interesting patterns in data. A recently proposed conditional anomaly detection framework extends anomaly detection to the problem of identifying anomalous patterns on a subset of attributes in the data. The anomaly always depends (is conditioned) on the value of remaining attributes. The work presented in this paper focuses on instance–based methods for detecting conditional anomalies. The methods rely on the distance metric to identify examples in the dataset that are most critical for detecting the anomaly. We investigate various metrics and metric learning methods to optimize the performance of the instance–based anomaly detection methods. We show the benefits of the instance–based methods on two real–world detection problems: detection of unusual admission decisions for patients with the community–acquired pneumonia and detection of unusual orders of an HPF4 test that is used to confirm Heparin induced thrombocytopenia — a life–threatening condition caused by the Heparin therapy. PMID:25392850

  20. Imprint of Southern Red Sea Major Tectonic Zone In A New Bouguer Anomaly Map of Southern Yemen Margin

    NASA Astrophysics Data System (ADS)

    Blecha, V.

    A new Bouguer anomaly map of western part of southern Yemen margin has been compiled. Densities of rock samples from main geological units (Precambrian base- ment, Mesozoic sediments, Tertiary volcanites) have been measured and used for grav- ity modeling. Regional gravity map indicates decrease of thickness of continental crust from volcanites of the Yemen Trap Series towards the coast of the Gulf of Aden. Most remarkable feature in the map of residual anomalies is a positive anomaly over the Dhala graben. The Dhala graben is a prominent geological structure in the area of study trending parallel to the Red Sea axis. Gravity modeling on a profile across the Dhala graben presumes intrusive plutonic rocks beneath the graben. There are two other areas in the southwestern tip of Arabia, which have essentially the same struc- tural position as the Dhala graben: the Jabal Tirf volcanic rift zone in the southern Saudi Arabia and Jabal Hufash extensional zone in northern Yemen. All three areas extend along the line trending parallel to the Red Sea axis with length of about 500 km. The line coincides with the axis of Afar (Danakil) depression after Arabia is shifted and rotated back to Africa. These facts imply conclusion that the Oligocene - Early Miocene magmatic activity on the Jabal Tirf - Dhala lineament is related to the same original deep tectonic zone, forming present-day Afar depression and still active.

  1. Analyses on Origin of positive gravity anomalies of sedimentary basins of the Ross Sea

    NASA Astrophysics Data System (ADS)

    Gao, Jinyao; Yang, Chunguo; Ji, Fei; Wang, Wei; Shen, Zhongyan

    2017-04-01

    We have adopted gridded products describing surface elevation, ice-thickness and the sea floor and subglacial bed elevation south of 60◦ S from Bedmap2 and north of 60◦ S from JGP95E to calculate Bouguer and isostatic gravity anomaly of the Ross Sea region based on the DTU10 free-air gravity anomaly.Taking a view of the free-air, Bouguer and isostatic gravity anomalies, it is unusual that high values overlay the Victoria Land Basin, Central Trough, Northern Basin and Northern Central Trough while basement highs are associated with low value. A number of studies have attributed the high gravity anomalies across the depocenters to high-density volcanics deep within the basins or magmatic intrusions within the region of the thinned crust or upper mantle (e. g., Edwards et al., 1987). According to the conclusion from Karner et al. (2005), the anticorrelation of gravity anomalies with sediment basement can be reproduced if the flexural strength of the lithosphere during the late Cretaceous rifting is significantly lower than the flexural strength of the lithosphere at the Oligocene and Neogene time of sedimentation. We note that the isostatic gravity anomalies are higher than the free-air gravity anomalies adjacent to the Transantarctic Mountains, and vice versa away from the Transantarctic Mountains. We may ignore the constraints offered by the tranditional isostasy in the local gravity studies of the Ross Sea basins, especially advancing the concept of high density material in the lower crust or upper mantle. In particular, the modeled gravity does not laterally integrate to zero, due to the existence of unbalanced forces induced by mantle. Along the outer shelf uplift zone surrouding Antarctica, the positive gravity belt has higher values in free-air gravity anomalies than those in isostatic gravity anomalies. Meanwhile, the positive gravity belt of isostatic gravity anomalies almost disappears in the background anomalies of 20 mGal to 10 mGal facing the

  2. A new physical barrier system for seawater intrusion control

    NASA Astrophysics Data System (ADS)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  3. Bangui Anomaly

    NASA Technical Reports Server (NTRS)

    Taylor, Patrick T.

    2004-01-01

    Bangui anomaly is the name given to one of the Earth s largest crustal magnetic anomalies and the largest over the African continent. It covers two-thirds of the Central African Republic and therefore the name derives from the capitol city-Bangui that is also near the center of this feature. From surface magnetic survey data Godivier and Le Donche (1962) were the first to describe this anomaly. Subsequently high-altitude world magnetic surveying by the U.S. Naval Oceanographic Office (Project Magnet) recorded a greater than 1000 nT dipolar, peak-to-trough anomaly with the major portion being negative (figure 1). Satellite observations (Cosmos 49) were first reported in 1964, these revealed a 40nT anomaly at 350 km altitude. Subsequently the higher altitude (417-499km) POGO (Polar Orbiting Geomagnetic Observatory) satellite data recorded peak-to-trough anomalies of 20 nT these data were added to Cosmos 49 measurements by Regan et al. (1975) for a regional satellite altitude map. In October 1979, with the launch of Magsat, a satellite designed to measure crustal magnetic anomalies, a more uniform satellite altitude magnetic map was obtained. These data, computed at 375 km altitude recorded a -22 nT anomaly (figure 2). This elliptically shaped anomaly is approximately 760 by 1000 km and is centered at 6%, 18%. The Bangui anomaly is composed of three segments; there are two positive anomalies lobes north and south of a large central negative field. This displays the classic pattern of a magnetic anomalous body being magnetized by induction in a zero inclination field. This is not surprising since the magnetic equator passes near the center of this body.

  4. Identification of large geomorphological anomalies based on 2D discrete wavelet transform

    NASA Astrophysics Data System (ADS)

    Doglioni, A.; Simeone, V.

    2012-04-01

    The identification and analysis based on quantitative evidences of large geomorphological anomalies is an important stage for the study of large landslides. Numerical geomorphic analyses represent an interesting approach to this kind of studies, allowing for a detailed and pretty accurate identification of hidden topographic anomalies that may be related to large landslides. Here a geomorphic numerical analyses of the Digital Terrain Model (DTM) is presented. The introduced approach is based on 2D discrete wavelet transform (Antoine et al., 2003; Bruun and Nilsen, 2003, Booth et al., 2009). The 2D wavelet decomposition of the DTM, and in particular the analysis of the detail coefficients of the wavelet transform can provide evidences of anomalies or singularities, i.e. discontinuities of the land surface. These discontinuities are not very evident from the DTM as it is, while 2D wavelet transform allows for grid-based analysis of DTM and for mapping the decomposition. In fact, the grid-based DTM can be assumed as a matrix, where a discrete wavelet transform (Daubechies, 1992) is performed columnwise and linewise, which basically represent horizontal and vertical directions. The outcomes of this analysis are low-frequency approximation coefficients and high-frequency detail coefficients. Detail coefficients are analyzed, since their variations are associated to discontinuities of the DTM. Detailed coefficients are estimated assuming to perform 2D wavelet transform both for the horizontal direction (east-west) and for the vertical direction (north-south). Detail coefficients are then mapped for both the cases, thus allowing to visualize and quantify potential anomalies of the land surface. Moreover, wavelet decomposition can be pushed to further levels, assuming a higher scale number of the transform. This may potentially return further interesting results, in terms of identification of the anomalies of land surface. In this kind of approach, the choice of a proper

  5. Young women's experiences of intrusive behavior in 12 countries.

    PubMed

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  6. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    PubMed

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  7. A new interpretation of the structure of the Sept Iles Intrusive suite, Canada

    NASA Astrophysics Data System (ADS)

    Higgins, Michael D.

    2005-08-01

    The layered mafic intrusion at Sept Iles, Canada, is one of the largest intrusions in the world. A new interpretation of its structure is proposed, based on a review of its geology and a comparison with the Skaergaard intrusion, Greenland. Several different magmatic components are recognized; hence the name Sept Iles Intrusive suite (SIIS) is proposed. Emplacement of the suite may have been preceded by eruption of flood basalts. The first magmas of the suite rose in the crust to accumulate beneath the density filter afforded by the basalts. The largest component is the Sept Iles Mafic intrusion (SIMI). The Lower series of the SIMI is dominated by leucotroctolites and leucogabbros. Above it lie the Layered series, which is largely comprised of gabbro and troctolite. Both these units are unchanged from earlier interpretations. The anorthosites (s.l.), gabbros and monzogabbros, formerly called the Transitional series, are now considered to be the Upper Border series, developed by floatation of plagioclase. Common autoliths in the Layered series are parts of the hydrothermally altered Upper Border series from towards the interior of the intrusion, which have foundered and settled through the magma. The contamination of the magma that accompanied this event oxidised iron in the magma and led to the precipitation of magnetite around the periphery of the intrusion. The subsequent depletion of Fe 3+ and/or increase in SiO 2, CaO and P 2O 5 may have induced apatite saturation and accumulation to form two layers rich in apatite, near the base and at top of the Layered series. Granitic magma was developed by fractional crystallisation and was emplaced along the roof of the chamber, where it acquired large quantities of xenoliths. These were probably derived from the flood basalts, their evolved members and fragments of mafic dykes chilled by the granitic magma. Accumulations of monzonite pillows in this unit testify to another magmatic event and a floor to the granitic magma

  8. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    NASA Astrophysics Data System (ADS)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  9. Rapid laccolith intrusion driven by explosive volcanic eruption

    PubMed Central

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-01-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ∼20–200 m and overpressures (∼1–10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards. PMID:27876800

  10. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  11. Effects of intrusions on grades and contents of gold and other metals in volcanogenic massive sulfide deposits

    USGS Publications Warehouse

    Singer, Donald A.; Berger, Vladimir; Mosier, Dan L.

    2011-01-01

    The reason some VMS deposits contain more gold or other metals than others might be due to the influence of intrusions. A new approach examining this possibility is based on examining the information about many VMS deposits to test statistically if those with associated intrusions have significantly different grades or amounts of metals. A set of 632 VMS deposits with reported grades, tonnages, and information about the observed presence or absence of subvolcanic or plutonic intrusive bodies emplaced at or after VMS mineralization is statistically analyzed.Deposits with syn-mineralization or post-mineralization intrusions nearby have higher tonnages than deposits without reported intrusions, but the differences are not statistically significant. When both kinds of intrusions are reported, VMS deposit sizes are significantly higher than in the deposits without any intrusions. Gold, silver, zinc, lead, and copper average grades are not significantly different in the VMS deposits with nearby intrusions compared to deposits without regardless of relative age of intrusive. Only zinc and copper contents are significantly higher in VMS deposits with both kinds of intrusive reported. These differences in overall metal content are due to significantly larger deposit sizes of VMS deposits where both intrusive kinds are observed and reported, rather than any difference in metal grades.

  12. Use of behavioral biometrics in intrusion detection and online gaming

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  13. Data based abnormality detection

    NASA Astrophysics Data System (ADS)

    Purwar, Yashasvi

    Data based abnormality detection is a growing research field focussed on extracting information from feature rich data. They are considered to be non-intrusive and non-destructive in nature which gives them a clear advantage over conventional methods. In this study, we explore different streams of data based anomalies detection. We propose extension and revisions to existing valve stiction detection algorithm supported with industrial case study. We also explored the area of image analysis and proposed a complete solution for Malaria diagnosis. The proposed method is tested over images provided by pathology laboratory at Alberta Health Service. We also address the robustness and practicality of the solution proposed.

  14. Natural tooth intrusion and reversal in implant-assisted prosthesis: evidence of and a hypothesis for the occurrence.

    PubMed

    Sheets, C G; Earthmann, J C

    1993-12-01

    Based on clinical observation, a hypothesis of the mechanism of intrusion of natural teeth in an implant-assisted prosthesis is suggested. Engineering principles are presented that establish an energy absorption model as it relates to the implant-assisted prosthesis. In addition, in the course of patient treatment it has been discovered that the intrusion of natural teeth can be reversed. Patient histories that demonstrate intrusion reversal are reviewed. The possible mechanisms for the intrusion/reversal phenomenon are presented and preventative recommendations are given.

  15. Study of Thermal Anomalies at Cotopaxi Volcano, 2002 to 2005

    NASA Astrophysics Data System (ADS)

    Rivero, D. R.; Beate, B.; Troncoso, L.; Ramón, P.

    2007-05-01

    The Instituto Geofisico of the Escuela Politecnica Nacional (IG-EPN) has maintained continuous monitoring since 1977, allowing a better understanding of the volcano's baseline activity. Preliminary signs observed since 2001 of a possible reactivation of this volcano after more than a century of repose, prompted a comprehensive seismological study and implementation of new methods of monitoring, based mainly upon a general increase in seismic activity (VT and LP); appearance of new types of seismic signals never observed before (hybrids, "tornillos", big LP, and tremor); an increase in the fumaroles' number and discharge, as well as a marked thermal anomaly in the summit region. Seismic activity reached its peak in late 2001 / early 2002 and was correlated with enhanced degassing from the crater, with vapor columns reaching some meters above the crater level with abundant SO2 perceived. In this abstract we show evidence of the existence of a magmatic intrusion (Troncoso, 2005), that has disturbed the hydrothermal system present in the cone and it is melting the glacier. This has generated local population and civil defense concern. Since this stage of activity, Cotopaxi has not yet returned to its baseline level, therefore the newly implemented technology includes periodic over flights with a FLIR camera, which permits localization and identification of thermal anomalies. Additionally, a telemetric video camera has been deployed in the northwest rim of the crater to identify degassing changes and its relationship with seismic events. Finally, the IG-EPN staff perform continuous visits to the crater to observe changes IN the ice-cap, measure temperatures and verify the presence of magmatic gases.

  16. Complete Bouguer gravity anomaly map of the state of Colorado

    USGS Publications Warehouse

    Abrams, Gerda A.

    1993-01-01

    The Bouguer gravity anomaly map is part of a folio of maps of Colorado cosponsored by the National Mineral Resources Assessment Program (NAMRAP) and the National Geologic Mapping Program (COGEOMAP) and was produced to assist in studies of the mineral resource potential and tectonic setting of the State. Previous compilations of about 12,000 gravity stations by Behrendt and Bajwa (1974a,b) are updated by this map. The data was reduced at a 2.67 g/cm3 and the grid contoured at 3 mGal intervals. This map will aid in the mineral resource assessment by indicating buried intrusive complexes, volcanic fields, major faults and shear zones, and sedimentary basins; helping to identify concealed geologic units; and identifying localities that might be hydrothermically altered or mineralized.

  17. Vapor Intrusion Characterization Report (Revision 1.0)

    EPA Pesticide Factsheets

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  18. Intrusive Memories of Distressing Information: An fMRI Study

    PubMed Central

    Battaglini, Eva; Liddell, Belinda; Das, Pritha; Malhi, Gin; Felmingham, Kim

    2016-01-01

    Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI) to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42) viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13) demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13). Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC) and dorsolateral prefrontal cortex (dlPFC), inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories. PMID:27685784

  19. Accounting for intrusive thoughts in PTSD: Contributions of cognitive control and deliberate regulation strategies.

    PubMed

    Bomyea, Jessica; Lang, Ariel J

    2016-03-01

    Persistent, trauma-related intrusive thoughts are common in individuals with posttraumatic stress disorder (PTSD). Automatic aspects of cognitive functioning (including executive functioning) and maladaptive deliberate attempts at cognitive regulation have been proposed as individual difference factors that may perpetuate intrusive thoughts. The current study sought to examine the joint contribution of these two factors on intrusive thoughts in PTSD. Forty-two women with PTSD completed an executive functioning assessment followed by a thought suppression task. Intrusive thoughts (frequency and duration), as well as participants' use of specific cognitive regulation strategies (avoidance-based thought regulation strategies; TRS), were measured during the task. Hierarchical linear regression was used to examine the interaction of executive functioning and TRS on intrusive thoughts. Greater use of TRS was associated with greater intrusive thought persistence for those with low executive functioning, but not those with high executive functioning. Data was collected cross-sectionally and the laboratory thought suppression task may not correspond to naturalistic thought regulation. Results are consistent with prior literature suggesting that certain responses deployed by individuals to control intrusive thoughts may be unhelpful, but that a higher level of cognitive capacity may mitigate this effect. Implications of these findings for recent models of cognition in PTSD are discussed. Published by Elsevier B.V.

  20. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid

    PubMed Central

    Li, Yuancheng; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can’t satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy. PMID:29485990

  1. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

    PubMed

    Li, Yuancheng; Qiu, Rixuan; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  2. Assessment of groundwater vulnerability to anthropogenic pollution and seawater intrusion in a small tropical island using index-based methods.

    PubMed

    Kura, Nura Umar; Ramli, Mohammad Firuz; Ibrahim, Shaharin; Sulaiman, Wan Nor Azmin; Aris, Ahmad Zaharin; Tanko, Adamu Idris; Zaudi, Muhammad Amar

    2015-01-01

    In this work, the DRASTIC and GALDIT models were employed to determine the groundwater vulnerability to contamination from anthropogenic activities and seawater intrusion in Kapas Island. In addition, the work also utilized sensitivity analysis to evaluate the influence of each individual parameter used in developing the final models. Based on these effects and variation indices of the said parameters, new effective weights were determined and were used to create modified DRASTIC and GALDIT models. The final DRASTIC model classified the island into five vulnerability classes: no risk (110-140), low (140-160), moderate (160-180), high (180-200), and very high (>200), covering 4, 26, 59, 4, and 7 % of the island, respectively. Likewise, for seawater intrusion, the modified GALDIT model delineates the island into four vulnerability classes: very low (<90), low (90-110), moderate (110-130), and high (>130) covering 39, 33, 18, and 9 % of the island, respectively. Both models show that the areas that are likely to be affected by anthropogenic pollution and seawater intrusion are within the alluvial deposit at the western part of the island. Pearson correlation was used to verify the reliability of the two models in predicting their respective contaminants. The correlation matrix showed a good relationship between DRASTIC model and nitrate (r = 0.58). In a similar development, the correlation also reveals a very strong negative relationship between GALDIT model and seawater contaminant indicator (resistivity Ωm) values (r = -0.86) suggesting that the model predicts more than 86 % of seawater intrusion. In order to facilitate management strategy, suitable areas for artificial recharge were identified through modeling. The result suggested some areas within the alluvial deposit at the western part of the island as suitable for artificial recharge. This work can serve as a guide for a full vulnerability assessment to anthropogenic pollution and seawater intrusion

  3. Road Anomalies Detection System Evaluation.

    PubMed

    Silva, Nuno; Shah, Vaibhav; Soares, João; Rodrigues, Helena

    2018-06-21

    Anomalies on road pavement cause discomfort to drivers and passengers, and may cause mechanical failure or even accidents. Governments spend millions of Euros every year on road maintenance, often causing traffic jams and congestion on urban roads on a daily basis. This paper analyses the difference between the deployment of a road anomalies detection and identification system in a “conditioned” and a real world setup, where the system performed worse compared to the “conditioned” setup. It also presents a system performance analysis based on the analysis of the training data sets; on the analysis of the attributes complexity, through the application of PCA techniques; and on the analysis of the attributes in the context of each anomaly type, using acceleration standard deviation attributes to observe how different anomalies classes are distributed in the Cartesian coordinates system. Overall, in this paper, we describe the main insights on road anomalies detection challenges to support the design and deployment of a new iteration of our system towards the deployment of a road anomaly detection service to provide information about roads condition to drivers and government entities.

  4. Sill intrusion in volcanic calderas: implications for vent opening probability

    NASA Astrophysics Data System (ADS)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  5. Development and Application of a Three-Dimensional Finite Element Vapor Intrusion Model

    PubMed Central

    Pennell, Kelly G.; Bozkurt, Ozgur; Suuberg, Eric M.

    2010-01-01

    Details of a three-dimensional finite element model of soil vapor intrusion, including the overall modeling process and the stepwise approach, are provided. The model is a quantitative modeling tool that can help guide vapor intrusion characterization efforts. It solves the soil gas continuity equation coupled with the chemical transport equation, allowing for both advective and diffusive transport. Three-dimensional pressure, velocity, and chemical concentration fields are produced from the model. Results from simulations involving common site features, such as impervious surfaces, porous foundation sub-base material, and adjacent structures are summarized herein. The results suggest that site-specific features are important to consider when characterizing vapor intrusion risks. More importantly, the results suggest that soil gas or subslab gas samples taken without proper regard for particular site features may not be suitable for evaluating vapor intrusion risks; rather, careful attention needs to be given to the many factors that affect chemical transport into and around buildings. PMID:19418819

  6. Rapid fluid disruption: A source for self-potential anomalies on volcanoes

    USGS Publications Warehouse

    Johnston, M.J.S.; Byerlee, J.D.; Lockner, D.

    2001-01-01

    Self-potential (SP) anomalies observed above suspected magma reservoirs, dikes, etc., on various volcanoes (Kilauea, Hawaii; Mount Unzen, Japan; Piton de la Fournaise, Reunion Island, Miyake Jima, Japan) result from transient surface electric fields of tens of millivolts per kilometer and generally have a positive polarity. These SP anomalies are usually attributed to electrokinetic effects where properties controlling this process are poorly constrained. We propose an alternate explanation that contributions to electric fields of correct polarity should be expected from charge generation by fluid vaporization/disruption. As liquids are vaporized or removed as droplets by gas transport away from hot dike intrusions, both charge generation and local increase in electrical resistivity by removal of fluids should occur. We report laboratory observations of electric fields in hot rock samples generated by pulses of fluid (water) through the rock at atmospheric pressure. These indicate the relative amplitudes of rapid fluid disruption (RFD) potentials and electrokinetic potentials to be dramatically different and the signals are opposite in sign. Above vaporization temperatures, RFD effects of positive sign in the direction of gas flow dominate, whereas below these temperatures, effects of negative sign dominate. This suggests that the primary contribution to observed self-potential anomalies arises from gas-related charge transport processes at temperatures high enough to produce vigorous boiling and vapor transport. At lower temperatures, the primary contribution is from electrokinetic effects modulated perhaps by changing electrical resistivity and RFD effects from high-pressure but low-temperature CO2 and SO2 gas flow ripping water molecules from saturated crustal rocks. If charge generation is continuous, as could well occur above a newly emplaced dike, positive static potentials will be set up that could be sustained for many years, and the simplest method for

  7. Attenuating fearful memories: effect of cued extinction on intrusions.

    PubMed

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  8. Magmatic intrusions in the lunar crust

    NASA Astrophysics Data System (ADS)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  9. Hierarchical Kohonenen net for anomaly detection in network security.

    PubMed

    Sarasamma, Suseela T; Zhu, Qiuming A; Huff, Julie

    2005-04-01

    A novel multilevel hierarchical Kohonen Net (K-Map) for an intrusion detection system is presented. Each level of the hierarchical map is modeled as a simple winner-take-all K-Map. One significant advantage of this multilevel hierarchical K-Map is its computational efficiency. Unlike other statistical anomaly detection methods such as nearest neighbor approach, K-means clustering or probabilistic analysis that employ distance computation in the feature space to identify the outliers, our approach does not involve costly point-to-point computation in organizing the data into clusters. Another advantage is the reduced network size. We use the classification capability of the K-Map on selected dimensions of data set in detecting anomalies. Randomly selected subsets that contain both attacks and normal records from the KDD Cup 1999 benchmark data are used to train the hierarchical net. We use a confidence measure to label the clusters. Then we use the test set from the same KDD Cup 1999 benchmark to test the hierarchical net. We show that a hierarchical K-Map in which each layer operates on a small subset of the feature space is superior to a single-layer K-Map operating on the whole feature space in detecting a variety of attacks in terms of detection rate as well as false positive rate.

  10. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  11. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    PubMed Central

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression. PMID:27069381

  12. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    PubMed

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  13. The development of the July 1989 1 deg x 1 deg and 30' x 30' terrestrial mean free-air anomaly data bases

    NASA Technical Reports Server (NTRS)

    Kim, Jeong-Hee; Rapp, Richard H.

    1990-01-01

    In June 1986 a 1 x 1 deg/mean free-air anomaly data file containing 48955 anomalies was completed. In August 1986 a 30 x 30 min mean free-air anomaly file was defined containing 31787 values. For the past three years data has been collected to upgrade these mean anomaly files. The primary emphasis was the collection of data to be used for the estimation of 30 min means anomalies in land areas. The emphasis on land areas was due to the anticipated use of 30 min anomalies derived from satellite altimeter data in the ocean areas. There were 10 data sources in the August 1986 file. Twenty-eight sources were added based on the collection of both point and mean anomalies from a number of individuals and organizations. A preliminary 30 min file was constructed from the 38 data sources. This file was used to calculate 1 x 1 deg mean anomalies. This 1 x 1 deg file was merged with a 1 x 1 deg file which was a merger of the June 1986 file plus a 1 x 1 deg file made available by DMA Aerospace Center. Certain bad 30 min anomalies were identified and deleted from the preliminary 30 min file leading to the final 30 min file (the July 1989 30 min file) with 66990 anomalies and their accuracy. These anomalies were used to again compute 1 x 1 deg anomalies which were merged with the previous June 86 DMAAC data file. The final 1 x 1 deg mean anomaly file (the July 89 1 x 1 deg data base) contained 50793 anomalies and their accuracy. The anomaly data files were significantly improved over the prior data sets in the following geographic regions: Africa, Scandinavia, Canada, United States, Mexico, Central and South America. Substantial land areas remain where there is little or no available data.

  14. Trauma Films, Information Processing, and Intrusive Memory Development

    ERIC Educational Resources Information Center

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  15. The Monitoring, Detection, Isolation and Assessment of Information Warfare Attacks Through Multi-Level, Multi-Scale System Modeling and Model Based Technology

    DTIC Science & Technology

    2004-01-01

    login identity to the one under which the system call is executed, the parameters of the system call execution - file names including full path...Anomaly detection COAST-EIMDT Distributed on target hosts EMERALD Distributed on target hosts and security servers Signature recognition Anomaly...uses a centralized architecture, and employs an anomaly detection technique for intrusion detection. The EMERALD project [80] proposes a

  16. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    PubMed

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  17. Saltwater intrusion in coastal regions of North America

    USGS Publications Warehouse

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  18. Postemplacement dynamics of basaltic intrusions in the continental crust

    NASA Astrophysics Data System (ADS)

    Roman, A.; Jaupart, C.

    2017-02-01

    Laboratory experiments document the postemplacement behavior of mafic intrusions that spread at a density interface and founder as they become denser than their surroundings due to cooling and crystallization. All else being equal, the larger the intrusion volume, the farther the intrusion can spread and the smaller its aspect ratio is. The final aspect ratio is a function of a single dimensionless number analogous to the Rayleigh number of thermal convection. Once it is denser than its surroundings, the intrusion becomes unstable and may founder in two different regimes. At aspect ratios larger than about 0.4, the "teardrop" regime is such that the intrusion thickens in a central region, developing the shapes of a funnel and a pendant drop. At lower aspect ratios, another regime is observed, with thickening of the intrusion at the leading edge and thinning in a central region. The thick outer ring in turn becomes unstable into a set of teardrops and leads to an irregular horizontal outline. In one variant called the "jellyfish" regime, the thin central region develops a number of downwellings and upwellings in a Rayleigh-Taylor-like pattern. These instabilities may get arrested due to cooling as the intrusion and encasing rocks become too strong to deform. One would then be left with a funnel-shaped residual body or a wide irregular one with thick peripheral lobes and a thinner central region. These different patterns can be recognized in upper crustal mafic intrusions.

  19. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is crediblemore » as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required.« less

  20. Diversity of basaltic lunar volcanism associated with buried impact structures: Implications for intrusive and extrusive events

    NASA Astrophysics Data System (ADS)

    Zhang, F.; Zhu, M.-H.; Bugiolacchi, R.; Huang, Q.; Osinski, G. R.; Xiao, L.; Zou, Y. L.

    2018-06-01

    Relatively denser basalt infilling and the upward displacement of the crust-mantle interface are thought to be contributing factors for the quasi-circular mass anomalies for buried impact craters in the lunar maria. Imagery and gravity observations from the Lunar Reconnaissance Orbiter (LRO) and dual Gravity Recovery and Interior Laboratory (GRAIL) missions have identified 10 partially or fully buried impact structures where diversity of observable basaltic mare volcanism exists. With a detailed investigation of the characteristics of associated volcanic landforms, we describe their spatial distribution relationship with respect to the subsurface tectonic structure of complex impact craters and propose possible models for the igneous processes which may take advantage of crater-related zones of weakness and enable magmas to reach the surface. We conclude that the lunar crust, having been fractured and reworked extensively by cratering, facilitates substance and energy exchange between different lunar systems, an effect modulated by tectonic activities both at global and regional scales. In addition, we propose that the intrusion-caused contribution to gravity anomalies should be considered in future studies, although this is commonly obscured by other physical factors such as mantle uplift and basalt load.

  1. Anomaly-free models for flavour anomalies

    NASA Astrophysics Data System (ADS)

    Ellis, John; Fairbairn, Malcolm; Tunney, Patrick

    2018-03-01

    We explore the constraints imposed by the cancellation of triangle anomalies on models in which the flavour anomalies reported by LHCb and other experiments are due to an extra U(1)^' gauge boson Z^' . We assume universal and rational U(1)^' charges for the first two generations of left-handed quarks and of right-handed up-type quarks but allow different charges for their third-generation counterparts. If the right-handed charges vanish, cancellation of the triangle anomalies requires all the quark U(1)^' charges to vanish, if there are either no exotic fermions or there is only one Standard Model singlet dark matter (DM) fermion. There are non-trivial anomaly-free models with more than one such `dark' fermion, or with a single DM fermion if right-handed up-type quarks have non-zero U(1)^' charges. In some of the latter models the U(1)^' couplings of the first- and second-generation quarks all vanish, weakening the LHC Z^' constraint, and in some other models the DM particle has purely axial couplings, weakening the direct DM scattering constraint. We also consider models in which anomalies are cancelled via extra vector-like leptons, showing how the prospective LHC Z^' constraint may be weakened because the Z^' → μ ^+ μ ^- branching ratio is suppressed relative to other decay modes.

  2. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  3. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  4. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  5. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  6. Vapour Intrusion into Buildings - A Literature Review

    EPA Science Inventory

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  7. Petrogenesis of the Ni-Cu-PGE sulfide-bearing Tamarack Intrusive Complex, Midcontinent Rift System, Minnesota

    NASA Astrophysics Data System (ADS)

    Taranovic, Valentina; Ripley, Edward M.; Li, Chusi; Rossell, Dean

    2015-01-01

    The Tamarack Intrusive Complex (TIC, 1105.6 ± 1.2 Ma) in NE Minnesota, was emplaced during the early stages of the development of the Midcontinent Rift System (MRS, "Early Stage": 1110-1106 Ma). Country rocks of the TIC are those of the Paleoproterozoic Thomson Formation, part of the Animikie Group including sulfide-bearing metasedimentary black shale. The magmatic system is composed of at least two principal mafic-ultramafic intrusive sequences: the sulfide-barren Bowl Intrusion in the south and the "dike" area intrusions in the north which host Ni-Cu-Platinum Group Elements (PGE) mineralization with up to 2.33% Ni, 1.24% Cu, 0.34 g/t Pt, 0.23 g/t Pd and 0.18 g/t Au. Two distinct intrusive units in the "dike" area are the CGO (coarse-grained olivine-bearing) Intrusion, a sub-vertical dike-like body, and the overlying sub-horizontal FGO (fine-grained olivine-bearing) Intrusion. Both intrusions comprise peridotite, feldspathic peridotite, feldspathic pyroxenite, melatroctolite and melagabbro. Massive sulfides are volumetrically minor and mainly occur as lenses emplaced into the country rocks associated with both intrusions. Semi-massive (net-textured) sulfides are distributed at the core of the CGO Intrusion, surrounded by a halo of the disseminated sulfides. Disseminated sulfides also occur in lenses along the base of the FGO Intrusion. Olivine compositions in the CGO Intrusion are between Fo89 and Fo82 and in the FGO Intrusion from Fo84 to Fo82. TIC intrusions have more primitive olivine compositions than that of olivine in the sheet-like intrusions in the Duluth Complex (below Fo70), as well as olivine from the smaller, conduit-related, Eagle and East Eagle Intrusions in Northern Michigan (Fo86 to Fo75). The FeO/MgO ratios of the CGO and FGO Intrusion parental magmas, inferred from olivine compositions, are similar to those of picritic basalts erupted during the early stages of the MRS formation. Trace element ratios differ slightly from other intrusions in the

  8. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients.

    PubMed

    Bapat, Usha; Kedlya, Prashanth G

    2012-09-01

    To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD) patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients' above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life. Elderly, educated

  9. A Non-Intrusive Alert System for Maritime Anomalies: Literature Review and the Development and Assessment of Interface Design Concepts (Systeme d’Alerte non Intrusive en cas d’Anomalies Maritimes: Examen de la Documentation et Elaboration/Evaluation de Concepts d’Interface)

    DTIC Science & Technology

    2009-03-01

    compris les anomalies (augmentation soudaine de vitesse, déroutement des navires, etc.). Il est donc nécessaire de disposer d’un système capable...ONTOLOGY ................................................................ 6 FIGURE 2: IRC FRAMEWORK (ADAPTED FROM MCCRICKARD ET AL ., 2003A, P. 321...19 FIGURE 3: HAZARD NETWORK (HAUTAMAKI ET AL ., 2006, P. 7

  10. Multi-User Low Intrusive Occupancy Detection

    PubMed Central

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  11. Particle Filtering for Model-Based Anomaly Detection in Sensor Networks

    NASA Technical Reports Server (NTRS)

    Solano, Wanda; Banerjee, Bikramjit; Kraemer, Landon

    2012-01-01

    A novel technique has been developed for anomaly detection of rocket engine test stand (RETS) data. The objective was to develop a system that postprocesses a csv file containing the sensor readings and activities (time-series) from a rocket engine test, and detects any anomalies that might have occurred during the test. The output consists of the names of the sensors that show anomalous behavior, and the start and end time of each anomaly. In order to reduce the involvement of domain experts significantly, several data-driven approaches have been proposed where models are automatically acquired from the data, thus bypassing the cost and effort of building system models. Many supervised learning methods can efficiently learn operational and fault models, given large amounts of both nominal and fault data. However, for domains such as RETS data, the amount of anomalous data that is actually available is relatively small, making most supervised learning methods rather ineffective, and in general met with limited success in anomaly detection. The fundamental problem with existing approaches is that they assume that the data are iid, i.e., independent and identically distributed, which is violated in typical RETS data. None of these techniques naturally exploit the temporal information inherent in time series data from the sensor networks. There are correlations among the sensor readings, not only at the same time, but also across time. However, these approaches have not explicitly identified and exploited such correlations. Given these limitations of model-free methods, there has been renewed interest in model-based methods, specifically graphical methods that explicitly reason temporally. The Gaussian Mixture Model (GMM) in a Linear Dynamic System approach assumes that the multi-dimensional test data is a mixture of multi-variate Gaussians, and fits a given number of Gaussian clusters with the help of the wellknown Expectation Maximization (EM) algorithm. The

  12. High magnetic susceptibility granodiorite as a source of surface magnetic anomalies in the King George Island, Antarctica

    NASA Astrophysics Data System (ADS)

    Kon, S.; Nakamura, N.; Funaki, M.; Sakanaka, S.

    2012-12-01

    Change in plate motion produces convergence of the two oceanic lithospheres and the formation of volcanic island arcs above the subducted older and thicker plate. The association of calc-alkaline diorites to tonalites and granodiorites (ACG) is typical plutonic rocks of the volcanic arcs. In the many island arcs that surround the Pacific Ocean, ACG generally forms shallow level plutons and is closely associated with volcanic rocks. The Japan Arc setting had occurred the emplacement of the highly magnetic granitoid along the fore-arc basin before back-arc spreading at middle Miocene, showing a linear positive magnetic anomaly. Similar magnetic anomalies have also been exhibited along the Circum-Pacific Belt. Along East Antarctica, it is well known that the South Shetland Islands have been formed by back-arc spreading related to the subduction along the South Shetland trench during the late Cretaceous and middle Miocene. Moreover, geology in the South Shetland Islands consists of lava flows with subordinate pyroclastic deposits, intrusive dykes-sills, granitic plutons, displaying a typical subduction-related calc-alkaline volcanic association. However, there is little report on the presence of fore-arc granitoid. Here we report the distribution and structure of the granitic plutons around Marian Cove in the King George Island, South Shetland, East Antarctica by surface geological survey and magnetic anisotropic studies. Then we compare the distribution of granitic plutons with surface magnetic anomalies through our ship-borne and foot-borne magnetic surveys. The granitic plutons are distributed only shallow around the Marian cove in the King George Island, and the plutons had been intruded in the Sejong formation with pyroclastic deposits and basaltic/rhyoritic lavas, suggesting the post back-arc spreading. We sampled 8 plutons, 12 basaltic lavas and 6 andestic dykes, all located within four kilometer radius from the Korean Antarctic research station (King Sejong

  13. Craniofacial anomalies associated with hypospadias. Description of a hospital based population in South America.

    PubMed

    Fernandez, Nicolas; Escobar, Rebeca; Zarante, Ignacio

    2016-01-01

    Hypospadias is a congenital abnormality of the penis, in which there is incomplete development of the distal urethra. There are numerous reports showing na increase of prevalence of hypospadias. Association of craniofacial malformations in patients diagnosed with hypospadias is rare. The aim of this study is to describe the association between hypospadias and craniofacial congenital anomalies. A retrospective review of the Latin-American collaborative study of congenital malformations (ECLAMC) data was performed between January 1982 and December 2011. We included children diagnosed with associated hypospadias and among them we selected those that were associated with any craniofacial congenital anomaly. Global prevalence was 11.3 per 10.000 newborns. In this population a total of 809 patients with 1117 associated anomalies were identified. On average there were 1.7 anomalies per patient. Facial anomalies were present in 13.2%. The most commonly major facial anomaly associated to hypospadias was cleft lip/palate with 52 cases. We identified that 18% have an association with other anomalies, and found an association between craniofacial anomalies and hypospadias in 0.59 cases/10.000 newborns. Hypospadias is the most common congenital anomaly affecting the genitals. Its association with other anomalies is rare. It has been reported that other malformations occur in 29.3% of the cases with hypospadias. The more proximal the meatus, the higher the risk for having another associated anomaly. Associated hypospadias are rare, and it is important to identify the concurrent occurrence of craniofacial anomalies to better treat patients that might need a multidisciplinary approach. Copyright© by the International Brazilian Journal of Urology.

  14. Craniofacial anomalies associated with hypospadias. Description of a hospital based population in South America

    PubMed Central

    Fernandez, Nicolas; Escobar, Rebeca; Zarante, Ignacio

    2016-01-01

    ABSTRACT Introduction: Hypospadias is a congenital abnormality of the penis, in which there is incomplete development of the distal urethra. There are numerous reports showing an increase of prevalence of hypospadias. Association of craniofacial malformations in patients diagnosed with hypospadias is rare. The aim of this study is to describe the association between hypospadias and craniofacial congenital anomalies. Materials and Methods: A retrospective review of the Latin-American collaborative study of congenital malformations (ECLAMC) data was performed between January 1982 and December 2011. We included children diagnosed with associated hypospadias and among them we selected those that were associated with any craniofacial congenital anomaly. Results: Global prevalence was 11.3 per 10.000 newborns. In this population a total of 809 patients with 1117 associated anomalies were identified. On average there were 1.7 anomalies per patient. Facial anomalies were present in 13.2%. The most commonly major facial anomaly associated to hypospadias was cleft lip/palate with 52 cases. We identified that 18% have an association with other anomalies, and found an association between craniofacial anomalies and hypospadias in 0.59 cases/10.000 newborns. Discussion: Hypospadias is the most common congenital anomaly affecting the genitals. Its association with other anomalies is rare. It has been reported that other malformations occur in 29.3% of the cases with hypospadias. The more proximal the meatus, the higher the risk for having another associated anomaly. Conclusion: Associated hypospadias are rare, and it is important to identify the concurrent occurrence of craniofacial anomalies to better treat patients that might need a multidisciplinary approach. PMID:27564292

  15. Congenital anomalies associated with trisomy 18 or trisomy 13: A registry-based study in 16 European countries, 2000-2011.

    PubMed

    Springett, Anna; Wellesley, Diana; Greenlees, Ruth; Loane, Maria; Addor, Marie-Claude; Arriola, Larraitz; Bergman, Jorieke; Cavero-Carbonell, Clara; Csaky-Szunyogh, Melinda; Draper, Elizabeth S; Garne, Ester; Gatt, Miriam; Haeusler, Martin; Khoshnood, Babak; Klungsoyr, Kari; Lynch, Catherine; Dias, Carlos Matias; McDonnell, Robert; Nelen, Vera; O'Mahony, Mary; Pierini, Anna; Queisser-Luft, Annette; Rankin, Judith; Rissmann, Anke; Rounding, Catherine; Stoianova, Sylvia; Tuckerz, David; Zymak-Zakutnia, Natalya; Morris, Joan K

    2015-12-01

    The aim of this study was to examine the prevalence of trisomies 18 and 13 in Europe and the prevalence of associated anomalies. Twenty-five population-based registries in 16 European countries provided data from 2000-2011. Cases included live births, fetal deaths (20+ weeks' gestation), and terminations of pregnancy for fetal anomaly (TOPFAs). The prevalence of associated anomalies was reported in live births. The prevalence of trisomy 18 and trisomy 13 were 4.8 (95%CI: 4.7-5.0) and 1.9 (95%CI: 1.8-2.0) per 10,000 total births. Seventy three percent of cases with trisomy 18 or trisomy 13 resulted in a TOPFA. Amongst 468 live born babies with trisomy 18, 80% (76-83%) had a cardiac anomaly, 21% (17-25%) had a nervous system anomaly, 8% (6-11%) had esophageal atresia and 10% (8-13%) had an orofacial cleft. Amongst 240 Live born babies with trisomy 13, 57% (51-64%) had a cardiac anomaly, 39% (33-46%) had a nervous system anomaly, 30% (24-36%) had an eye anomaly, 44% (37-50%) had polydactyly and 45% (39-52%) had an orofacial cleft. For babies with trisomy 18 boys were less likely to have a cardiac anomaly compared with girls (OR = 0.48 (0.30-0.77) and with trisomy 13 were less likely to have a nervous system anomaly [OR = 0.46 (0.27-0.77)]. Babies with trisomy 18 or trisomy 13 do have a high proportion of associated anomalies with the distribution of anomalies being different in boys and girls. © 2015 Wiley Periodicals, Inc.

  16. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    NASA Astrophysics Data System (ADS)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  17. Long wavelength gravity anomalies over India: Crustal and lithospheric structures and its flexure

    NASA Astrophysics Data System (ADS)

    Tiwari, V. M.; Ravi Kumar, M.; Mishra, D. C.

    2013-07-01

    crustal thicknesses under the Vindhyan and the Ganga basins are attributed to the lithospheric flexure of the Indian plate due to Himalaya. Crustal bulge due to lithospheric flexure is well reflected in isostatic Moho based on flexural model of average effective elastic thickness of ˜40 km. Lithospheric flexure causes high heat flow that is aided by large crustal scale fault system of mobile belts and their extensions northwards in this section, which may be responsible for lower crustal bulk density in the northern part. A low density and high thermal regime in north India north of the SMB compared to south India, however does not conform to the high S-wave velocity in the northern part and thus it is attributed to changes in composition between the northern and the southern parts indicating a reworked lithosphere. Some of the long wavelength gravity anomalies along the east and the west coasts of India are attributed to the intrusives that caused the breakup of India from Antarctica, and Africa, Madagascar and Seychelles along the east and the west coasts of India, respectively.

  18. ISHM Anomaly Lexicon for Rocket Test

    NASA Technical Reports Server (NTRS)

    Schmalzel, John L.; Buchanan, Aubri; Hensarling, Paula L.; Morris, Jonathan; Turowski, Mark; Figueroa, Jorge F.

    2007-01-01

    byproducts of the anomaly lexicon compilation effort. For example, (1) Allows determination of the frequency distribution of anomalies to help identify those with the potential for high return on investment if included in automated detection as part of an ISHM system, (2) Availability of a regular lexicon could provide the base anomaly name choices to help maintain consistency in the DR collection process, and (3) Although developed for the rocket engine test environment, most of the anomalies are not specific to rocket testing, and thus can be reused in other applications.

  19. An Unsupervised Deep Hyperspectral Anomaly Detector

    PubMed Central

    Ma, Ning; Peng, Yu; Wang, Shaojun

    2018-01-01

    Hyperspectral image (HSI) based detection has attracted considerable attention recently in agriculture, environmental protection and military applications as different wavelengths of light can be advantageously used to discriminate different types of objects. Unfortunately, estimating the background distribution and the detection of interesting local objects is not straightforward, and anomaly detectors may give false alarms. In this paper, a Deep Belief Network (DBN) based anomaly detector is proposed. The high-level features and reconstruction errors are learned through the network in a manner which is not affected by previous background distribution assumption. To reduce contamination by local anomalies, adaptive weights are constructed from reconstruction errors and statistical information. By using the code image which is generated during the inference of DBN and modified by adaptively updated weights, a local Euclidean distance between under test pixels and their neighboring pixels is used to determine the anomaly targets. Experimental results on synthetic and recorded HSI datasets show the performance of proposed method outperforms the classic global Reed-Xiaoli detector (RXD), local RX detector (LRXD) and the-state-of-the-art Collaborative Representation detector (CRD). PMID:29495410

  20. Vapor Intrusion Assessment and Mitigation 2012

    DTIC Science & Technology

    2012-03-26

    1 Geosyntec 0 consultants Vapor Intrusion Assessment and Mitigation 2012 Robert Ettinger, M.S., P.E., Todd McAiary, M.Sc., P.Eng., P.G...REPORT DATE 26 MAR 2012 2. REPORT TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE Vapor Intrusion Assessment and...Updates • Typical Assessment Approaches and Common Challenges • Methods to Distinguish Background Sources (McHugh) • Significance • Compound

  1. Domain Anomaly Detection in Machine Perception: A System Architecture and Taxonomy.

    PubMed

    Kittler, Josef; Christmas, William; de Campos, Teófilo; Windridge, David; Yan, Fei; Illingworth, John; Osman, Magda

    2014-05-01

    We address the problem of anomaly detection in machine perception. The concept of domain anomaly is introduced as distinct from the conventional notion of anomaly used in the literature. We propose a unified framework for anomaly detection which exposes the multifaceted nature of anomalies and suggest effective mechanisms for identifying and distinguishing each facet as instruments for domain anomaly detection. The framework draws on the Bayesian probabilistic reasoning apparatus which clearly defines concepts such as outlier, noise, distribution drift, novelty detection (object, object primitive), rare events, and unexpected events. Based on these concepts we provide a taxonomy of domain anomaly events. One of the mechanisms helping to pinpoint the nature of anomaly is based on detecting incongruence between contextual and noncontextual sensor(y) data interpretation. The proposed methodology has wide applicability. It underpins in a unified way the anomaly detection applications found in the literature. To illustrate some of its distinguishing features, in here the domain anomaly detection methodology is applied to the problem of anomaly detection for a video annotation system.

  2. Winter-spring anomalies in the stratospheric content of NO2 from ground-based measurement results

    NASA Astrophysics Data System (ADS)

    Ageyeva, V. Yu.; Gruzdev, A. N.; Elokhov, A. S.; Grishaev, M. V.

    2015-07-01

    According to the results of ground-based spectrometric measurements, significant negative anomalies in the stratospheric content of NO2 were observed at a number of stations in the Northern Hemisphere during winter and spring 2011. These anomalies were accompanied by those in total ozone content (TOC) and stratospheric temperature and were caused by the transport of air masses from the region of the arctic ozone hole. The results of analysis of vertical NO2 profiles obtained at the Zvenigorod Scientific Station showed that a certain contribution to the 2011 negative anomalies of NO2 was made due to a denitrification of the polar stratosphere in the ozone-hole region. The relation between variations in the total content of NO2 and those in the TOC and temperature was analyzed for both the Northern and Southern hemispheres during winter-spring periods. It was found that this relation depends on the phase of the quasi-biennial oscillation in the stratospheric equatorial wind. Such a correlation usually intensifies if only the episodes of negative anomalies caused by the transport of stratospheric air masses from the ozone-hole region are taken into consideration.

  3. Non-intrusive methods of characterizing vehicles on the highway.

    DOT National Transportation Integrated Search

    2003-06-01

    Over the past year we have worked on the development of a real-time laser-based non-intrusive field-deployable detection system for delineation of moving vehicles. The primary goal of the project is to develop a roadway detection system that can be u...

  4. Research on regional intrusion prevention and control system based on target tracking

    NASA Astrophysics Data System (ADS)

    Liu, Yanfei; Wang, Jieling; Jiang, Ke; He, Yanhui; Wu, Zhilin

    2017-08-01

    In view of the fact that China’s border is very long and the border prevention and control measures are single, we designed a regional intrusion prevention and control system which based on target-tracking. The system consists of four parts: solar panel, radar, electro-optical equipment, unmanned aerial vehicle and intelligent tracking platform. The solar panel provides independent power for the entire system. The radar detects the target in real time and realizes the high precision positioning of suspicious targets, then through the linkage of electro-optical equipment, it can achieve full-time automatic precise tracking of targets. When the target appears within the range of detection, the drone will be launched to continue the tracking. The system is mainly to realize the full time, full coverage, whole process integration and active realtime control of the border area.

  5. Post-processing for improving hyperspectral anomaly detection accuracy

    NASA Astrophysics Data System (ADS)

    Wu, Jee-Cheng; Jiang, Chi-Ming; Huang, Chen-Liang

    2015-10-01

    Anomaly detection is an important topic in the exploitation of hyperspectral data. Based on the Reed-Xiaoli (RX) detector and a morphology operator, this research proposes a novel technique for improving the accuracy of hyperspectral anomaly detection. Firstly, the RX-based detector is used to process a given input scene. Then, a post-processing scheme using morphology operator is employed to detect those pixels around high-scoring anomaly pixels. Tests were conducted using two real hyperspectral images with ground truth information and the results based on receiver operating characteristic curves, illustrated that the proposed method reduced the false alarm rates of the RXbased detector.

  6. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  7. Noble gas systematics of the Skaergaard intrusion

    NASA Astrophysics Data System (ADS)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Ra<1) along the margin of the intrusion indicates that noble gases from the Archean host-rock were incorporated into the cooling magma chamber, probably via magmatic assimilation. Noble gases in olivines from the upper portions of the intrusion have atmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  8. Enhanced detection and visualization of anomalies in spectral imagery

    NASA Astrophysics Data System (ADS)

    Basener, William F.; Messinger, David W.

    2009-05-01

    Anomaly detection algorithms applied to hyperspectral imagery are able to reliably identify man-made objects from a natural environment based on statistical/geometric likelyhood. The process is more robust than target identification, which requires precise prior knowledge of the object of interest, but has an inherently higher false alarm rate. Standard anomaly detection algorithms measure deviation of pixel spectra from a parametric model (either statistical or linear mixing) estimating the image background. The topological anomaly detector (TAD) creates a fully non-parametric, graph theory-based, topological model of the image background and measures deviation from this background using codensity. In this paper we present a large-scale comparative test of TAD against 80+ targets in four full HYDICE images using the entire canonical target set for generation of ROC curves. TAD will be compared against several statistics-based detectors including local RX and subspace RX. Even a perfect anomaly detection algorithm would have a high practical false alarm rate in most scenes simply because the user/analyst is not interested in every anomalous object. To assist the analyst in identifying and sorting objects of interest, we investigate coloring of the anomalies with principle components projections using statistics computed from the anomalies. This gives a very useful colorization of anomalies in which objects of similar material tend to have the same color, enabling an analyst to quickly sort and identify anomalies of highest interest.

  9. Springtime high surface ozone events over the western United States: Quantifying the role of stratospheric intrusions

    NASA Astrophysics Data System (ADS)

    Fiore, A. M.; Lin, M.; Cooper, O. R.; Horowitz, L. W.; Naik, V.; Levy, H.; Langford, A. O.; Johnson, B. J.; Oltmans, S. J.; Senff, C. J.

    2011-12-01

    As the National Ambient Air Quality (NAAQS) standard for ozone (O_{3}) is lowered, it pushes closer to policy-relevant background levels (O_{3} concentrations that would exist in the absence of North American anthropogenic emissions), making attainment more difficult with local controls. We quantify the Asian and stratospheric components of this North American background, with a primary focus on the western United States. Prior work has identified this region as a hotspot for deep stratospheric intrusions in spring. We conduct global simulations at 200 km and 50 km horizontal resolution with the GFDL AM3 model, including a stratospheric O_{3} tracer and two sensitivity simulations with anthropogenic emissions from Asia and North America turned off. The model is evaluated with a suite of in situ and satellite measurements during the NOAA CalNex campaign (May-June 2010). The model reproduces the principle features in the observed surface to near tropopause distribution of O_{3} along the California coast, including its latitudinal variation and the development of regional high-O_{3} episodes. Four deep tropopause folds are diagnosed and we find that the remnants of these stratospheric intrusions are transported to the surface of Southern California and Western U.S. Rocky Mountains, contributing 10-30 ppbv positive anomalies relative to the simulated campaign mean stratospheric component in the model surface layer. We further examine the contribution of North American background, including its stratospheric and Asian components, to the entire distribution of observed MDA8 O_{3} at 12 high-elevation CASTNet sites in the Mountain West. We find that the stratospheric O_{3} tracer constitutes 50% of the North American background, and can enhance surface maximum daily 8-hour average (MDA8) O_{3} by 20 ppb when observed surface O_{3} is in the range of 60-80 ppbv. Our analysis highlights the potential for natural sources such as deep stratospheric intrusions to contribute

  10. The Experiences and Challenges in Drilling into Semi molten or Molten Intrusive in Menengai Geothermal Field

    NASA Astrophysics Data System (ADS)

    Mortensen, A. K.; Mibei, G. K.

    2017-12-01

    Drilling in Menengai has experienced various challenges related to drilling operations and the resource itself i.e. quality discharge fluids vis a vis gas content. The main reason for these challenges is related to the nature of rocks encountered at depths. Intrusives encountered within Menengai geothermal field have been group into three based on their geological characteristics i.e. S1, S2 and S3.Detailed geology and mineralogical characterization have not been done on these intrusive types. However, based on physical appearances, S1 is considered as a diorite dike, S2 is syenite while S3 is molten rock material. This paper summarizes the experiences in drilling into semi molten or molten intrusive (S3).

  11. Research for Key Techniques of Geophysical Recognition System of Hydrocarbon-induced Magnetic Anomalies Based on Hydrocarbon Seepage Theory

    NASA Astrophysics Data System (ADS)

    Zhang, L.; Hao, T.; Zhao, B.

    2009-12-01

    Hydrocarbon seepage effects can cause magnetic alteration zones in near surface, and the magnetic anomalies induced by the alteration zones can thus be used to locate oil-gas potential regions. In order to reduce the inaccuracy and multi-resolution of the hydrocarbon anomalies recognized only by magnetic data, and to meet the requirement of integrated management and sythetic analysis of multi-source geoscientfic data, it is necessary to construct a recognition system that integrates the functions of data management, real-time processing, synthetic evaluation, and geologic mapping. In this paper research for the key techniques of the system is discussed. Image processing methods can be applied to potential field images so as to make it easier for visual interpretation and geological understanding. For gravity or magnetic images, the anomalies with identical frequency-domain characteristics but different spatial distribution will reflect differently in texture and relevant textural statistics. Texture is a description of structural arrangements and spatial variation of a dataset or an image, and has been applied in many research fields. Textural analysis is a procedure that extracts textural features by image processing methods and thus obtains a quantitative or qualitative description of texture. When the two kinds of anomalies have no distinct difference in amplitude or overlap in frequency spectrum, they may be distinguishable due to their texture, which can be considered as textural contrast. Therefore, for the recognition system we propose a new “magnetic spots” recognition method based on image processing techniques. The method can be divided into 3 major steps: firstly, separate local anomalies caused by shallow, relatively small sources from the total magnetic field, and then pre-process the local magnetic anomaly data by image processing methods such that magnetic anomalies can be expressed as points, lines and polygons with spatial correlation, which

  12. Identifying and forecasting deep stratospheric ozone intrusions over the western United States from space

    NASA Astrophysics Data System (ADS)

    Lin, M.; Fiore, A. M.; Horowitz, L. W.; Cooper, O. R.; Langford, A. O.; Pan, L.; Liu, X.; Reddy, P. J.

    2012-12-01

    Recent studies have shown that deep stratospheric ozone intrusions can episodically enhance ground-level ozone above the health-based standard over the western U.S. in spring. Advanced warning of incoming intrusions could be used by state agencies to inform the public about poor air quality days. Here we explore the potential for using total ozone retrievals (version 5.2, level 3) at twice daily near global coverage from the AIRS instrument aboard the NASA Aqua satellite to identify stratospheric intrusions and forecast the eventual surface destination of transported stratospheric ozone. The method involves the correlation of AIRS daily total ozone columns at each 1ox1o grid box ~1-3 days prior to stratospheric enhancements to daily maximum 8-hour average ozone at a selected surface site using datasets from April to June in 2003-2011. The surface stratospheric enhancements are estimated by the GFDL AM3 chemistry-climate model which includes full stratospheric and tropospheric chemistry and is nudged to reanalysis winds. Our earlier work shows that the model presents deep stratospheric intrusions over the Western U.S. consistently with observations from AIRS, surface networks, daily ozone sondes, and aircraft lidar available in spring of 2010 during the NOAA CalNex field campaign. For the 15 surface sites in the U.S. Mountain West considered, a correlation coefficient of 0.4-0.7 emerges with AIRS ozone columns over 30o-50oN latitudes and 125o-105oW longitudes - variability in the AIRS column within this spatial domain indicates incoming intrusions. For each "surface receptor site", the spatial domain can narrow to an area ~5ox5o northwest of the individual site, with the strong correlation (0.5-0.7) occurring when the AIRS data is lagged by 1 day from the AM3 stratospheric enhancements in surface air. The spatial pattern of correlations is consistent with our process-oriented understanding developed from case studies of extreme intrusions. Surface observations

  13. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    NASA Astrophysics Data System (ADS)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  14. A web-based non-intrusive ambient system to measure and classify activities of daily living.

    PubMed

    Stucki, Reto A; Urwyler, Prabitha; Rampa, Luca; Müri, René; Mosimann, Urs P; Nef, Tobias

    2014-07-21

    The number of older adults in the global population is increasing. This demographic shift leads to an increasing prevalence of age-associated disorders, such as Alzheimer's disease and other types of dementia. With the progression of the disease, the risk for institutional care increases, which contrasts with the desire of most patients to stay in their home environment. Despite doctors' and caregivers' awareness of the patient's cognitive status, they are often uncertain about its consequences on activities of daily living (ADL). To provide effective care, they need to know how patients cope with ADL, in particular, the estimation of risks associated with the cognitive decline. The occurrence, performance, and duration of different ADL are important indicators of functional ability. The patient's ability to cope with these activities is traditionally assessed with questionnaires, which has disadvantages (eg, lack of reliability and sensitivity). Several groups have proposed sensor-based systems to recognize and quantify these activities in the patient's home. Combined with Web technology, these systems can inform caregivers about their patients in real-time (e.g., via smartphone). We hypothesize that a non-intrusive system, which does not use body-mounted sensors, video-based imaging, and microphone recordings would be better suited for use in dementia patients. Since it does not require patient's attention and compliance, such a system might be well accepted by patients. We present a passive, Web-based, non-intrusive, assistive technology system that recognizes and classifies ADL. The components of this novel assistive technology system were wireless sensors distributed in every room of the participant's home and a central computer unit (CCU). The environmental data were acquired for 20 days (per participant) and then stored and processed on the CCU. In consultation with medical experts, eight ADL were classified. In this study, 10 healthy participants (6 women

  15. What lies beneath: geophysical mapping of a concealed Precambrian intrusive complex along the Iowa–Minnesota border

    USGS Publications Warehouse

    Drenth, Benjamin J.; Anderson, Raymond R.; Schulz, Klaus J.; Feinberg, Joshua M.; Chandler, Val W.; Cannon, William F.

    2015-01-01

    Large-amplitude gravity and magnetic highs over northeast Iowa are interpreted to reflect a buried intrusive complex composed of mafic–ultramafic rocks, the northeast Iowa intrusive complex (NEIIC), intruding Yavapai province (1.8–1.72 Ga) rocks. The age of the complex is unproven, although it has been considered to be Keweenawan (∼1.1 Ga). Because only four boreholes reach the complex, which is covered by 200–700 m of Paleozoic sedimentary rocks, geophysical methods are critical to developing a better understanding of the nature and mineral resource potential of the NEIIC. Lithologic and cross-cutting relations interpreted from high-resolution aeromagnetic and airborne gravity gradient data are presented in the form of a preliminary geologic map of the basement Precambrian rocks. Numerous magnetic anomalies are coincident with airborne gravity gradient (AGG) highs, indicating widespread strongly magnetized and dense rocks of likely mafic–ultramafic composition. A Yavapai-age metagabbro unit is interpreted to be part of a layered intrusion with subvertical dip. Another presumed Yavapai unit has low density and weak magnetization, observations consistent with felsic plutons. Northeast-trending, linear magnetic lows are interpreted to reflect reversely magnetized diabase dikes and have properties consistent with Keweenawan rocks. The interpreted dikes are cut in places by normally magnetized mafic–ultramafic rocks, suggesting that the latter represent younger Keweenawan rocks. Distinctive horseshoe-shaped magnetic and AGG highs correspond with a known gabbro, and surround rocks with weaker magnetization and lower density. Here, informally called the Decorah complex, the source body has notable geophysical similarities to Keweenawan alkaline ring complexes, such as the Coldwell and Killala Lake complexes, and Mesoproterozoic anorogenic complexes, such as the Kiglapait, Hettasch, and Voisey’s Bay intrusions in Labrador. Results presented here suggest that

  16. Machine intelligence-based decision-making (MIND) for automatic anomaly detection

    NASA Astrophysics Data System (ADS)

    Prasad, Nadipuram R.; King, Jason C.; Lu, Thomas

    2007-04-01

    Any event deemed as being out-of-the-ordinary may be called an anomaly. Anomalies by virtue of their definition are events that occur spontaneously with no prior indication of their existence or appearance. Effects of anomalies are typically unknown until they actually occur, and their effects aggregate in time to show noticeable change from the original behavior. An evolved behavior would in general be very difficult to correct unless the anomalous event that caused such behavior can be detected early, and any consequence attributed to the specific anomaly. Substantial time and effort is required to back-track the cause for abnormal behavior and to recreate the event sequence leading to abnormal behavior. There is a critical need therefore to automatically detect anomalous behavior as and when they may occur, and to do so with the operator in the loop. Human-machine interaction results in better machine learning and a better decision-support mechanism. This is the fundamental concept of intelligent control where machine learning is enhanced by interaction with human operators, and vice versa. The paper discusses a revolutionary framework for the characterization, detection, identification, learning, and modeling of anomalous behavior in observed phenomena arising from a large class of unknown and uncertain dynamical systems.

  17. The effect of titanite crystallisation on Eu and Ce anomalies in zircon and its implications for the assessment of porphyry Cu deposit fertility

    NASA Astrophysics Data System (ADS)

    Loader, Matthew A.; Wilkinson, Jamie J.; Armstrong, Robin N.

    2017-08-01

    The redox sensitivity of Ce and Eu anomalies in zircon has been clearly demonstrated by experimental studies, and these may represent an important tool in the exploration for porphyry Cu deposits which are thought to be derived from oxidised magmas. These deposits are significant because they are the source of much of the world's copper and almost all of the molybdenum and rhenium, key elements in many modern technologies. However, Ce and Eu anomalies in zircon are also affected by the co-crystallisation of REE bearing phases, such as titanite. Here, we report the trace element chemistry of zircons from titanite-bearing intrusions associated with mineralisation at the world class Oyu Tolgoi porphyry Cu-Au deposit (Mongolia). Based on these data, we suggest that neither zircon Eu/Eu*, nor Ce4+/Ce3+ are robust proxies for melt redox conditions, because they are both too strongly dependent on melt REE concentrations, which are usually poorly constrained and controlled by the crystallisation of titanite and other REE-bearing phases. In spite of this, Eu/Eu* can broadly distinguish between fertile and barren systems, so may still be an indicator of porphyry magma fertility, and a useful tool for exploration.

  18. Wind-forced salt intrusion into a tributary estuary

    NASA Astrophysics Data System (ADS)

    Sanford, Lawrence P.; Boicourt, William C.

    1990-08-01

    Moored measurements and hydrographic surveys were carried out during the summers of 1986 and 1987 to examine interaction between the mainstem of the Chesapeake Bay and the Choptank River, an eastern shore tributary estuary. The data show that an important mode of interaction is through wind-forced intrusion of saline, hypoxic water from below the pycnocline of the Bay into the lower river. Intrusions are driven by lateral tilting of the pycnocline in the Bay, when high salinity water is upwelled on the eastern side of the Bay in response to a southward pulse of wind stress. The resulting internal surges propagate up the relict Choptank entrance channel at a speed of about 20 cm/s and spill onto the broad sill inside the mouth of the river. Intrusion-favorable pycnocline tilts in the Bay do not always result in lower layer intrusion into the Choptank, but may be blocked or choked in the entrance channel on occasion. The data suggest that wind-forced intrusion of salt leads to increased gravitational circulation in the Choptank during the summer months, providing a mechanism through which high frequency energy may be directly translated into lower frequency motion.

  19. Anomaly Detection Based on Local Nearest Neighbor Distance Descriptor in Crowded Scenes

    PubMed Central

    Hu, Shiqiang; Zhang, Huanlong; Luo, Lingkun

    2014-01-01

    We propose a novel local nearest neighbor distance (LNND) descriptor for anomaly detection in crowded scenes. Comparing with the commonly used low-level feature descriptors in previous works, LNND descriptor has two major advantages. First, LNND descriptor efficiently incorporates spatial and temporal contextual information around the video event that is important for detecting anomalous interaction among multiple events, while most existing feature descriptors only contain the information of single event. Second, LNND descriptor is a compact representation and its dimensionality is typically much lower than the low-level feature descriptor. Therefore, not only the computation time and storage requirement can be accordingly saved by using LNND descriptor for the anomaly detection method with offline training fashion, but also the negative aspects caused by using high-dimensional feature descriptor can be avoided. We validate the effectiveness of LNND descriptor by conducting extensive experiments on different benchmark datasets. Experimental results show the promising performance of LNND-based method against the state-of-the-art methods. It is worthwhile to notice that the LNND-based approach requires less intermediate processing steps without any subsequent processing such as smoothing but achieves comparable event better performance. PMID:25105164

  20. Intrusion errors in visuospatial working memory performance.

    PubMed

    Cornoldi, Cesare; Mammarella, Nicola

    2006-02-01

    This study tested the hypothesis that failure in active visuospatial working memory tasks involves a difficulty in avoiding intrusions due to information that is already activated. Two experiments are described, in which participants were required to process several series of locations on a 4 x 4 matrix and then to produce only the final location of each series. Results revealed a higher number of errors due to already activated locations (intrusions) compared with errors due to new locations (inventions). Moreover, when participants were required to pay extra attention to some irrelevant (non-final) locations by tapping on the table, intrusion errors increased. Results are discussed in terms of current models of working memory functioning.

  1. Intrusive Memories in Perpetrators of Violent Crime: Emotions and Cognitions

    ERIC Educational Resources Information Center

    Evans, Ceri; Ehlers, Anke; Mezey, Gillian; Clark, David M.

    2007-01-01

    The authors investigated factors that may determine whether perpetrators of violent crime develop intrusive memories of their offense. Of 105 young offenders who were convicted of killing or seriously harming others, 46% reported distressing intrusive memories, and 6% had posttraumatic stress disorder. Intrusions were associated with lower…

  2. Heart rate, startle response, and intrusive trauma memories

    PubMed Central

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  3. Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems

    PubMed Central

    Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda

    2015-01-01

    In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes. PMID:26267477

  4. Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems.

    PubMed

    Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda

    2015-01-01

    In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes.

  5. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    DTIC Science & Technology

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  6. Igneous layering in the peralkaline intrusions ,Kola Peninsula :leading role of gravitational differentiation

    NASA Astrophysics Data System (ADS)

    Kogarko, L. N..

    2012-04-01

    In the center of Kola Peninsula there are two large layered intrusions of agpaitic nepheline syenites - Khibina and Lovozero. . The Khibina alkaline massif (Kola Peninsula,Russia) hosts the world's largest and economically most important apatite deposit. The Khibina massif is a complex multiphase body built up from a number of ring-like and conical intrusions. The apatite bearing intrusion is ring-like and is represented by a layered body of ijolitic composition with a thickness of about 1 - 2 km. The upper zone is represented by different types of apatite ores. These rocks consist of 60-90% euhedral very small (tenths of mm)apatite crystals. The lower zone has mostly ijolitic composition. The lower zone grades into underlying massive urtite consisting of 75-90% large (several mm) euhedral nepheline. Our experimental studies of systems with apatite demonstrated the near-eutectic nature of the apatite-bearing intrusion, resulting in practically simultaneous crystallization of nepheline, apatite and pyroxene. The mathematical model of the formation of the layered apatite-bearing intrusion based on the processes of sedimentation under the conditions of steady state convection taking account of crystal sizes is proposed. Under the conditions of steady-state convection large crystals of nepheline continuously had been settling forming massive underlying urtite whereas smaller crystals of pyroxenes, nepheline and apatite had been stirred in the convecting melt. During the cooling the intensity of convection decreased causing a settling of smaller crystals of nepheline and pyroxene and later very small crystalls of apatite in the upper part of alkaline magma chamber. The Lovozero massif, the largest of the Globe layered peralkaline intrusion, comprises super-large rare-metal (Nb, Ta, REE) deposit. The main ore mineral is loparite (Na, Ce, Ca)2 (Ti, Nb)2O6 which was mined during many years. The composition of cumulus loparite changed systematically upward through the

  7. Distribution of branchial anomalies in a paediatric Asian population.

    PubMed

    Teo, Neville Wei Yang; Ibrahim, Shahrul Izham; Tan, Kun Kiaang Henry

    2015-04-01

    The objective of the present study was to review the distribution and incidence of branchial anomalies in an Asian paediatric population and highlight the challenges involved in the diagnosis of branchial anomalies. This was a retrospective chart review of all paediatric patients who underwent surgery for branchial anomalies in a tertiary paediatric hospital from August 2007 to November 2012. The clinical notes were correlated with preoperative radiological investigations, intraoperative findings and histology results. Branchial anomalies were classified based on the results of the review. A total of 28 children underwent surgery for 30 branchial anomalies during the review period. Two children had bilateral branchial anomalies requiring excision. Of the 30 branchial anomalies, 7 (23.3%) were first branchial anomalies, 5 (16.7%) were second branchial anomalies, 3 (10.0%) were third branchial anomalies, and 4 (13.3%) were fourth branchial anomalies (one of the four patients with fourth branchial anomalies had bilateral branchial anomalies). In addition, seven children had 8 (26.7%) branchial anomalies that were thought to originate from the pyriform sinus; however, we were unable to determine if these anomalies were from the third or fourth branchial arches. There was inadequate information on the remaining 3 (10.0%) branchial anomalies for classification. The incidence of second branchial anomalies appears to be lower in our Asian paediatric population, while that of third and fourth branchial anomalies was higher. Knowledge of embryology and the related anatomy of the branchial apparatus is crucial in the identification of the type of branchial anomaly.

  8. Distribution of branchial anomalies in a paediatric Asian population

    PubMed Central

    Teo, Neville Wei Yang; Ibrahim, Shahrul Izham; Tan, Kun Kiaang Henry

    2015-01-01

    INTRODUCTION The objective of the present study was to review the distribution and incidence of branchial anomalies in an Asian paediatric population and highlight the challenges involved in the diagnosis of branchial anomalies. METHODS This was a retrospective chart review of all paediatric patients who underwent surgery for branchial anomalies in a tertiary paediatric hospital from August 2007 to November 2012. The clinical notes were correlated with preoperative radiological investigations, intraoperative findings and histology results. Branchial anomalies were classified based on the results of the review. RESULTS A total of 28 children underwent surgery for 30 branchial anomalies during the review period. Two children had bilateral branchial anomalies requiring excision. Of the 30 branchial anomalies, 7 (23.3%) were first branchial anomalies, 5 (16.7%) were second branchial anomalies, 3 (10.0%) were third branchial anomalies, and 4 (13.3%) were fourth branchial anomalies (one of the four patients with fourth branchial anomalies had bilateral branchial anomalies). In addition, seven children had 8 (26.7%) branchial anomalies that were thought to originate from the pyriform sinus; however, we were unable to determine if these anomalies were from the third or fourth branchial arches. There was inadequate information on the remaining 3 (10.0%) branchial anomalies for classification. CONCLUSION The incidence of second branchial anomalies appears to be lower in our Asian paediatric population, while that of third and fourth branchial anomalies was higher. Knowledge of embryology and the related anatomy of the branchial apparatus is crucial in the identification of the type of branchial anomaly. PMID:25917471

  9. Hyperspectral anomaly detection using Sony PlayStation 3

    NASA Astrophysics Data System (ADS)

    Rosario, Dalton; Romano, João; Sepulveda, Rene

    2009-05-01

    We present a proof-of-principle demonstration using Sony's IBM Cell processor-based PlayStation 3 (PS3) to run-in near real-time-a hyperspectral anomaly detection algorithm (HADA) on real hyperspectral (HS) long-wave infrared imagery. The PS3 console proved to be ideal for doing precisely the kind of heavy computational lifting HS based algorithms require, and the fact that it is a relatively open platform makes programming scientific applications feasible. The PS3 HADA is a unique parallel-random sampling based anomaly detection approach that does not require prior spectra of the clutter background. The PS3 HADA is designed to handle known underlying difficulties (e.g., target shape/scale uncertainties) often ignored in the development of autonomous anomaly detection algorithms. The effort is part of an ongoing cooperative contribution between the Army Research Laboratory and the Army's Armament, Research, Development and Engineering Center, which aims at demonstrating performance of innovative algorithmic approaches for applications requiring autonomous anomaly detection using passive sensors.

  10. Negative magnetic anomaly over Mt. Resnik, a subaerially erupted volcanic peak beneath the West Antarctic Ice Sheet

    USGS Publications Warehouse

    Behrendt, John C.; Finn, C.; Morse, D.L.; Blankenship, D.D.

    2006-01-01

    Mt. Resnik is one of the previously reported 18 subaerially erupted volcanoes (in the West Antarctic rift system), which have high elevation and high bed relief beneath the WAIS in the Central West Antarctica (CWA) aerogeophysical survey. Mt. Resnik lies 300 m below the surface of the West Antarctic Ice Sheet (WAIS); it has 1.6 km topographic relief, and a conical form defined by radar ice-sounding of bed topography. It has an associated complex negative magnetic anomaly revealed by the CWA survey. We calculated and interpreted magnetic models fit to the Mt. Resnik anomaly as a volcanic source comprising both reversely and normally magnetized (in the present field direction) volcanic flows, 0.5-2.5-km thick, erupted subaerially during a time of magnetic field reversal. The Mt. Resnik 305-nT anomaly is part of an approximately 50- by 40-km positive anomaly complex extending about 30 km to the west of the Mt. Resnik peak, associated with an underlying source complex of about the same area, whose top is at the bed of the WAIS. The bed relief of this shallow source complex has a maximum of only about 400 m, whereas the modeled source is >3 km thick. From the spatial relationship we interpret that this source and Mt Resnik are approximately contemporaneous. Any subglacially (older?) erupted edifices comprising hyaloclastite or other volcanic debris, which formerly overlaid the source to the west, were removed by the moving WAIS into which they were injected as is the general case for the ???1000 volcanic centers at the base of the WAIS. The presence of the magnetic field reversal modeled for Mt. Resnik may represent the Bruhnes-Matayama reversal at 780 ka (or an earlier reversal). There are ???100 short-wavelength, steep-gradient, negative magnetic anomalies observed over the West Antarctic Ice Sheet (WAIS), or about 10% of the approximately 1000 short-wavelength, shallow-source, high-amplitude (50- >1000 nT) "volcanic" magnetic anomalies in the CWA survey. These

  11. Analysis of DSN software anomalies

    NASA Technical Reports Server (NTRS)

    Galorath, D. D.; Hecht, H.; Hecht, M.; Reifer, D. J.

    1981-01-01

    A categorized data base of software errors which were discovered during the various stages of development and operational use of the Deep Space Network DSN/Mark 3 System was developed. A study team identified several existing error classification schemes (taxonomies), prepared a detailed annotated bibliography of the error taxonomy literature, and produced a new classification scheme which was tuned to the DSN anomaly reporting system and encapsulated the work of others. Based upon the DSN/RCI error taxonomy, error data on approximately 1000 reported DSN/Mark 3 anomalies were analyzed, interpreted and classified. Next, error data are summarized and histograms were produced highlighting key tendencies.

  12. Associated anomalies in cases with esophageal atresia.

    PubMed

    Stoll, Claude; Alembik, Yves; Dott, Beatrice; Roth, Marie-Paule

    2017-08-01

    Esophageal atresia (EA) is a common type of congenital anomaly. The etiology of esophageal atresia is unclear and its pathogenesis is controversial. Infants with esophageal atresia often have other non-EA associated congenital anomalies. The purpose of this investigation was to assess the prevalence and the types of these associated anomalies in a defined population. The associated anomalies in cases with EA were collected in all livebirths, stillbirths, and terminations of pregnancy during 29 years in 387,067 consecutive births in the area covered by our population-based registry of congenital malformations. Of the 116 cases with esophageal atresia, representing a prevalence of 2.99 per 10,000, 54 (46.6%) had associated anomalies. There were 9 (7.8%) cases with chromosomal abnormalities including 6 trisomies 18, and 20 (17.2%) nonchromosomal recognized dysmorphic conditions including 12 cases with VACTERL association and 2 cases with CHARGE syndrome. Twenty five (21.6%) of the cases had multiple congenital anomalies (MCA). Anomalies in the cardiovascular, the digestive, the urogenital, the musculoskeletal, and the central nervous systems were the most common other anomalies. The anomalies associated with esophageal atresia could be classified into a recognizable malformation syndrome or pattern in 29 out of 54 cases (53.7%). This study included special strengths: each affected child was examined by a geneticist, all elective terminations were ascertained, and the surveillance for anomalies was continued until 2 years of age. In conclusion the overall prevalence of associated anomalies, which was close to one in two cases, emphasizes the need for a thorough investigation of cases with EA. A routine screening for other anomalies may be considered in infants and in fetuses with EA. © 2017 Wiley Periodicals, Inc.

  13. Reliable detection of fluence anomalies in EPID-based IMRT pretreatment quality assurance using pixel intensity deviations

    PubMed Central

    Gordon, J. J.; Gardner, J. K.; Wang, S.; Siebers, J. V.

    2012-01-01

    Purpose: This work uses repeat images of intensity modulated radiation therapy (IMRT) fields to quantify fluence anomalies (i.e., delivery errors) that can be reliably detected in electronic portal images used for IMRT pretreatment quality assurance. Methods: Repeat images of 11 clinical IMRT fields are acquired on a Varian Trilogy linear accelerator at energies of 6 MV and 18 MV. Acquired images are corrected for output variations and registered to minimize the impact of linear accelerator and electronic portal imaging device (EPID) positioning deviations. Detection studies are performed in which rectangular anomalies of various sizes are inserted into the images. The performance of detection strategies based on pixel intensity deviations (PIDs) and gamma indices is evaluated using receiver operating characteristic analysis. Results: Residual differences between registered images are due to interfraction positional deviations of jaws and multileaf collimator leaves, plus imager noise. Positional deviations produce large intensity differences that degrade anomaly detection. Gradient effects are suppressed in PIDs using gradient scaling. Background noise is suppressed using median filtering. In the majority of images, PID-based detection strategies can reliably detect fluence anomalies of ≥5% in ∼1 mm2 areas and ≥2% in ∼20 mm2 areas. Conclusions: The ability to detect small dose differences (≤2%) depends strongly on the level of background noise. This in turn depends on the accuracy of image registration, the quality of the reference image, and field properties. The longer term aim of this work is to develop accurate and reliable methods of detecting IMRT delivery errors and variations. The ability to resolve small anomalies will allow the accuracy of advanced treatment techniques, such as image guided, adaptive, and arc therapies, to be quantified. PMID:22894421

  14. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    PubMed

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  15. Interactive Modelling of Salinity Intrusion in the Rhine-Meuse Delta

    NASA Astrophysics Data System (ADS)

    Baart, F.; Kranenburg, W.; Luijendijk, A.

    2015-12-01

    In many delta's of the world salinity intrusion imposes limits to fresh water availability. With increasing population and industry, the need for fresh water increases. But also salinity intrusion is expected to increase due to changes in river discharge, sea level and storm characteristics. In the Rhine-Meuse delta salt intrusion is impacted by human activities as well, like deepening of waterways and opening of delta-branches closed earlier. All these developments call for increasing the understanding of the system, but also for means for policy makers, coastal planners and engineers to assess effects of changes and to explore and design measures. In our presentation we present the developments in interactive modelling of salinity intrusion in the Rhine-Meuse delta. In traditional process-based numerical modelling, impacts are investigated by researchers and engineers by following the steps of pre-defining scenario's, running the model and post-processing the results. Interactive modelling lets users adjust simulations while running. Users can for instance change river discharges or bed levels, and can add measures like changes to geometry. The model will take the adjustments into account immediately, and will directly compute the effect. In this way, a tool becomes available with which coastal planners, policy makers and engineers together can develop and evaluate ideas and designs by interacting with the numerical model. When developing interactive numerical engines, one of the challenges is to optimize the exchange of variables as e.g. salt concentration. In our case we exchange variables on a 3D grid every time step. For this, the numerical model adheres to the Basic Model Interface (http://csdms.colorado.edu/wiki), which allows external control and the exchange of variables through pointers while the model is running. In our presentation we further explain our method and show examples of interactive design of salinity intrusion measures in the Rhine

  16. Statistical downscaling forecast of Chinese winter temperature based on the autumn SST anomalies

    NASA Astrophysics Data System (ADS)

    Lu, J.

    2017-12-01

    This study investigates the impacts of the autumn sea surface temperature anomalies (SSTA) on interannual variations of Chinese winter temperature, and discusses the potential predictability of December-January-February (DJF) 2-m air temperature anomalies (TSA) over China based on the intimate linkage between the DJF TSA and autumn SSTA. According to the Empirical Orthogonal Function (EOF) analysis, three leading EOF modes jointly account for 80% of the total TSA variances and are characterized by a homogeneous spatial pattern, a north-south seesaw and a cross structure. The first three EOFs exhibit a stable feature revealed by cross-validation, suggesting the potential predictability of the DJF TSA. The EOF1 mode is influenced by changes in the intensities of the Siberian High (SH), East Asian winter monsoon (EAWM) and East Asian Trough related to an Eurasian pattern teleconnection, which can be tracked back to September-October-November (SON) SSTA associated with two SSTA tripole patterns in the North Pacific and North Atlantic, a dipole mode in the Indian Ocean and an ENSO-like mode in the equatorial and subtropical Pacific. However, the Arctic Oscillation plays an important role in the second mode. The teleconnection connecting the atmospheric circulation anomalies in two hemispheres indicates that the configuration of global SON SSTA induces the two annular modes and causes a TSA oscillation between the northern and southern parts of China. The third mode is related to the westward shift of the SH and western pathway EAWM, which are attributed to two dipole modes in the North Pacific and South Pacific, Atlantic Multidecadal Oscillation and Indian Ocean Basin Mode. Therefore a physically-based statistical model is established based on autumn SSTA indices. Cross-validation suggests that this statistical downscaling forecast model shows a good performance in predicting the DJF TSA.

  17. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.

    2013-11-14

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  18. Subsurface structure identification of active fault based on magnetic anomaly data (Case study: Toru fault in Sumatera fault system)

    NASA Astrophysics Data System (ADS)

    Simanjuntak, Andrean V. H.; Husni, Muhammad; Syirojudin, Muhammad

    2017-07-01

    Toru segment, which is one of the active faults and located in the North of Sumatra, broke in 1984 ago on Pahae Jahe's earthquake with a magnitude 6.4 at the northern part of the fault which has a length of 23 km, and also broke again at the same place in 2008. The event of recurrence is very fast, which only 25 years old have repeatedly returned. However, in the elastic rebound theory, it probably happen with a fracture 50 cm and an average of the shear velocity 20 mm/year. The average focus of the earthquake sourced at a depth of 10 km and 23 km along its fracture zones, which can generate enough shaking 7 MMI and could breaking down buildings and create landslides on the cliff. Due to its seismic activity, this study was made to identify the effectiveness of this fault with geophysical methods. Geophysical methods such as gravity, geomagnetic and seismology are powerful tools for detecting subsurface structures of local, regional as well as of global scales. This study used to geophysical methods to discuss about total intensity of the geomagnetic anomaly data, resulted in the distribution of susceptibility values corresponding to the fault movement. The geomagnetic anomalies data was obtained from Geomag, such as total intensity measured by satellite. Data acquisition have been corrected for diurnal variations and reduced by IGRF. The study of earthquake records can be used for differentiating the active and non active fault elements. Modeling has been done using several methods, such as pseudo-gravity, reduce to pole, and upward or downward continuation, which is used to filter the geomagnetic anomaly data because the data has not fully representative of the fault structure. The results indicate that rock layers of 0 - 100 km depth encountered the process of intrusion and are dominated by sedimentary rocks that are paramagnetic, and that the ones of 100 - 150 km depth experienced the activity of subducting slab consisting of basalt and granite which are

  19. Hydrogeologic conditions and saline-water intrusion, Cape Coral, Florida, 1978-81

    USGS Publications Warehouse

    Fitzpatrick, D.J.

    1986-01-01

    The upper limestone unit of the intermediate aquifer system, locally called the upper Hawthorn aquifer, is the principal source of freshwater for Cape Coral, Florida. The aquifer has been contaminated with saline water by downward intrusion from the surficial aquifer system and by upward intrusion from the Floridan aquifer system. Much of the intrusion has occurred through open wellbores where steel casings are short or where casings have collapsed because of corrosion. Saline-water contamination of the upper limestone unit due to downward intrusion from the surficial aquifer is most severe in the southern and eastern parts of Cape Coral; contamination due to upward intrusion has occurred in many areas throughout Cape Coral. Intrusion is amplified in areas of heavy water withdrawals and large water-level declines. (USGS)

  20. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    PubMed

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  1. Enabling NLDAS-2 Anomaly Analysis Using Giovanni

    NASA Astrophysics Data System (ADS)

    Loeser, C.; Rui, H.; Teng, W. L.; Vollmer, B.; Mocko, D. M.

    2017-12-01

    A newly implemented feature in Giovanni (GES DISC Interactive Online Visualization and Analysis Interface) allows users to explore and visualize anomaly data from the NLDAS-2 Primary Forcing and Noah model data sets. For a given measurement and location, an anomaly describes how conditions for a particular time period compare to normal conditions, based on long-term averages. Analyzing anomalies is important for monitoring droughts, determining weather trends, and studying land surface processes relevant for meteorology, hydrology, and climate. Using Giovanni to analyze anomalies for NLDAS-2 data allows for these studies to be efficiently conducted for the central North American region. Phase 2 of NLDAS (NLDAS-2) currently runs at an 1/8th degree resolution, in near-real time, with data sets extending back to January 1979. NLDAS-2 provides data for soil moisture, precipitation, temperature, and other hydrology measurements. Hourly, monthly, and 30-year (1980-2009) monthly climatology data are available for several land surface models and forcing data sets. The Giovanni anomaly tool calculates monthly anomalies, for a given user-defined variable, as the difference between the NLDAS-2 monthly climatology data and the monthly data. The resulting anomaly describes how a chosen month compares to the 30-year monthly average. The presentation will demonstrate the capabilities and usefulness of Giovanni's anomaly tool, detail the recently added NLDAS-2 variables for which anomalies are available, and show how users can access the data.

  2. Enabling NLDAS-2 Anomaly Analysis Using Giovanni

    NASA Technical Reports Server (NTRS)

    Loeser, Carlee; Rui, Hualan; Teng, William; Vollmer, Bruce; Mocko, David

    2017-01-01

    A newly implemented feature in Giovanni (GES DISC Interactive Online Visualization and Analysis Interface) allows users to explore and visualize anomaly data from the NLDAS-2 Primary Forcing and Noah model data sets. For a given measurement and location, an anomaly describes how conditions for a particular time period compare to normal conditions, based on long-term averages. Analyzing anomalies is important for monitoring droughts, determining weather trends, and studying land surface processes relevant for meteorology, hydrology, and climate. Using Giovanni to analyze anomalies for NLDAS-2 data allows for these studies to be efficiently conducted for the central North American region. Phase 2 of NLDAS (NLDAS-2) currently runs at an 1/8th degree resolution, in near-real time, with data sets extending back to January 1979. NLDAS-2 provides data for soil moisture, precipitation, temperature, and other hydrology measurements. Hourly, monthly, and 30-year (1980-2009) monthly climatology data are available for several land surface models and forcing data sets. The Giovanni anomaly tool calculates monthly anomalies, for a given user-defined variable, as the difference between the NLDAS-2 monthly climatology data and the monthly data. The resulting anomaly describes how a chosen month compares to the 30-year monthly average. The presentation will demonstrate the capabilities and usefulness of Giovanni's anomaly tool, detail the recently added NLDAS-2 variables for which anomalies are available, and show how users can access the data.

  3. Simultaneous lidar observations of the water vapor and ozone signatures of a stratospheric intrusion during the MOHAVE-2009 campaign

    NASA Astrophysics Data System (ADS)

    Leblanc, T.; McDermid, I. S.; Pérot, K.

    2010-12-01

    Ozone and water vapor signatures of a stratospheric intrusion were simultaneously observed by the Jet Propulsion Laboratory lidars located at Table Mountain Facility, California (TMF, 34.4N, 117.7W) during the Measurements of Humidity in the Atmosphere and Validation Experiments (MOHAVE-2009) campaign in October 2009. These observations are placed in the context of the meridional displacement and folding of the tropopause, and resulting contrast in the properties of the air masses sampled by lidar. The lidar observations are supported by model data, specifically potential vorticity fields advected by the high-resolution transport model MIMOSA, and by 10-day backward isentropic trajectories. The ozone and water vapor anomalies measured by lidar were largely anti-correlated, and consistent with the assumption of a wet and ozone-poor subtropical upper troposphere, and a dry and ozone-rich extra-tropical lowermost stratosphere. However, it is shown that this anti-correlation relation collapsed just after the stratospheric intrusion event of October 20, suggesting mixed air embedded along the subtropical jet stream and sampled by lidar during its displacement south of TMF (tropopause fold). The ozone-PV expected positive correlation relation held strongly throughout the measurement period, including when a lower polar stratospheric filament passed over TMF just after the stratospheric intrusion. The numerous highly-correlated signatures observed during this event demonstrate the strong capability of the water vapor and ozone lidars at TMF, and provide new confidence in the future detection by lidar of long-term variability of water vapor and ozone in the Upper Troposphere-Lower Stratosphere (UTLS).

  4. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  5. Aeromagnetic mapping of the structure of Pine Canyon caldera and Chisos Mountains intrusion, Big Bend National Park, Texas

    USGS Publications Warehouse

    Drenth, B.J.; Finn, C.A.

    2007-01-01

    Analysis of aeromagnetic and gravity data reveals new details of the structure, igneous geology, and temporal evolution of the prominent, enigmatic ca.32 Ma Pine Canyon caldera and the Chisos Mountains (Big Bend National Park, Texas). The main caldera-filling Pine Canyon Rhyolite, the oldest member of the South Rim Formation, is reversely magnetized, allowing it to be used as a key marker bed for determining caldera fill thickness. Modeling of gravity and magnetic anomalies indicates that the Pine Canyon Rhyolite is probably thicker in the northeastern part of the caldera. Lineaments in the magnetic data suggest the presence of buried faults beneath the caldera that may have led to increased downdrop in the northeast versus the southwest, allowing a thicker section of caldera fill to accumulate there. The Pine Canyon caldera has been interpreted as a downsag caldera because it lacks surficial faulting, so these inferred faults are the first mapped features there that could be responsible for caldera collapse. The caldera boundary correlates well with the margins of a gravity low. General features of the caldera match well with basic models of downsag calderas, meaning that the Pine Canyon caldera may be a classic example of downsagging, of which few well-described examples exist, in terms of a geophysical signature. The source of a long-wavelength magnetic high over the Chisos Mountains is interpreted as a previously unknown broad intrusion, the long axis of which trends parallel to a major crustal boundary related to the Ouachita orogeny or an even earlier Precambrian margin. This feature represents the largest intrusion (28-34 km diameter, 1-4 km thick, 700-3000 km3 in volume) in an area where relatively small laccoliths are ubiquitous. The intrusion most likely represents a long-lived (>1 m.y.) reservoir replenished by small batches of magma of varying composition, as reflected in the variation of eruptive products from the Pine Canyon and Sierra Quemada

  6. Stuck in the spin cycle: Avoidance and intrusions following breast cancer diagnosis.

    PubMed

    Bauer, Margaret R; Wiley, Joshua F; Weihs, Karen L; Stanton, Annette L

    2017-09-01

    Theories and research regarding cognitive and emotional processing during the experience of profound stressors suggest that the presence of intrusive thoughts and feelings predicts greater use of avoidance and that the use of avoidance paradoxically predicts more intrusions. However, empirical investigations of their purported bidirectional relationship are limited. This study presents a longitudinal investigation of the reciprocal relationship between intrusions and avoidance coping over a 6-month period in the year following breast cancer diagnosis. Breast cancer patients (N = 460) completed measures of cancer-related intrusions and avoidance at study entry, 3 months, and 6 months later (i.e., an average of 2, 5, and 8 months after diagnosis, respectively). Cross-lagged panel analyses revealed that intrusive thoughts, feelings, and images at study entry predicted greater avoidance 3 months later, and avoidance coping at study entry predicted intrusions 3 months later, controlling for the stability of intrusions and avoidance as well as time since diagnosis. Findings were not statistically significant for avoidance predicting intrusions, or vice versa, between the 3-month and the 6-month assessment period, during which they declined. These findings provide empirical support for the theoretical contention that avoidance and intrusive thoughts and emotions reciprocally influence one another following stressful events. Additionally, in the months shortly after breast cancer diagnosis, intrusions and avoidance are positively related. However, the relationships attenuate over time, which could indicate resolved cognitive and emotional processing of the cancer experience. Statement of contribution What is already known on this subject? Following stressful life events, individuals often experience intrusive thoughts and feelings related to the event and they report avoidance of such reminders. Many studies demonstrate that greater intrusions predict more

  7. Opportunities and Barriers to Address Seawater Intrusion Along California's Coast

    NASA Astrophysics Data System (ADS)

    Langridge, R.

    2016-12-01

    In many California coastal areas reliant on groundwater seawater intrusion is a serious problem. This presentation will discuss how particular groundwater management institutions in the state are addressing seawater intrusion issues, how stakeholders are participating in this process, and how scientific information can contribute to policies that support reducing or halting ongoing intrusion. In 2014, the California Legislature passed the Sustainable Groundwater Management Act (SGMA). The Act established requirements for 127 high and medium priority groundwater basins to form groundwater sustainability agencies (GSAs) and develop plans to sustainably manage their basin. Sustainable is defined in SGMA as avoiding specific unacceptable impacts, including significant and unreasonable seawater intrusion. Special Act Districts, created by an act of the legislature, have the option to be the sole GSA in their service area, and they can provide a window into current and potentially future strategies to address seawater intrusion. Additionally, adjudicated basins are often considered one of the best approaches to achieve efficient groundwater management, and these basins are exempt from SGMA and managed pursuant to a court judgment. The strategies utilized to manage seawater intrusion by three special act districts and five adjudicated basins will be discussed. These basins cover significant areas of central and southern California and all have experienced seawater intrusion. Our research team just completed reports for the State Water Resources Control Board on all the adjudicated and special act districts in the state, and this presentation will draw on our findings to better understand the barriers and opportunities to alleviate seawater intrusion and the information required to develop solutions.

  8. Prevalence of dental developmental anomalies: a radiographic study.

    PubMed

    Ezoddini, Ardakani F; Sheikhha, M H; Ahmadi, H

    2007-09-01

    To determine the prevalence of developmental dental anomalies in patients attending the Dental Faculty of Medical University of Yazd, Iran and the gender differences of these anomalies. A retrospective study based on the panoramic radiographs of 480 patients. Patients referred for panoramic radiographs were clinically examined, a detailed family history of any dental anomalies in their first and second degree relatives was obtained and finally their radiographs were studied in detail for the presence of dental anomalies. 40.8% of the patients had dental anomalies. The more common anomalies were dilaceration (15%), impacted teeth (8.3%) and taurodontism (7.5%) and supernumerary teeth (3.5%). Macrodontia and fusion were detected in a few radiographs (0.2%). 49.1% of male patients had dental anomalies compared to 33.8% of females. Dilaceration, taurodontism and supernumerary teeth were found to be more prevalent in men than women, whereas impacted teeth, microdontia and gemination were more frequent in women. Family history of dental anomalies was positive in 34% of the cases.. Taurodontism, gemination, dens in dente and talon cusp were specifically limited to the patients under 20 year's old, while the prevalence of other anomalies was almost the same in all groups. Dilaceration, impaction and taurodontism were relatively common in the studied populaton. A family history of dental anomalies was positive in a third of cases.

  9. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  10. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    NASA Astrophysics Data System (ADS)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  11. Body, mother, mind: anorexia, femininity and the intrusive object.

    PubMed

    Lawrence, Marilyn

    2002-08-01

    This paper takes as its starting point the preponderance of female to male patients who suffer from anorexia. The author suggests that there may be something specific about certain experiences of femaleness which predispose towards anxieties of intrusion. Two contemporary theories of the aetiology of anorexia are outlined. Both of these suggest that the problem has its origins in intrusion or invasion of different sorts. The author suggests that many women who suffer from anorexia have an intrusive object instated in their minds, which may not necessarily be the result of actual intrusions in external reality. In the final part of the paper, the author examines the intrusiveness of anorexic patients in the transference and suggests that such patients very often harbour profound phantasies of intruding between the parents, with a wish to regain their special place with mother, untroubled by the presence of father. It is further suggested that the psychopathology underlying certain cases of anorexia leads to a failure in symbolisation. This failure in turn complicates the clinical picture, making such patients particularly difficult to think with about their difficulties.

  12. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks

    PubMed Central

    Navia, Marlon; Campelo, Jose C.; Bonastre, Alberto; Ors, Rafael; Capella, Juan V.; Serrano, Juan J.

    2015-01-01

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature. PMID:26393604

  13. Detailed gravity anomalies from GEOS-3 satellite altimetry data

    NASA Technical Reports Server (NTRS)

    Gopalapillai, G. S.; Mourad, A. G.

    1978-01-01

    A technique for deriving mean gravity anomalies from dense altimetry data was developed. A combination of both deterministic and statistical techniques was used. The basic mathematical model was based on the Stokes' equation which describes the analytical relationship between mean gravity anomalies and geoid undulations at a point; this undulation is a linear function of the altimetry data at that point. The overdetermined problem resulting from the excessive altimetry data available was solved using Least-Squares principles. These principles enable the simultaneous estimation of the associated standard deviations reflecting the internal consistency based on the accuracy estimates provided for the altimetry data as well as for the terrestrial anomaly data. Several test computations were made of the anomalies and their accuracy estimates using GOES-3 data.

  14. Overgrowth syndromes with vascular anomalies.

    PubMed

    Blei, Francine

    2015-04-01

    Overgrowth syndromes with vascular anomalies encompass entities with a vascular anomaly as the predominant feature vs those syndromes with predominant somatic overgrowth and a vascular anomaly as a more minor component. The focus of this article is to categorize these syndromes phenotypically, including updated clinical criteria, radiologic features, evaluation, management issues, pathophysiology, and genetic information. A literature review was conducted in PubMed using key words "overgrowth syndromes and vascular anomalies" as well as specific literature reviews for each entity and supportive genetic information (e.g., somatic mosaicism). Additional searches in OMIM and Gene Reviews were conducted for each syndrome. Disease entities were categorized by predominant clinical features, known genetic information, and putative affected signaling pathway. Overgrowth syndromes with vascular anomalies are a heterogeneous group of disorders, often with variable clinical expression, due to germline or somatic mutations. Overgrowth can be focal (e.g., macrocephaly) or generalized, often asymmetrically (and/or mosaically) distributed. All germ layers may be affected, and the abnormalities may be progressive. Patients with overgrowth syndromes may be at an increased risk for malignancies. Practitioners should be attentive to patients having syndromes with overgrowth and vascular defects. These patients require proactive evaluation, referral to appropriate specialists, and in some cases, early monitoring for potential malignancies. Progress in identifying vascular anomaly-related overgrowth syndromes and their genetic etiology has been robust in the past decade and is contributing to genetically based prenatal diagnosis and new therapies targeting the putative causative genetic mutations. Copyright © 2015 Mosby, Inc. All rights reserved.

  15. Anomaly Monitoring Method for Key Components of Satellite

    PubMed Central

    Fan, Linjun; Xiao, Weidong; Tang, Jun

    2014-01-01

    This paper presented a fault diagnosis method for key components of satellite, called Anomaly Monitoring Method (AMM), which is made up of state estimation based on Multivariate State Estimation Techniques (MSET) and anomaly detection based on Sequential Probability Ratio Test (SPRT). On the basis of analysis failure of lithium-ion batteries (LIBs), we divided the failure of LIBs into internal failure, external failure, and thermal runaway and selected electrolyte resistance (R e) and the charge transfer resistance (R ct) as the key parameters of state estimation. Then, through the actual in-orbit telemetry data of the key parameters of LIBs, we obtained the actual residual value (R X) and healthy residual value (R L) of LIBs based on the state estimation of MSET, and then, through the residual values (R X and R L) of LIBs, we detected the anomaly states based on the anomaly detection of SPRT. Lastly, we conducted an example of AMM for LIBs, and, according to the results of AMM, we validated the feasibility and effectiveness of AMM by comparing it with the results of threshold detective method (TDM). PMID:24587703

  16. Thermal Infrared Anomalies of Several Strong Earthquakes

    PubMed Central

    Wei, Congxin; Guo, Xiao; Qin, Manzhong

    2013-01-01

    In the history of earthquake thermal infrared research, it is undeniable that before and after strong earthquakes there are significant thermal infrared anomalies which have been interpreted as preseismic precursor in earthquake prediction and forecasting. In this paper, we studied the characteristics of thermal radiation observed before and after the 8 great earthquakes with magnitude up to Ms7.0 by using the satellite infrared remote sensing information. We used new types of data and method to extract the useful anomaly information. Based on the analyses of 8 earthquakes, we got the results as follows. (1) There are significant thermal radiation anomalies before and after earthquakes for all cases. The overall performance of anomalies includes two main stages: expanding first and narrowing later. We easily extracted and identified such seismic anomalies by method of “time-frequency relative power spectrum.” (2) There exist evident and different characteristic periods and magnitudes of thermal abnormal radiation for each case. (3) Thermal radiation anomalies are closely related to the geological structure. (4) Thermal radiation has obvious characteristics in abnormal duration, range, and morphology. In summary, we should be sure that earthquake thermal infrared anomalies as useful earthquake precursor can be used in earthquake prediction and forecasting. PMID:24222728

  17. Thermal infrared anomalies of several strong earthquakes.

    PubMed

    Wei, Congxin; Zhang, Yuansheng; Guo, Xiao; Hui, Shaoxing; Qin, Manzhong; Zhang, Ying

    2013-01-01

    In the history of earthquake thermal infrared research, it is undeniable that before and after strong earthquakes there are significant thermal infrared anomalies which have been interpreted as preseismic precursor in earthquake prediction and forecasting. In this paper, we studied the characteristics of thermal radiation observed before and after the 8 great earthquakes with magnitude up to Ms7.0 by using the satellite infrared remote sensing information. We used new types of data and method to extract the useful anomaly information. Based on the analyses of 8 earthquakes, we got the results as follows. (1) There are significant thermal radiation anomalies before and after earthquakes for all cases. The overall performance of anomalies includes two main stages: expanding first and narrowing later. We easily extracted and identified such seismic anomalies by method of "time-frequency relative power spectrum." (2) There exist evident and different characteristic periods and magnitudes of thermal abnormal radiation for each case. (3) Thermal radiation anomalies are closely related to the geological structure. (4) Thermal radiation has obvious characteristics in abnormal duration, range, and morphology. In summary, we should be sure that earthquake thermal infrared anomalies as useful earthquake precursor can be used in earthquake prediction and forecasting.

  18. Impact of exogenous cortisol on the formation of intrusive memories in healthy women.

    PubMed

    Rombold, Felicitas; Wingenfeld, Katja; Renneberg, Babette; Schwarzkopf, Friederike; Hellmann-Regen, Julian; Otte, Christian; Roepke, Stefan

    2016-12-01

    Stress hormones such as cortisol are involved in modulating emotional memory. However, little is known about the influence of cortisol on the formation of intrusive memories after a traumatic event. The aim of this study was to examine whether cortisol levels during encoding and consolidation of an intrusion-inducing trauma film paradigm would influence subsequent intrusion formation. In an experimental, double-blind, placebo-controlled study a trauma film paradigm was used to induce intrusions in 60 healthy women. Participants received a single dose of either 20 mg hydrocortisone or placebo before watching a trauma film. Salivary cortisol and alpha-amylase as well as blood pressure were measured during the experiment. The consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions resulting from the trauma film were assessed throughout the following seven days. Hydrocortisone administration before the trauma film resulted in increased salivary cortisol levels but did not affect the consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions throughout the following week. These results indicate that pharmacologically increased cortisol levels during an experimental trauma film paradigm do not influence consecutive intrusive memories. Current data do not support a prominent role of exogenous cortisol on intrusive memories, at least in healthy young women after a relatively mild trauma equivalent. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Performance Assessment of Network Intrusion-Alert Prediction

    DTIC Science & Technology

    2012-09-01

    the threats. In this thesis, we use Snort to generate the intrusion detection alerts. 2. SNORT Snort is an open source network intrusion...standard for IPS. (Snort, 2012) We choose Snort because it is an open source product that is free to download and can be deployed cross-platform...Learning & prediction in relational time series: A survey. 21st Behavior Representation in Modeling & Simulation ( BRIMS ) Conference 2012, 93–100. Tan

  20. Visual behavior characterization for intrusion and misuse detection

    NASA Astrophysics Data System (ADS)

    Erbacher, Robert F.; Frincke, Deborah

    2001-05-01

    As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.

  1. Evidence of Urban Precipitation Anomalies from Satellite and Ground-Based Measurements

    NASA Technical Reports Server (NTRS)

    Shepherd, J. Marshall; Manyin, M.; Negri, Andrew

    2004-01-01

    Urbanization is one of the extreme cases of land use change. Most of world's population has moved to urban areas. Although currently only 1.2% of the land is considered urban, the spatial coverage and density of cities are expected to rapidly increase in the near future. It is estimated that by the year 2025, 60% of the world's population will live in cities. Human activity in urban environments also alters weather and climate processes. However, our understanding of urbanization on the total Earth-weather-climate system is incomplete. Recent literature continues to provide evidence that anomalies in precipitation exist over and downwind of major cities. Current and future research efforts are actively seeking to verify these literature findings and understand potential cause-effect relationships. The novelty of this study is that it utilizes rainfall data from multiple satellite data sources (e.g. TRMM precipitation radar, TRMM-geosynchronous-rain gauge merged product, and SSM/I) and ground-based measurements to identify spatial anomalies and temporal trends in precipitation for cities around the world. Early results will be presented and placed within the context of weather prediction, climate assessment, and societal applications.

  2. Evidence of Urban Precipitation Anomalies from Satellite and Ground-Based Measurements

    NASA Technical Reports Server (NTRS)

    Shepherd, J. M.; Manyin, M.; Negri, A.

    2004-01-01

    Urbanization is one of the extreme cases of land use change. Most of world s population has moved to urban areas. Although currently only 1.2% of the land is considered urban, the spatial coverage and density of cities are expected to rapidly increase in the near future. It is estimated that by the year 2025,60% of the world s population will live in cities. Human activity in urban environments also alters weather and climate processes. However, our understanding of urbanization on the total Earth-weather-climate system is incomplete. Recent literature continues to provide evidence that anomalies in precipitation exist over and downwind of major cities. Current and future research efforts are actively seeking to verify these literature findings and understand potential cause- effect relationships. The novelty of this study is that it utilizes rainfall data from multiple satellite data sources (e.g. TRMM precipitation radar, TRMM-geosynchronous-rain gauge merged product, and SSM/I) and ground-based measurements to identify spatial anomalies and temporal trends in precipitation for cities around the world. Early results will be presented and placed within the context of weather prediction, climate assessment, and societal applications.

  3. Toddler Inhibited Temperament, Maternal Cortisol Reactivity and Embarrassment, and Intrusive Parenting

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2013-01-01

    The relevance of parenting behavior to toddlers’ development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers’ inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multi-method approach would acknowledge that several levels of processes determine mothers’ experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers’ inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-olds toddlers and their mothers. Toddlers’ inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PMID:23750532

  4. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    USGS Publications Warehouse

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  5. Linking entanglement and discrete anomaly

    NASA Astrophysics Data System (ADS)

    Hung, Ling-Yan; Wu, Yong-Shi; Zhou, Yang

    2018-05-01

    In 3 d Chern-Simons theory, there is a discrete one-form symmetry, whose symmetry group is isomorphic to the center of the gauge group. We study the `t Hooft anomaly associated to this discrete one-form symmetry in theories with generic gauge groups, A, B, C, D-types. We propose to detect the discrete anomaly by computing the Hopf state entanglement in the subspace spanned by the symmetry generators and develop a systematical way based on the truncated modular S matrix. We check our proposal for many examples.

  6. An incremental anomaly detection model for virtual machines.

    PubMed

    Zhang, Hancui; Chen, Shuyu; Liu, Jun; Zhou, Zhen; Wu, Tianshu

    2017-01-01

    Self-Organizing Map (SOM) algorithm as an unsupervised learning method has been applied in anomaly detection due to its capabilities of self-organizing and automatic anomaly prediction. However, because of the algorithm is initialized in random, it takes a long time to train a detection model. Besides, the Cloud platforms with large scale virtual machines are prone to performance anomalies due to their high dynamic and resource sharing characters, which makes the algorithm present a low accuracy and a low scalability. To address these problems, an Improved Incremental Self-Organizing Map (IISOM) model is proposed for anomaly detection of virtual machines. In this model, a heuristic-based initialization algorithm and a Weighted Euclidean Distance (WED) algorithm are introduced into SOM to speed up the training process and improve model quality. Meanwhile, a neighborhood-based searching algorithm is presented to accelerate the detection time by taking into account the large scale and high dynamic features of virtual machines on cloud platform. To demonstrate the effectiveness, experiments on a common benchmark KDD Cup dataset and a real dataset have been performed. Results suggest that IISOM has advantages in accuracy and convergence velocity of anomaly detection for virtual machines on cloud platform.

  7. Network traffic anomaly prediction using Artificial Neural Network

    NASA Astrophysics Data System (ADS)

    Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea

    2017-03-01

    As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.

  8. Clustering and Recurring Anomaly Identification: Recurring Anomaly Detection System (ReADS)

    NASA Technical Reports Server (NTRS)

    McIntosh, Dawn

    2006-01-01

    This viewgraph presentation reviews the Recurring Anomaly Detection System (ReADS). The Recurring Anomaly Detection System is a tool to analyze text reports, such as aviation reports and maintenance records: (1) Text clustering algorithms group large quantities of reports and documents; Reduces human error and fatigue (2) Identifies interconnected reports; Automates the discovery of possible recurring anomalies; (3) Provides a visualization of the clusters and recurring anomalies We have illustrated our techniques on data from Shuttle and ISS discrepancy reports, as well as ASRS data. ReADS has been integrated with a secure online search

  9. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  10. Simple, Efficient, and Rapid Methods to Determine the Potential for Vapor Intrusion into the Home: Temporal Trends, Vapor Intrusion Forecasting, Sampling Strategies, and Contaminant Migration Routes

    EPA Science Inventory

    Current practice for evaluating the vapor intrusion pathway involves a multiple line of evidence approach based on direct measurements of volatile organic compound (VOC) concentrations in groundwater, external soil gas, subslab soil gas, and/or indoor air. No single line of evide...

  11. Branchial anomalies in children.

    PubMed

    Bajaj, Y; Ifeacho, S; Tweedie, D; Jephson, C G; Albert, D M; Cochrane, L A; Wyatt, M E; Jonas, N; Hartley, B E J

    2011-08-01

    Branchial cleft anomalies are the second most common head and neck congenital lesions seen in children. Amongst the branchial cleft malformations, second cleft lesions account for 95% of the branchial anomalies. This article analyzes all the cases of branchial cleft anomalies operated on at Great Ormond Street Hospital over the past 10 years. All children who underwent surgery for branchial cleft sinus or fistula from January 2000 to December 2010 were included in this study. In this series, we had 80 patients (38 female and 42 male). The age at the time of operation varied from 1 year to 14 years. Amongst this group, 15 patients had first branchial cleft anomaly, 62 had second branchial cleft anomaly and 3 had fourth branchial pouch anomaly. All the first cleft cases were operated on by a superficial parotidectomy approach with facial nerve identification. Complete excision was achieved in all these first cleft cases. In this series of first cleft anomalies, we had one complication (temporary marginal mandibular nerve weakness. In the 62 children with second branchial cleft anomalies, 50 were unilateral and 12 were bilateral. In the vast majority, the tract extended through the carotid bifurcation and extended up to pharyngeal constrictor muscles. Majority of these cases were operated on through an elliptical incision around the external opening. Complete excision was achieved in all second cleft cases except one who required a repeat excision. In this subgroup, we had two complications one patient developed a seroma and one had incomplete excision. The three patients with fourth pouch anomaly were treated with endoscopic assisted monopolar diathermy to the sinus opening with good outcome. Branchial anomalies are relatively common in children. There are three distinct types, first cleft, second cleft and fourth pouch anomaly. Correct diagnosis is essential to avoid inadequate surgery and multiple procedures. The surgical approach needs to be tailored to the type

  12. Railway clearance intrusion detection method with binocular stereo vision

    NASA Astrophysics Data System (ADS)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  13. Detailed gravity anomalies from Geos 3 satellite altimetry data

    NASA Technical Reports Server (NTRS)

    Gopalapillai, G. S.; Mourad, A. G.

    1979-01-01

    Detailed gravity anomalies are computed from a combination of Geos 3 satellite altimeter and terrestrial gravity data using least-squares principles. The mathematical model used is based on the Stokes' equation modified for a nonglobal solution. Using Geos 3 data in the calibration area, the effects of several anomaly parameter configurations and data densities/distributions on the anomalies and their accuracy estimates are studied. The accuracy estimates for 1 deg x 1 deg mean anomalies from low density altimetry data are of the order of 4 mgal. Comparison of these anomalies with the terrestrial data and also with Rapp's data derived using collocation techniques show rms differences of 7.2 and 4.9 mgal, respectively. Indications are that the anomaly accuracies can be improved to about 2 mgal with high density data. Estimation of 30 in. x 30 in. mean anomalies indicates accuracies of the order of 5 mgal. Proper verification of these results will be possible only when accurate ground truth data become available.

  14. Posterior fossa anomalies diagnosed with fetal MRI: associated anomalies and neurodevelopmental outcomes.

    PubMed

    Patek, Kyla J; Kline-Fath, Beth M; Hopkin, Robert J; Pilipenko, Valentina V; Crombleholme, Timothy M; Spaeth, Christine G

    2012-01-01

    The purpose of this study was to describe the relationship between intracranial and extracranial anomalies and neurodevelopmental outcome for fetuses diagnosed with a posterior fossa anomaly (PFA) on fetal MRI. Cases of Dandy-Walker malformation, vermian hypogenesis/hypoplasia, and mega cisterna magna (MCM) were identified through the Fetal Care Center of Cincinnati between January 2004 and December 2010. Parental interview and retrospective chart review were used to assess neurodevelopmental outcome. Posterior fossa anomalies were identified in 59 fetuses; 9 with Dandy-Walker malformation, 36 with vermian hypogenesis/hypoplasia, and 14 with MCM. Cases with isolated PFAs (14/59) had better outcomes than those with additional anomalies (p = 0.00016), with isolated cases of MCM all being neurodevelopmentally normal. Cases with additional intracranial anomalies had a worse outcome than those without intracranial anomalies (p = 0.00017). The presence of extracranial anomalies increased the likelihood of having a poor outcome (p = 0.00014) as did the identification of an abnormal brainstem (p = 0.00018). Intracranial and extracranial anomalies were good predictors of neurodevelopmental outcome in this study. The prognosis was poor for individuals with an abnormal brainstem, whereas those with isolated MCM had normal neurodevelopmental outcome. © 2012 John Wiley & Sons, Ltd.

  15. Cervical vertebral anomalies in patients with anomalies of the head and neck.

    PubMed

    Manaligod, J M; Bauman, N M; Menezes, A H; Smith, R J

    1999-10-01

    Congenital head and neck anomalies can occur in association with vertebral anomalies, particularly of the cervical vertebrae. While the former are easily recognized, especially when part of a syndrome, the latter are often occult, thereby delaying their diagnosis. The presence of vertebral anomalies must be considered in pediatric patients with head and neck abnormalities to expedite management of select cases and to prevent neurologic injury. We present our experience with 5 pediatric patients who were referred to the Department of Otolaryngology-Head and Neck Surgery at the University of Iowa with a variety of syndromic anomalies of the head and neck. Each patient was subsequently also found to have a vertebral anomaly. The relevant embryogenesis of the anomalous structures is discussed, with highlighting of potential causes such as teratogenic agents and events and germ-line mutations. A review of syndromes having both head and neck and vertebral anomalies is presented to heighten awareness of otolaryngologists evaluating children with syndromic disorders. Finally, the findings on radiographic imaging studies, particularly computed tomography, are discussed to facilitate the prompt diagnosis of vertebral anomalies.

  16. BTSC VAPOR INSTRUSION PRIMER "VAPOR INTRUSION CONSIDERATION FOR REDEVELOPMENT"

    EPA Science Inventory

    This primer is designed for brownfields stakeholders concerned about vapor intrusion, including property owners, real estate developers, and contractors performing environmental site investigations. It provides an overview of the vapor intrusion issue and how it can impact the ap...

  17. Precambrian basement geologic map of Montana; an interpretation of aeromagnetic anomalies

    USGS Publications Warehouse

    Sims, P.K.; O'Neill, J. M.; Bankey, Viki; Anderson, E.

    2004-01-01

    Newly compiled aeromagnetic anomaly data of Montana, in conjunction with the known geologic framework of basement rocks, have been combined to produce a new interpretive geologic basement map of Montana. Crystalline basement rocks compose the basement, but are exposed only in the cores of mountain ranges in southwestern Montana. Principal features deduced from the map are: (1) A prominent northeast-trending, 200-km-wide zone of spaced negative anomalies, which extends more than 700 km from southwestern Montana's Beaverhead Mountains to the Canadian border and reflects suturing of the Archean Mexican Hat Block against the Archean Wyoming Province along the Paleoproterozoic Trans-Montana Orogen (new name) at about 1.9-1.8 Ga; (2) North-northwest-trending magnetic lows in northeastern Montana, which reflect the 1.9-1.8 Ga Trans-Hudson Orogen and truncate the older Trans-Montana Zone; and (3) Subtle northwest- and west-trending negative anomalies in central and western Montana, which represent the northernmost segment of brittle-ductile transcurrent faults of the newly recognized Mesoproterozoic Trans-Rocky Mountain fault system. Structures developed in the Proterozoic provided zones of crustal weakness reactivated during younger Proterozoic and Phanerozoic igneous and tectonic activity. For example, the Trans-Montana Zone guided basement involved thrust faulting in southwestern Montana during the Sevier Orogeny. The Boulder Batholith and associated ore deposits and the linear belt of alkaline intrusions to the northeast were localized along a zone of weakness between the Missouri River suture and the Dillon shear zone of the Trans-Montana Orogen. The northwest-trending faults of Trans-Rocky Mountain system outline depocenters for sedimentary rocks in the Belt Basin. This fault system provided zones of weakness that guided Laramide uplifts during basement crustal shortening. Northwest-trending zones have been locally reactivated during Neogene basin-range extension.

  18. Distribution of female genital tract anomalies in two classifications.

    PubMed

    Heinonen, Pentti K

    2016-11-01

    This study assessed the distribution of Müllerian duct anomalies in two verified classifications of female genital tract malformations, and the presence of associated renal defects. 621 women with confirmed female genital tract anomalies were retrospectively grouped under the European (ESHRE/ESGE) and the American (AFS) classification. The diagnosis of uterine malformation was based on findings in hysterosalpingography, two-dimensional ultrasonography, endoscopies, laparotomy, cesarean section and magnetic resonance imaging in 97.3% of cases. Renal status was determined in 378 patients, including 5 with normal uterus and vagina. The European classification covered all 621 women studied. Uterine anomalies without cervical or vaginal anomaly were found in 302 (48.6%) patients. Uterine anomaly was associated with vaginal anomaly in 45.2%, and vaginal anomaly alone was found in 26 (4.2%) cases. Septate uterus was the most common (49.1%) of all genital tract anomalies, followed by bicorporeal uteri (18.2%). The American classification covered 590 (95%) out of the 621 women with genital tract anomalies. The American system did not take into account vaginal anomalies in 170 (34.7%) and cervical anomalies in 174 (35.5%) out of 490 cases with uterine malformations. Renal abnormalities were found in 71 (18.8%) out of 378 women, unilateral renal agenesis being the most common defect (12.2%), also found in 4 women without Müllerian duct anomaly. The European classification sufficiently covered uterine and vaginal abnormalities. The distribution of the main uterine anomalies was equal in both classifications. The American system missed cervical and vaginal anomalies associated with uterine anomalies. Evaluation of renal system is recommended for all patients with genital tract anomalies. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. Analysis of spacecraft anomalies

    NASA Technical Reports Server (NTRS)

    Bloomquist, C. E.; Graham, W. C.

    1976-01-01

    The anomalies from 316 spacecraft covering the entire U.S. space program were analyzed to determine if there were any experimental or technological programs which could be implemented to remove the anomalies from future space activity. Thirty specific categories of anomalies were found to cover nearly 85 percent of all observed anomalies. Thirteen experiments were defined to deal with 17 of these categories; nine additional experiments were identified to deal with other classes of observed and anticipated anomalies. Preliminary analyses indicate that all 22 experimental programs are both technically feasible and economically viable.

  20. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    PubMed

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  1. Competing Orders and Anomalies

    PubMed Central

    Moon, Eun-Gook

    2016-01-01

    A conservation law is one of the most fundamental properties in nature, but a certain class of conservation “laws” could be spoiled by intrinsic quantum mechanical effects, so-called quantum anomalies. Profound properties of the anomalies have deepened our understanding in quantum many body systems. Here, we investigate quantum anomaly effects in quantum phase transitions between competing orders and striking consequences of their presence. We explicitly calculate topological nature of anomalies of non-linear sigma models (NLSMs) with the Wess-Zumino-Witten (WZW) terms. The non-perturbative nature is directly related with the ’t Hooft anomaly matching condition: anomalies are conserved in renormalization group flow. By applying the matching condition, we show massless excitations are enforced by the anomalies in a whole phase diagram in sharp contrast to the case of the Landau-Ginzburg-Wilson theory which only has massive excitations in symmetric phases. Furthermore, we find non-perturbative criteria to characterize quantum phase transitions between competing orders. For example, in 4D, we show the two competing order parameter theories, CP(1) and the NLSM with WZW, describe different universality class. Physical realizations and experimental implication of the anomalies are also discussed. PMID:27499184

  2. Interfacial Granular Intrusions

    NASA Astrophysics Data System (ADS)

    Linden, Paul; Zheng, Zhong; Huppert, Herbert; Vriend, Nathalie; Neufeld, Jerome

    2017-11-01

    We study experimentally the intrusion of light granular material into an inviscid fluid of greater density. Despite a rich set of related geophysical and environmental phenomena, such as the spreading of calved ice and volcanic ash and debris flows, there are few previous studies on this topic. We conduct a series of lock-release experiments of light spherical beads into a rectangular tank initially filled with either fresh water or salt water, and record the time evolution of the interface shape and the front location of the current of beads. In particular, we find that the front location obeys a power-law behaviour during an intermediate time period following the release of the lock before the nose of beads reaches a maximum runout distance within a finite time. We investigate the dependence of the scaling exponent and runout distance on the total amount of beads, the initial lock length, and the properties of the liquid that fills the tank in the experiments. Appropriate scaling arguments are provided to collapse the raw experimental data into universal curves, which can be used to describe the front dynamics of light granular intrusions with different size and buoyancy effects and initial aspect ratios.

  3. Identifying Stratospheric Air Intrusions and Associated Hurricane-Force Wind Events over the North Pacific Ocean

    NASA Technical Reports Server (NTRS)

    Malloy, Kelsey; Folmer, Michael J.; Phillips, Joseph; Sienkiewicz, Joseph M.; Berndt, Emily

    2017-01-01

    Motivation: Ocean data is sparse: reliance on satellite imagery for marine forecasting; Ocean Prediction Center (OPC) –“mariner’s weather lifeline”. Responsible for: Pacific, Atlantic, Pacific Alaska surface analyses –24, 48, 96 hrs.; Wind & wave analyses –24, 48, 96 hrs.; Issue warnings, make decisions, Geostationary Operational Environmental Satellite –R Series (now GOES-16), Compared to the old GOES: 3 times spectral resolution, 4 times spatial resolution, 5 times faster coverage; Comparable to Japanese Meteorological Agency’s Himawari-8, used a lot throughout this research. Research Question: How can integrating satellite data imagery and derived products help forecasters improve prognosis of rapid cyclogenesis and hurricane-force wind events? Phase I –Identifying stratospheric air intrusions: Water Vapor –6.2, 6.9, 7.3 micron channels; Airmass RGB Product; AIRS, IASI, NUCAPS total column ozone and ozone anomaly; ASCAT (A/B) and AMSR-2 wind data.

  4. Paternal psychological response after ultrasonographic detection of structural fetal anomalies with a comparison to maternal response: a cohort study.

    PubMed

    Kaasen, Anne; Helbig, Anne; Malt, Ulrik Fredrik; Naes, Tormod; Skari, Hans; Haugen, Guttorm Nils

    2013-07-12

    In Norway almost all pregnant women attend one routine ultrasound examination. Detection of fetal structural anomalies triggers psychological stress responses in the women affected. Despite the frequent use of ultrasound examination in pregnancy, little attention has been devoted to the psychological response of the expectant father following the detection of fetal anomalies. This is important for later fatherhood and the psychological interaction within the couple. We aimed to describe paternal psychological responses shortly after detection of structural fetal anomalies by ultrasonography, and to compare paternal and maternal responses within the same couple. A prospective observational study was performed at a tertiary referral centre for fetal medicine. Pregnant women with a structural fetal anomaly detected by ultrasound and their partners (study group,n=155) and 100 with normal ultrasound findings (comparison group) were included shortly after sonographic examination (inclusion period: May 2006-February 2009). Gestational age was >12 weeks. We used psychometric questionnaires to assess self-reported social dysfunction, health perception, and psychological distress (intrusion, avoidance, arousal, anxiety, and depression): Impact of Event Scale. General Health Questionnaire and Edinburgh Postnatal Depression Scale. Fetal anomalies were classified according to severity and diagnostic or prognostic ambiguity at the time of assessment. Median (range) gestational age at inclusion in the study and comparison group was 19 (12-38) and 19 (13-22) weeks, respectively. Men and women in the study group had significantly higher levels of psychological distress than men and women in the comparison group on all psychometric endpoints. The lowest level of distress in the study group was associated with the least severe anomalies with no diagnostic or prognostic ambiguity (p < 0.033). Men had lower scores than women on all psychometric outcome variables. The correlation in

  5. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  6. Assessment of regional management strategies for controlling seawater intrusion

    USGS Publications Warehouse

    Reichard, E.G.; Johnson, T.A.

    2005-01-01

    Simulation-optimization methods, applied with adequate sensitivity tests, can provide useful quantitative guidance for controlling seawater intrusion. This is demonstrated in an application to the West Coast Basin of coastal Los Angeles that considers two management options for improving hydraulic control of seawater intrusion: increased injection into barrier wells and in lieu delivery of surface water to replace current pumpage. For the base-case optimization analysis, assuming constant groundwater demand, in lieu delivery was determined to be most cost effective. Reduced-cost information from the optimization provided guidance for prioritizing locations for in lieu delivery. Model sensitivity to a suite of hydrologic, economic, and policy factors was tested. Raising the imposed average water-level constraint at the hydraulic-control locations resulted in nonlinear increases in cost. Systematic varying of the relative costs of injection and in lieu water yielded a trade-off curve between relative costs and injection/in lieu amounts. Changing the assumed future scenario to one of increasing pumpage in the adjacent Central Basin caused a small increase in the computed costs of seawater intrusion control. Changing the assumed boundary condition representing interaction with an adjacent basin did not affect the optimization results. Reducing the assumed hydraulic conductivity of the main productive aquifer resulted in a large increase in the model-computed cost. Journal of Water Resources Planning and Management ?? ASCE.

  7. Spacecraft Environmental Anomalies Handbook

    DTIC Science & Technology

    1989-08-01

    1989 4. TITLE AND SUBTITLE S. FUNDING NUMBERS SPACECRAFT ENVIRONMENTAL ANOMALIES HANDBOOK 282201AA PE: 63410F 6. AUTHOR(S) Paul A. Robinson, Jr 7...engineering solutions for mitigating the effects of environmental anomalies have been developed. Among the causes o, spacecraft anomalies are surface...have been discovered after years of investig!:tion, and engineering solutions for mitigating the effccts of environmental anomalies have been developed

  8. Basement structure based on gravity anomaly in the northern Noto peninsula, Central Japan

    NASA Astrophysics Data System (ADS)

    Mizubayashi, T.; Sawada, A.; Hamada, M.; Hiramatsu, Y.; Honda, R.

    2012-12-01

    Upper crustal block structures are usually defined by using surface information, such as geological and morphological data. The northern Noto Peninsula, central Japan, is divided into four geological block structures from tectonic geomorphologic perspectives (Ota and Hirakawa, 1979). This division is based on the surface crustal movement. To image the geological blocks three-dimensionally, it is necessary to construct a subsurface structure model. Gravity survey can clarify the detailed subsurface structure with dense gravity measurement. From the detailed Bouguer anomalies in the northwestern Noto Peninsula, Honda et al. (2008) suggested that the rupture size of the 2007 Noto Hanto earthquake was constrained by the geological block structures. Hiramatsu et al. (2008) also suggested the active faults on the seafloor, such as the source fault of the 2007 Noto Hanto earthquake plays a major role for the formation of the geological block structures. In this study, we analyze subsurface density structure based on the Bouguer anomaly and estimate the distribution of basement depth in the northern Noto Peninsula. We focus the relationship among the basement depth, the block structures and the active faults on the seafloor and discuss the block movement in the northern Noto Peninsula. We compiled the data measured and published previously (Gravity Database of Southwest Japan, 2001; Geological survey of Japan, 2004; Geographical survey institute of Japan, 2006; The Gravity Research Group in Southwest Japan, 2001; Komazawa and Okuma, 2010; Hokuriku electric power Co. Ltd., undisclosed) and calculated Bouguer anomaly in the northern Noto Peninsula. Based on this Bouguer anomaly, we analyzed subsurface density structures along 13 northeastern-southwestern profiles and 35 northwestern-southeastern profiles with the interval of 2 km using the two dimensional Talwani's method (Talwani et al., 1959). In the analysis, we assumed a density structure with four layers: basement

  9. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    NASA Astrophysics Data System (ADS)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  10. Passive intrusion detection system

    NASA Technical Reports Server (NTRS)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  11. Zone of intrusion study.

    DOT National Transportation Integrated Search

    2010-10-15

    The Midwest Roadside Safety Facility (MwRSF) performed an analysis using LS-DYNA simulation to investigate the zone of intrusion (ZOI) of an NCHRP Report No. 350 2000p pickup truck when impacting a 40-in. high F-shape parapet. : The ZOI for the 40-in...

  12. The Torres del Paine intrusion as a model for a shallow magma chamber

    NASA Astrophysics Data System (ADS)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  13. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    ERIC Educational Resources Information Center

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  14. A novel surgical management of hypopharyngeal branchial anomalies.

    PubMed

    Givens, Daniel J; Buchmann, Luke O; Park, Albert H

    2015-04-01

    To review our experience treating hypopharyngeal branchial anomalies utilizing an open transcervical approach that: (1) includes recurrent laryngeal nerve (RLN) monitoring and identification if needed; (2) resection of tract if present; and (3) a superiorly based sternothyroid muscle flap for closure. A retrospective chart review was performed to identify all patients at a tertiary level children's hospital with branchial anomalies from 2005 to 2014. The clinical presentation, evaluation, treatment and outcome were analyzed for those patients with hypopharyngeal branchial anomalies. Forty-seven patients who underwent excision of branchial anomalies with a known origin were identified. Thirteen patients had hypopharyngeal branchial anomalies. Six of these patients were treated by the authors of this study and are the focus of this analysis. All six underwent an open transcervical procedure with a sternothyroid muscle flap closure of a piriform sinus opening over a nine year period. Definitive surgery included a microlaryngoscopy and an open transcervical approach to close a fistula between the piriform sinus and neck with recurrent laryngeal nerve monitoring or dissection. A superiorly based sternothyroid muscle flap was used to close the sinus opening. There were no recurrences, recurrent laryngeal nerve injuries or other complications from these procedures. This study supports complete surgical extirpation of the fistula tract using an open cervical approach, recurrent laryngeal nerve monitoring or identification, and rotational muscle flap closure to treat patients with hypopharyngeal branchial anomalies. Published by Elsevier Ireland Ltd.

  15. Congenital anomalies

    PubMed Central

    Kunisaki, Shaun M.

    2012-01-01

    Over the past decade, amniotic fluid-derived stem cells have emerged as a novel, experimental approach for the treatment of a wide variety of congenital anomalies diagnosed either in utero or postnatally. There are a number of unique properties of amniotic fluid stem cells that have allowed it to become a major research focus. These include the relative ease of accessing amniotic fluid cells in a minimally invasive fashion by amniocentesis as well as the relatively rich population of progenitor cells obtained from a small aliquot of fluid. Mesenchymal stem cells, c-kit positive stem cells, as well as induced pluripotent stem cells have all been derived from human amniotic fluid in recent years. This article gives a pediatric surgeon’s perspective on amniotic fluid stem cell therapy for the management of congenital anomalies. The current status in the use of amniotic fluid-derived stem cells, particularly as they relate as substrates in tissue engineering-based applications, is described in various animal models. A roadmap for further study and eventual clinical application is also proposed. PMID:22986340

  16. Intrusion Detection: Generics and State-of-the-Art (la Detection de l’intrusion: Modeles generiques et etat de l’art)

    DTIC Science & Technology

    2002-01-01

    by the user for a number of possible pre-defined intrusions. One of these pre-defined intrusions is the command “get /etc/ passwd ”. If this command is...Application-level firewalls: which check communication at the application level. An example is the string get /etc/ passwd in the ftp protocol

  17. On Modeling of Adversary Behavior and Defense for Survivability of Military MANET Applications

    DTIC Science & Technology

    2015-01-01

    anomaly detection technique. b) A system-level majority-voting based intrusion detection system with m being the number of verifiers used to perform...pp. 1254 - 1263. [5] R. Mitchell, and I.R. Chen, “Adaptive Intrusion Detection for Unmanned Aircraft Systems based on Behavior Rule Specification...and adaptively trigger the best attack strategies while avoiding detection and eviction. The second step is to model defense behavior of defenders

  18. An incremental anomaly detection model for virtual machines

    PubMed Central

    Zhang, Hancui; Chen, Shuyu; Liu, Jun; Zhou, Zhen; Wu, Tianshu

    2017-01-01

    Self-Organizing Map (SOM) algorithm as an unsupervised learning method has been applied in anomaly detection due to its capabilities of self-organizing and automatic anomaly prediction. However, because of the algorithm is initialized in random, it takes a long time to train a detection model. Besides, the Cloud platforms with large scale virtual machines are prone to performance anomalies due to their high dynamic and resource sharing characters, which makes the algorithm present a low accuracy and a low scalability. To address these problems, an Improved Incremental Self-Organizing Map (IISOM) model is proposed for anomaly detection of virtual machines. In this model, a heuristic-based initialization algorithm and a Weighted Euclidean Distance (WED) algorithm are introduced into SOM to speed up the training process and improve model quality. Meanwhile, a neighborhood-based searching algorithm is presented to accelerate the detection time by taking into account the large scale and high dynamic features of virtual machines on cloud platform. To demonstrate the effectiveness, experiments on a common benchmark KDD Cup dataset and a real dataset have been performed. Results suggest that IISOM has advantages in accuracy and convergence velocity of anomaly detection for virtual machines on cloud platform. PMID:29117245

  19. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    PubMed Central

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  20. A Hybrid Semi-Supervised Anomaly Detection Model for High-Dimensional Data.

    PubMed

    Song, Hongchao; Jiang, Zhuqing; Men, Aidong; Yang, Bo

    2017-01-01

    Anomaly detection, which aims to identify observations that deviate from a nominal sample, is a challenging task for high-dimensional data. Traditional distance-based anomaly detection methods compute the neighborhood distance between each observation and suffer from the curse of dimensionality in high-dimensional space; for example, the distances between any pair of samples are similar and each sample may perform like an outlier. In this paper, we propose a hybrid semi-supervised anomaly detection model for high-dimensional data that consists of two parts: a deep autoencoder (DAE) and an ensemble k -nearest neighbor graphs- ( K -NNG-) based anomaly detector. Benefiting from the ability of nonlinear mapping, the DAE is first trained to learn the intrinsic features of a high-dimensional dataset to represent the high-dimensional data in a more compact subspace. Several nonparametric KNN-based anomaly detectors are then built from different subsets that are randomly sampled from the whole dataset. The final prediction is made by all the anomaly detectors. The performance of the proposed method is evaluated on several real-life datasets, and the results confirm that the proposed hybrid model improves the detection accuracy and reduces the computational complexity.

  1. A Hybrid Semi-Supervised Anomaly Detection Model for High-Dimensional Data

    PubMed Central

    Jiang, Zhuqing; Men, Aidong; Yang, Bo

    2017-01-01

    Anomaly detection, which aims to identify observations that deviate from a nominal sample, is a challenging task for high-dimensional data. Traditional distance-based anomaly detection methods compute the neighborhood distance between each observation and suffer from the curse of dimensionality in high-dimensional space; for example, the distances between any pair of samples are similar and each sample may perform like an outlier. In this paper, we propose a hybrid semi-supervised anomaly detection model for high-dimensional data that consists of two parts: a deep autoencoder (DAE) and an ensemble k-nearest neighbor graphs- (K-NNG-) based anomaly detector. Benefiting from the ability of nonlinear mapping, the DAE is first trained to learn the intrinsic features of a high-dimensional dataset to represent the high-dimensional data in a more compact subspace. Several nonparametric KNN-based anomaly detectors are then built from different subsets that are randomly sampled from the whole dataset. The final prediction is made by all the anomaly detectors. The performance of the proposed method is evaluated on several real-life datasets, and the results confirm that the proposed hybrid model improves the detection accuracy and reduces the computational complexity. PMID:29270197

  2. Scanning Seismic Intrusion Detector

    NASA Technical Reports Server (NTRS)

    Lee, R. D.

    1982-01-01

    Scanning seismic intrusion detector employs array of automatically or manually scanned sensors to determine approximate location of intruder. Automatic-scanning feature enables one operator to tend system of many sensors. Typical sensors used with new system are moving-coil seismic pickups. Detector finds uses in industrial security systems.

  3. Exploring Cumulates in Small, Shallow Parts of a Large Mafic Magma System to Provide Baseline Models for Crystallization in Larger Intrusions

    NASA Astrophysics Data System (ADS)

    Srogi, L.; Willis, K. V.; Lutz, T. M.; Plank, T. A.; Pollock, M.; Connolly, B.; Wood, A. M.

    2016-12-01

    Small, shallow portions of large magmatic systems cool more rapidly and potentially have less subsolidus overprinting than large mafic intrusions, but it is unclear whether they are small-scale analogs for the same crystallization processes. The Morgantown-Jacksonwald magmatic system (MJS), western Newark Basin, Pennsylvania, is part of the 201-Ma Central Atlantic Magmatic Province (CAMP) formed during Pangean rifting. The MJS consists of several interconnected intrusions exposed in cross-section from the Jacksonwald basalt at the paleosurface to 6 km depth (<0.2 GPa). Mg-rich orthopyroxene (opx) phenocrysts form crystal accumulations in some dikes and in basal and roof zones of sills in the MJS, in many CAMP intrusions, and in younger Ferrar dolerites, Antarctica. Some samples with opx phenocrysts have dm-scale modal layering. Despite ubiquitous occurrence, the opx is little-studied and our work tests most previous authors' assumption that opx was brought in from deeper intrusions. Opx cores with Mg/(Mg+Fe) of 80-77% yield mid-crustal pressures of 0.4-0.6 GPa (using method of Putirka, 2008). LA-ICPMS was used to obtain trace element concentrations in mm-size phenocrysts in a chill margin within 0.5m of the basal contact and cm-size phenocrysts from cumulate about 10m above. REE concentrations are similar in both samples: LREE-depleted cores (normalized La/Sm = 0.05-0.1); variably LREE-enriched rims; some negative Eu anomalies. REE patterns calculated for liquids in equilibrium with opx using published Kd values are roughly parallel to but significantly higher than REE in host chill margin diabase. CSDs of opx and matrix plagioclase from several samples within 10m of the basal contact will be used to evaluate models of crystal growth vs. mechanical sorting. Modes and mineral compositions are not consistent with MELTS fractionation models: opx crystallizes in place of pigeonite; pyroxenes are zoned in Ca not Fe-Mg; late-crystallizing quartz and K-feldspar are

  4. Sensitivity analysis of some critical factors affecting simulated intrusion volumes during a low pressure transient event in a full-scale water distribution system.

    PubMed

    Ebacher, G; Besner, M C; Clément, B; Prévost, M

    2012-09-01

    Intrusion events caused by transient low pressures may result in the contamination of a water distribution system (DS). This work aims at estimating the range of potential intrusion volumes that could result from a real downsurge event caused by a momentary pump shutdown. A model calibrated with transient low pressure recordings was used to simulate total intrusion volumes through leakage orifices and submerged air vacuum valves (AVVs). Four critical factors influencing intrusion volumes were varied: the external head of (untreated) water on leakage orifices, the external head of (untreated) water on submerged air vacuum valves, the leakage rate, and the diameter of AVVs' outlet orifice (represented by a multiplicative factor). Leakage orifices' head and AVVs' orifice head levels were assessed through fieldwork. Two sets of runs were generated as part of two statistically designed experiments. A first set of 81 runs was based on a complete factorial design in which each factor was varied over 3 levels. A second set of 40 runs was based on a latin hypercube design, better suited for experimental runs on a computer model. The simulations were conducted using commercially available transient analysis software. Responses, measured by total intrusion volumes, ranged from 10 to 366 L. A second degree polynomial was used to analyze the total intrusion volumes. Sensitivity analyses of both designs revealed that the relationship between the total intrusion volume and the four contributing factors is not monotonic, with the AVVs' orifice head being the most influential factor. When intrusion through both pathways occurs concurrently, interactions between the intrusion flows through leakage orifices and submerged AVVs influence intrusion volumes. When only intrusion through leakage orifices is considered, the total intrusion volume is more largely influenced by the leakage rate than by the leakage orifices' head. The latter mainly impacts the extent of the area affected by

  5. Petrogenesis of ore-bearing porphyry in non-subduction setting: a case study of the Eocene potassic intrusions in the western Yangtze Block

    NASA Astrophysics Data System (ADS)

    Liu, Zheng; Liao, Shi-Yong; Zhou, Qing; Zhang, Xin

    2018-05-01

    In the western Yangtze Block, abundant Eocene ( 38-34 Ma) potassic adakite-like intrusions and associated porphyry copper deposits are exposed in non-subduction setting, including Machangjing, Beiya, Binchuan, Habo and Tongchang intrusions. All these ore-bearing porphyries share many geochemical characteristics of adakite such as depletion in heavy rare earth elements (HREEs), enrichment in Sr and Ba, absence of negative Eu anomalies, high SiO2, Al2O3, Sr/Y, La/Yb and low Y, Yb contents. They also exhibit affinities of potassic rocks, e.g., alkali-rich, high K2O/Na2O ratios and enrichment in light rare earth elements (LREEs) and large ion lithophile elements (LILEs). Their Sr-Nd isotopic ratios are similar to coeval shoshonitic lamprophyres. Geochemical data indicate that they were probably produced by partial melting of newly underplated potassic rocks sourced from a modified and enriched lithospheric mantle. These underplated rocks have elevated oxygen fugacity, water and copper contents, with high metallogenic potential. We propose that all the studied potassic rocks were emplaced in a post-collisional setting, associated with the local removal of lithospheric mantle.

  6. Three Hawaiian calderas: An origin through loading by shallow intrusions?

    NASA Astrophysics Data System (ADS)

    Walker, George P. L.

    1988-12-01

    The calderas of Kilauea and Mauna Loa are highly dynamic structures, and in the <200-year historic period have varied in volume by a factor of 2, and gained or lost 1 km3 per century. The deeply eroded caldera of the extinct Koolau Volcano in Oahu is wider than active Hawaiian calderas, and its lavas have a strong centripetal dip and funnel structure not evident at Kilauea or Mauna Loa. The differences can be attributed to the different erosion depths, and the time integrated subsidence profile of Kilauea is also a stepped funnel (having its apex at Halemaumau). Koolau caldera is the focus of an extraordinarily intense dike complex, and an intriguing feature is the great diminution in dike concentration into the caldera. It is thought that dike injection in any part of the complex generally continued until it reached 50% to 65%. In outer parts of the caldera, the complex was maintained at or rebuilt to this value despite subsidence. In the center of the caldera (where the positive Bouguer anomaly is centered), subsidence evidently greatly outpaced the capacity of dike injections to rebuild the complex. Assuming the same dike injection rate as Kilauea and Mauna Loa yields a volumetric subsidence rate in Koolau caldera exceeding 1 km3 per century. Hawaiian calderas are much more dynamic than calderas of silicic volcanoes, shaped by frequent small events instead of a few great ones. The temporal and volumetric correspondence of historical subsidence events with eruptions is poor, and this and the high subsidence rates argue for a caldera-forming mechanism that consumes the subsided rocks. It is suggested that subsidence is caused by the great localized excess load of intrusive rocks, carrying the center of the volcano into the thermally weakened lithosphere above the Hawaiian hot spot. It is envisaged that under steady state conditions the magma chamber rises, as the injection of intrusions causes the level of neutral buoyancy (at which the chamber is located) to

  7. Relational databases for rare disease study: application to vascular anomalies.

    PubMed

    Perkins, Jonathan A; Coltrera, Marc D

    2008-01-01

    To design a relational database integrating clinical and basic science data needed for multidisciplinary treatment and research in the field of vascular anomalies. Based on data points agreed on by the American Society of Pediatric Otolaryngology (ASPO) Vascular Anomalies Task Force. The database design enables sharing of data subsets in a Health Insurance Portability and Accountability Act (HIPAA)-compliant manner for multisite collaborative trials. Vascular anomalies pose diagnostic and therapeutic challenges. Our understanding of these lesions and treatment improvement is limited by nonstandard terminology, severity assessment, and measures of treatment efficacy. The rarity of these lesions places a premium on coordinated studies among multiple participant sites. The relational database design is conceptually centered on subjects having 1 or more lesions. Each anomaly can be tracked individually along with their treatment outcomes. This design allows for differentiation between treatment responses and untreated lesions' natural course. The relational database design eliminates data entry redundancy and results in extremely flexible search and data export functionality. Vascular anomaly programs in the United States. A relational database correlating clinical findings and photographic, radiologic, histologic, and treatment data for vascular anomalies was created for stand-alone and multiuser networked systems. Proof of concept for independent site data gathering and HIPAA-compliant sharing of data subsets was demonstrated. The collaborative effort by the ASPO Vascular Anomalies Task Force to create the database helped define a common vascular anomaly data set. The resulting relational database software is a powerful tool to further the study of vascular anomalies and the development of evidence-based treatment innovation.

  8. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  9. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  10. 40 CFR 197.26 - What are the circumstances of the human intrusion?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... human intrusion? 197.26 Section 197.26 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... YUCCA MOUNTAIN, NEVADA Public Health and Environmental Standards for Disposal Human-Intrusion Standard § 197.26 What are the circumstances of the human intrusion? For the purposes of the analysis of human...

  11. High-resolution seismic imaging of the Kevitsa mafic-ultramafic Cu-Ni-PGE hosted intrusion, northern Finland

    NASA Astrophysics Data System (ADS)

    Malehmir, Alireza; Koivisto, Emilia; Wjins, Chris; Tryggvason, Ari; Juhlin, Christopher

    2014-05-01

    Kevitsa, in northern Finland, is a large nickel/copper ore body hosted by a massive mafic-ultramafic intrusion with measured and indicated resources of 240 million tons (cutoff 0.1%) grading 0.30% Ni and 0.41% Cu. Mining started in 2012 with an open pit that will extend down to about 550-600 m depth. The expected mine life is more than 20 years. Numerous boreholes are available in the area, but the majority of them are shallow and do not provide a comprehensive understanding of the dimensions of the intrusion. However, a number of boreholes do penetrate the basal contact of the intrusion. Most of these are also shallow and concentrated at the edge of the intrusion. A better knowledge of the geometry of the intrusion would provide a framework for near-mine and deep exploration in the area, but also a better understanding of the geology. Exact mapping of the basal contact of the intrusion would also provide an exploration target for the contact-type mineralization that is often more massive and richer in Ni-Cu than the disseminated mineralization away from the contact. With the objective of better characterizing the intrusion, a series of 2D profiles were acquired followed by a 3D reflection survey that covered an area of about 3 km by 3 km. Even though the geology is complex and the seismic P-wave velocity ranges between 5 to 8 km/s, conventional processing results show gently- to steeply-dipping reflections from depths of approximately 2 km to as shallow as 100 m. Many of these reflections are interpreted to originate from either fault systems or internal magmatic layering within the Kevitsa main intrusion. Correlations between the 3D surface seismic data and VSP data, based upon time shifts or phase changes along the reflections, support the interpretation that numerous faults are imaged in the volume. Some of these faults cross the planned open-pit mine at depths of about 300-500 m, and it is, therefore, critical to map them for mine planning. The seismic 3D

  12. WE-H-BRC-06: A Unified Machine-Learning Based Probabilistic Model for Automated Anomaly Detection in the Treatment Plan Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chang, X; Liu, S; Kalet, A

    Purpose: The purpose of this work was to investigate the ability of a machine-learning based probabilistic approach to detect radiotherapy treatment plan anomalies given initial disease classes information. Methods In total we obtained 1112 unique treatment plans with five plan parameters and disease information from a Mosaiq treatment management system database for use in the study. The plan parameters include prescription dose, fractions, fields, modality and techniques. The disease information includes disease site, and T, M and N disease stages. A Bayesian network method was employed to model the probabilistic relationships between tumor disease information, plan parameters and an anomalymore » flag. A Bayesian learning method with Dirichlet prior was useed to learn the joint probabilities between dependent variables in error-free plan data and data with artificially induced anomalies. In the study, we randomly sampled data with anomaly in a specified anomaly space.We tested the approach with three groups of plan anomalies – improper concurrence of values of all five plan parameters and values of any two out of five parameters, and all single plan parameter value anomalies. Totally, 16 types of plan anomalies were covered by the study. For each type, we trained an individual Bayesian network. Results: We found that the true positive rate (recall) and positive predictive value (precision) to detect concurrence anomalies of five plan parameters in new patient cases were 94.45±0.26% and 93.76±0.39% respectively. To detect other 15 types of plan anomalies, the average recall and precision were 93.61±2.57% and 93.78±3.54% respectively. The computation time to detect the plan anomaly of each type in a new plan is ∼0.08 seconds. Conclusion: The proposed method for treatment plan anomaly detection was found effective in the initial tests. The results suggest that this type of models could be applied to develop plan anomaly detection tools to assist manual and

  13. Identification of magnetic anomalies based on ground magnetic data analysis using multifractal modeling: a case study in Qoja-Kandi, East Azerbaijan Province, Iran

    NASA Astrophysics Data System (ADS)

    Mansouri, E.; Feizi, F.; Karbalaei Ramezanali, A. A.

    2015-07-01

    Ground magnetic anomaly separation using reduction-to-the-pole (RTP) technique and the fractal concentration-area (C-A) method has been applied to the Qoja-Kandi prosepecting area in NW Iran. The geophysical survey that resulted in the ground magnetic data was conducted for magnetic elements exploration. Firstly, RTP technique was applied for recognizing underground magnetic anomalies. RTP anomalies was classified to different populations based on this method. For this reason, drilling points determination with RTP technique was complicated. Next, C-A method was applied on the RTP-Magnetic-Anomalies (RTP-MA) for demonstrating magnetic susceptibility concentration. This identification was appropriate for increasing the resolution of the drilling points determination and decreasing the drilling risk, due to the economic costs of underground prospecting. In this study, the results of C-A Modeling on the RTP-MA are compared with 8 borehole data. The results show there is good correlation between anomalies derived via C-A method and log report of boreholes. Two boreholes were drilled in magnetic susceptibility concentration, based on multifractal modeling data analyses, between 63 533.1 and 66 296 nT. Drilling results show appropriate magnetite thickness with the grades greater than 20 % Fe total. Also, anomalies associated with andesite units host iron mineralization.

  14. Observed assertive and intrusive maternal feeding behaviors increase child adiposity123

    PubMed Central

    Ozbeki, Tina N; Appugliese, Danielle P; Kaciroti, Niko; Corwyn, Robert F; Bradley, Robert H

    2012-01-01

    Background: Few studies have examined observed maternal feeding behaviors and their potential association with child adiposity. The association between maternal prompting to eat and child adiposity has been inconsistent. Objectives: This study sought to identify factors associated with maternal feeding behaviors and to test the hypothesis that more maternal prompts to eat, more assertive prompts, and more intrusiveness are associated with greater child adiposity. Design: Children (n = 1218) and their mothers were videotaped eating a standardized snack at ages 15, 24, and 36 mo. Maternal prompts to eat, the percentage of prompts that were assertive, and intrusiveness were coded. Adjusted regression analyses evaluated predictors of prompts, the percentage of assertive prompts, and intrusiveness and the relation of each of these factors with child adiposity (weight-for-length z score at 15 mo and BMI z score at 24 and 36 mo) after control for the child's race-ethnicity and sex, family income-to-needs ratio, and maternal education, weight status, and depressive symptoms. Results: At 36 mo, mothers gave an average of 9.3 prompts; 61% of prompts were assertive, and 48% of mothers were intrusive. Lower maternal education and minority race-ethnicity were associated with a greater percentage of assertive prompts and intrusiveness. A greater percentage of assertive prompts and intrusiveness, but not total prompts, was associated with higher child adiposity. Conclusions: Assertive prompting and an intrusive style had small but significant associations with greater child adiposity. Future work should focus on maternal motivations for assertive and intrusive feeding styles and mechanisms through which these feeding styles might increase child adiposity. PMID:22277552

  15. Differences in clinical intrusive thoughts between obsessive-compulsive disorder, generalized anxiety disorder, and hypochondria.

    PubMed

    Romero-Sanchiz, Pablo; Nogueira-Arjona, Raquel; Godoy-Ávila, Antonio; Gavino-Lázaro, Aurora; Freeston, Mark H

    2017-11-01

    Differences and similarities between intrusive thoughts typical of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis are relevant for their differential diagnosis, formulation, and psychological treatment. Previous research in non-clinical samples pointed out the relevance of some process variables, such as responsibility, guilt, or neutralization strategies. This research is aimed to investigate the differences and similarities between clinical obsessions, worries, and illness intrusions in some of these process variables. A second aim is to identify models based on these variables that could reliably differentiate between them. Three groups of patients with obsessive-compulsive disorder (n = 35; 60% women, mean age 38.57), generalized anxiety disorder (n = 36; 61.1% women, mean age 41.50), and hypochondriasis (n = 34; 70.6% women, mean age 31.59) were evaluated using the Cognitive Intrusions Questionnaire-Transdiagnostic Version (Romero-Sanchiz, Nogueira-Arjona, Godoy-Ávila, Gavino-Lázaro, & Freeston, ). The results showed that some appraisals (e.g., responsibility or egodystonicity), emotions (e.g., guilt or insecurity), neutralization strategies, and other variables (e.g., verbal content or trigger from body sensation) are relevant for the discrimination between obsessions, worries, and illness intrusions. The results also showed 3 stable models based on these variables for the discrimination between these thoughts. The implication of these results in the diagnosis, formulation, and psychological treatment of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis is discussed. Copyright © 2017 John Wiley & Sons, Ltd.

  16. Simulating the influence of groundwater table fluctuation on vapor intrusion

    NASA Astrophysics Data System (ADS)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  17. Synergies between climate anomalies and hydrological modifications facilitate estuarine biotic invasions.

    PubMed

    Winder, Monika; Jassby, Alan D; Mac Nally, Ralph

    2011-08-01

    Environmental perturbation, climate change and international commerce are important drivers for biological invasions. Climate anomalies can further increase levels of habitat disturbance and act synergistically to elevate invasion risk. Herein, we use a historical data set from the upper San Francisco Estuary to provide the first empirical evidence for facilitation of invasions by climate extremes. Invasive zooplankton species did not become established in this estuary until the 1970s when increasing propagule pressure from Asia coincided with extended drought periods. Hydrological management exacerbated the effects of post-1960 droughts and reduced freshwater inflow even further, increasing drought severity and allowing unusually extreme salinity intrusions. Native zooplankton experienced unprecedented conditions of high salinity and intensified benthic grazing, and life history attributes of invasive zooplankton were advantageous enough during droughts to outcompete native species and colonise the system. Extreme climatic events can therefore act synergistically with environmental perturbation to facilitate the establishment of invasive species. © 2011 Blackwell Publishing Ltd/CNRS.

  18. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  19. Vapor intrusion risk of lead scavengers 1,2-dibromoethane (EDB) and 1,2-dichloroethane (DCA).

    PubMed

    Ma, Jie; Li, Haiyan; Spiese, Richard; Wilson, John; Yan, Guangxu; Guo, Shaohui

    2016-06-01

    Vapor intrusion of synthetic fuel additives represented a critical yet still neglected problem at sites impacted by petroleum fuel releases. This study used an advanced numerical model to simulate the vapor intrusion risk of lead scavengers 1,2-dibromoethane (ethylene dibromide, EDB) and 1,2-dichloroethane (DCA) under different site conditions. We found that simulated EDB and DCA indoor air concentrations can exceed USEPA screening level (4.7 × 10(-3) μg/m(3) for EDB and 1.1 × 10(-1) μg/m(3) for DCA) if the source concentration is high enough (is still within the concentration range found at leaking UST site). To evaluate the chance that vapor intrusion of EDB might exceed the USEPA screening levels for indoor air, the simulation results were compared to the distribution of EDB at leaking UST sites in the US. If there is no degradation of EDB or only abiotic degradation of EDB, from 15% to 37% of leaking UST sites might exceed the USEPA screening level. This study supports the statements made by USEPA in the Petroleum Vapor Intrusion (PVI) Guidance that the screening criteria for petroleum hydrocarbon may not provide sufficient protectiveness for fuel releases containing EDB and DCA. Based on a thorough literature review, we also compiled previous published data on the EDB and DCA groundwater source concentrations and their degradation rates. These data are valuable in evaluating EDB and DCA vapor intrusion risk. In addition, a set of refined attenuation factors based on site-specific information (e.g., soil types, source depths, and degradation rates) were provided for establishing site-specific screening criteria for EDB and DCA. Overall, this study points out that lead scavengers EDB and DCA may cause vapor intrusion problems. As more field data of EDB and DCA become available, we recommend that USEPA consider including these data in the existing PVI database and possibly revising the PVI Guidance as necessary. Copyright © 2016 Elsevier Ltd. All

  20. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  1. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  2. Associations between intrusive thoughts, reality discrimination and hallucination-proneness in healthy young adults.

    PubMed

    Smailes, David; Meins, Elizabeth; Fernyhough, Charles

    2015-01-01

    People who experience intrusive thoughts are at increased risk of developing hallucinatory experiences, as are people who have weak reality discrimination skills. No study has yet examined whether these two factors interact to make a person especially prone to hallucinatory experiences. The present study examined this question in a non-clinical sample. Participants were 160 students, who completed a reality discrimination task, as well as self-report measures of cannabis use, negative affect, intrusive thoughts and auditory hallucination-proneness. The possibility of an interaction between reality discrimination performance and level of intrusive thoughts was assessed using multiple regression. The number of reality discrimination errors and level of intrusive thoughts were independent predictors of hallucination-proneness. The reality discrimination errors × intrusive thoughts interaction term was significant, with participants who made many reality discrimination errors and reported high levels of intrusive thoughts being especially prone to hallucinatory experiences. Hallucinatory experiences are more likely to occur in people who report high levels of intrusive thoughts and have weak reality discrimination skills. If applicable to clinical samples, these findings suggest that improving patients' reality discrimination skills and reducing the number of intrusive thoughts they experience may reduce the frequency of hallucinatory experiences.

  3. Identification of magnetic anomalies based on ground magnetic data analysis using multifractal modelling: a case study in Qoja-Kandi, East Azerbaijan Province, Iran

    NASA Astrophysics Data System (ADS)

    Mansouri, E.; Feizi, F.; Karbalaei Ramezanali, A. A.

    2015-10-01

    Ground magnetic anomaly separation using the reduction-to-the-pole (RTP) technique and the fractal concentration-area (C-A) method has been applied to the Qoja-Kandi prospecting area in northwestern Iran. The geophysical survey resulting in the ground magnetic data was conducted for magnetic element exploration. Firstly, the RTP technique was applied to recognize underground magnetic anomalies. RTP anomalies were classified into different populations based on the current method. For this reason, drilling point area determination by the RTP technique was complicated for magnetic anomalies, which are in the center and north of the studied area. Next, the C-A method was applied to the RTP magnetic anomalies (RTP-MA) to demonstrate magnetic susceptibility concentrations. This identification was appropriate for increasing the resolution of the drilling point area determination and decreasing the drilling risk issue, due to the economic costs of underground prospecting. In this study, the results of C-A modelling on the RTP-MA are compared with 8 borehole data. The results show that there is a good correlation between anomalies derived via the C-A method and the log report of boreholes. Two boreholes were drilled in magnetic susceptibility concentrations, based on multifractal modelling data analyses, between 63 533.1 and 66 296 nT. Drilling results showed appropriate magnetite thickness with grades greater than 20 % Fe. The total associated with anomalies containing andesite units hosts iron mineralization.

  4. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  5. Hypergraph-based anomaly detection of high-dimensional co-occurrences.

    PubMed

    Silva, Jorge; Willett, Rebecca

    2009-03-01

    This paper addresses the problem of detecting anomalous multivariate co-occurrences using a limited number of unlabeled training observations. A novel method based on using a hypergraph representation of the data is proposed to deal with this very high-dimensional problem. Hypergraphs constitute an important extension of graphs which allow edges to connect more than two vertices simultaneously. A variational Expectation-Maximization algorithm for detecting anomalies directly on the hypergraph domain without any feature selection or dimensionality reduction is presented. The resulting estimate can be used to calculate a measure of anomalousness based on the False Discovery Rate. The algorithm has O(np) computational complexity, where n is the number of training observations and p is the number of potential participants in each co-occurrence event. This efficiency makes the method ideally suited for very high-dimensional settings, and requires no tuning, bandwidth or regularization parameters. The proposed approach is validated on both high-dimensional synthetic data and the Enron email database, where p > 75,000, and it is shown that it can outperform other state-of-the-art methods.

  6. Statistical Techniques For Real-time Anomaly Detection Using Spark Over Multi-source VMware Performance Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solaimani, Mohiuddin; Iftekhar, Mohammed; Khan, Latifur

    Anomaly detection refers to the identi cation of an irregular or unusual pat- tern which deviates from what is standard, normal, or expected. Such deviated patterns typically correspond to samples of interest and are assigned different labels in different domains, such as outliers, anomalies, exceptions, or malware. Detecting anomalies in fast, voluminous streams of data is a formidable chal- lenge. This paper presents a novel, generic, real-time distributed anomaly detection framework for heterogeneous streaming data where anomalies appear as a group. We have developed a distributed statistical approach to build a model and later use it to detect anomaly. Asmore » a case study, we investigate group anomaly de- tection for a VMware-based cloud data center, which maintains a large number of virtual machines (VMs). We have built our framework using Apache Spark to get higher throughput and lower data processing time on streaming data. We have developed a window-based statistical anomaly detection technique to detect anomalies that appear sporadically. We then relaxed this constraint with higher accuracy by implementing a cluster-based technique to detect sporadic and continuous anomalies. We conclude that our cluster-based technique out- performs other statistical techniques with higher accuracy and lower processing time.« less

  7. Work zone intrusion alarm effectiveness.

    DOT National Transportation Integrated Search

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  8. Lymphatic Anomalies Registry

    ClinicalTrials.gov

    2018-01-23

    Lymphatic Malformation; Generalized Lymphatic Anomaly (GLA); Central Conducting Lymphatic Anomaly; CLOVES Syndrome; Gorham-Stout Disease ("Disappearing Bone Disease"); Blue Rubber Bleb Nevus Syndrome; Kaposiform Lymphangiomatosis; Kaposiform Hemangioendothelioma/Tufted Angioma; Klippel-Trenaunay Syndrome; Lymphangiomatosis

  9. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    NASA Astrophysics Data System (ADS)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  10. Network intrusion detection by the coevolutionary immune algorithm of artificial immune systems with clonal selection

    NASA Astrophysics Data System (ADS)

    Salamatova, T.; Zhukov, V.

    2017-02-01

    The paper presents the application of the artificial immune systems apparatus as a heuristic method of network intrusion detection for algorithmic provision of intrusion detection systems. The coevolutionary immune algorithm of artificial immune systems with clonal selection was elaborated. In testing different datasets the empirical results of evaluation of the algorithm effectiveness were achieved. To identify the degree of efficiency the algorithm was compared with analogs. The fundamental rules based of solutions generated by this algorithm are described in the article.

  11. Real-time Bayesian anomaly detection in streaming environmental data

    NASA Astrophysics Data System (ADS)

    Hill, David J.; Minsker, Barbara S.; Amir, Eyal

    2009-04-01

    With large volumes of data arriving in near real time from environmental sensors, there is a need for automated detection of anomalous data caused by sensor or transmission errors or by infrequent system behaviors. This study develops and evaluates three automated anomaly detection methods using dynamic Bayesian networks (DBNs), which perform fast, incremental evaluation of data as they become available, scale to large quantities of data, and require no a priori information regarding process variables or types of anomalies that may be encountered. This study investigates these methods' abilities to identify anomalies in eight meteorological data streams from Corpus Christi, Texas. The results indicate that DBN-based detectors, using either robust Kalman filtering or Rao-Blackwellized particle filtering, outperform a DBN-based detector using Kalman filtering, with the former having false positive/negative rates of less than 2%. These methods were successful at identifying data anomalies caused by two real events: a sensor failure and a large storm.

  12. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes.

    PubMed

    Passarelli, L; Rivalta, E; Shuler, A

    2014-01-28

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process.

  13. Tell me more: Can a memory test reduce analogue traumatic intrusions?

    PubMed

    Krans, Julie; Näring, Gérard; Holmes, Emily A; Becker, Eni S

    2009-05-01

    Information processing theories of post-traumatic stress disorder (PTSD) state that intrusive images emerge due to a lack of integration of perceptual trauma representations in autobiographical memory. To test this hypothesis experimentally, participants were shown an aversive film to elicit intrusive images. After viewing, they received a recognition test for just one part of the film. The test contained neutrally formulated items to rehearse information from the film. Participants reported intrusive images for the film in an intrusion diary during one week after viewing. In line with expectations, the number of intrusive images decreased only for the part of the film for which the recognition test was given. Furthermore, deliberate cued-recall memory after one week was selectively enhanced for the film part that was in the recognition test a week before. The findings provide new evidence supporting information processing models of PTSD and have potential implications for early interventions after trauma.

  14. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    PubMed Central

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  15. Contrasting catastrophic eruptions predicted by different intrusion and collapse scenarios.

    PubMed

    Rincón, M; Márquez, A; Herrera, R; Alonso-Torres, A; Granja-Bruña, J L; van Wyk de Vries, B

    2018-04-18

    Catastrophic volcanic eruptions triggered by landslide collapses can jet upwards or blast sideways. Magma intrusion is related to both landslide-triggered eruptive scenarios (lateral or vertical), but it is not clear how such different responses are produced, nor if any precursor can be used for forecasting them. We approach this problem with physical analogue modelling enhanced with X-ray Multiple Detector Computed Tomography scanning, used to track evolution of internal intrusion, and its related faulting and surface deformation. We find that intrusions produce three different volcano deformation patterns, one of them involving asymmetric intrusion and deformation, with the early development of a listric slump fault producing pronounced slippage of one sector. This previously undescribed early deep potential slip surface provides a unified explanation for the two different eruptive scenarios (lateral vs. vertical). Lateral blast only occurs in flank collapse when the intrusion has risen into the sliding block. Otherwise, vertical rather than lateral expansion of magma is promoted by summit dilatation and flank buttressing. The distinctive surface deformation evolution detected opens the possibility to forecast the possible eruptive scenarios: laterally directed blast should only be expected when surface deformation begins to develop oblique to the first major fault.

  16. Numerical simulations of hydrothermal circulation resulting from basalt intrusions in a buried spreading center

    USGS Publications Warehouse

    Fisher, A.T.; Narasimhan, T.N.

    1991-01-01

    A two-dimensional, one by two-kilometer section through the seafloor was simulated with a numerical model to investigate coupled fluid and heat flow resulting from basalt intrusions in a buried spreading center. Boundary and initial conditions and physical properties of both sediments and basalt were constrained by field surveys and drilling in the Guaymas Basin, central Gulf of California. Parametric variations in these studies included sediment and basalt permeability, anisotropy in sediment permeability, and the size of heat sources. Faults were introduced through new intrusions both before and after cooling.Background heat input caused fluid convection at velocities ≤ 3 cm a−1 through shallow sediments. Eighty to ninety percent of the heat introduced at the base of the simulations exited through the upper, horizontal surface, even when the vertical boundaries were made permeable to fluid flow. The simulated injection of a 25–50 m thick basalt intrusion at a depth of 250 m resulted in about 10 yr of pore-fluid expulsion through the sea-floor in all cases, leaving the sediments above the intrusions strongly underpressured. A longer period of fluid recharge followed, sometimes accompanied by reductions in total seafloor heat output of 10% in comparison to pre-intrusion values. Additional discharge-recharge events were dispersed chaotically through the duration of the cooling period. These cycles in heat and fluid flow resulted from the response of the simulated system to a thermodynamic shock, the sudden emplacement of a large heat source, and not from mechanical displacement of sediments and pore fluids, which was not simulated.Water/rock mass ratios calculated from numerical simulations are in good agreement with geochemical estimates from materials recovered from the Guaymas Basin, assuming a bulk basalt permeability value of at least 10−17 m2/(10−2 mD). The addition of faults through intrusions and sediments in these simulations did not facilitate

  17. Emplacement of the early Miocene Pinto Peak intrusion, Southwest Utah, USA

    NASA Astrophysics Data System (ADS)

    Petronis, Michael S.; O'Driscoll, Brian

    2013-12-01

    In this contribution, we report rock magnetic, petrographic, and anisotropy of magnetic susceptibility (AMS) data from the Pinto Peak intrusion, all of which bear on volcanic construction. Rock magnetic data indicate that the dominant magnetic mineral phase is low-Ti titanomagnetite of multidomain grain size, the composition of which varies spatially across the intrusion. The intrusion is a porphyritic andesite dominated by Ca-rich plagioclase (>60%) as well as biotite, amphibole, olivine, and opaque minerals. Reflected light petrography reveals mostly euhedral-subhedral (titano)magnetite crystals that often form clustered glomerocrysts and stringers of equant crystals, without exhibiting a consistent mineral alignment fabric. Moderate-to-shallow plunging prolate magnetic susceptibility ellipsoids dominate the northern part of the intrusion while steeply dipping/plunging magnetic susceptibility ellipsoids are generally restricted to the southern part of the intrusion. The vent facies rocks yield moderate-to-steep oblate susceptibility ellipsoids. We interpret the flow pattern in the north to reflect subhorizontal flow of magma, filling a tabular sheet-like body associated with propagation of the intrusion to the north. We argue that the southern part of the intrusion represents the ascent site of the magma rising to shallow crustal levels along a steep feeder system. The oblate magnetic fabrics in the vent area plausibly represent flattening against the conduit walls as evidenced by a weak planar flow foliation observed in the vent conduit rocks. On reaching shallow crustal levels, the magma deformed and uplifted the roof rocks leading to gravitational instability. As the slide mass released from the roof, an explosive eruption ensued resulting in the emplacement of the Rocks of Paradise tuff and associated effusive lava flows. Following eruption, magma pressure decreased and the magma drained northward forming the northern intrusive phase.

  18. Innovative methods to reduce salt water intrusion in harbours

    NASA Astrophysics Data System (ADS)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  19. Analysis of genitourinary anomalies in patients with VACTERL (Vertebral anomalies, Anal atresia, Cardiac malformations, Tracheo-Esophageal fistula, Renal anomalies, Limb abnormalities) association.

    PubMed

    Solomon, Benjamin D; Raam, Manu S; Pineda-Alvarez, Daniel E

    2011-06-01

    The goal of this study was to describe a novel pattern of genitourinary (GU) anomalies in VACTERL association,which involves congenital anomalies affecting the vertebrae,anus, heart, trachea and esophagus, kidneys, and limbs.We collected clinical data on 105 patients diagnosed with VACTERL association and analyzed a subset of 89 patients who met more stringent inclusion criteria. Twenty-one percent of patients have GU anomalies, which are more severe (but not more frequent) in females. Anomalies were noted in patients without malformations affecting the renal, lower vertebral, or lower gastrointestinal systems. There should be a high index of suspicion for the presence of GU anomalies even in patients who do not have spatially similar malformations.

  20. Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ali, Saqib; Wang, Guojun; Cottrell, Roger Leslie

    PingER (Ping End-to-End Reporting) is a worldwide end-to-end Internet performance measurement framework. It was developed by the SLAC National Accelerator Laboratory, Stanford, USA and running from the last 20 years. It has more than 700 monitoring agents and remote sites which monitor the performance of Internet links around 170 countries of the world. At present, the size of the compressed PingER data set is about 60 GB comprising of 100,000 flat files. The data is publicly available for valuable Internet performance analyses. However, the data sets suffer from missing values and anomalies due to congestion, bottleneck links, queuing overflow, networkmore » software misconfiguration, hardware failure, cable cuts, and social upheavals. Therefore, the objective of this paper is to detect such performance drops or spikes labeled as anomalies or outliers for the PingER data set. In the proposed approach, the raw text files of the data set are transformed into a PingER dimensional model. The missing values are imputed using the k-NN algorithm. The data is partitioned into similar instances using the k-means clustering algorithm. Afterward, clustering is integrated with the Local Outlier Factor (LOF) using the Cluster Based Local Outlier Factor (CBLOF) algorithm to detect the anomalies or outliers from the PingER data. Lastly, anomalies are further analyzed to identify the time frame and location of the hosts generating the major percentage of the anomalies in the PingER data set ranging from 1998 to 2016.« less

  1. Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor

    DOE PAGES

    Ali, Saqib; Wang, Guojun; Cottrell, Roger Leslie; ...

    2018-05-28

    PingER (Ping End-to-End Reporting) is a worldwide end-to-end Internet performance measurement framework. It was developed by the SLAC National Accelerator Laboratory, Stanford, USA and running from the last 20 years. It has more than 700 monitoring agents and remote sites which monitor the performance of Internet links around 170 countries of the world. At present, the size of the compressed PingER data set is about 60 GB comprising of 100,000 flat files. The data is publicly available for valuable Internet performance analyses. However, the data sets suffer from missing values and anomalies due to congestion, bottleneck links, queuing overflow, networkmore » software misconfiguration, hardware failure, cable cuts, and social upheavals. Therefore, the objective of this paper is to detect such performance drops or spikes labeled as anomalies or outliers for the PingER data set. In the proposed approach, the raw text files of the data set are transformed into a PingER dimensional model. The missing values are imputed using the k-NN algorithm. The data is partitioned into similar instances using the k-means clustering algorithm. Afterward, clustering is integrated with the Local Outlier Factor (LOF) using the Cluster Based Local Outlier Factor (CBLOF) algorithm to detect the anomalies or outliers from the PingER data. Lastly, anomalies are further analyzed to identify the time frame and location of the hosts generating the major percentage of the anomalies in the PingER data set ranging from 1998 to 2016.« less

  2. Along-axis steps in Ethiopian rift Bouguer gravity anomalies: Implications for crustal thinning and melt emplacement prior to breakup

    NASA Astrophysics Data System (ADS)

    Ebinger, C. J.; Tiberi, C.; Fowler, M. R.; Hunegnaw, A.

    2001-12-01

    The southern Afar depression, Africa, is virtually the only area worldwide where the transition from continental rifting to seafloor spreading is exposed onshore. During mid-Miocene to Pleistocene time the rift valley was segmented along its length by long normal faults; since Pleistocene time, faulting and magmatism have jumped to a narrow ca. 60 km-long volcanic mound marked by small faults. These magmatic segments are structurally similar to slow-spreading mid-ocean ridges, yet the rift is floored by continental crust. As part of the Ethiopia Afar Geoscientific Lithospheric Experiment (EAGLE), we examine new and existing Bouguer gravity anomaly data from the rift to study the modification of the lithosphere by extensional and magmatic processes. New and existing Bouguer gravity anomaly data also show an along-axis segmentation of elongate relative positive anomalies that coincide with the magmatic segments. These anomalies are superposed on a regionally eastward increasing field as one approaches true seafloor spreading in the Gulf of Aden, and crustal thickness decreases. Quite remarkably, the magmatic segment boundaries, where data coverage is good, are marked by 15-25 mGal steps. The amplitude of the along-axis steps, as well as their across-axis characteristics, indicate that magmatic intrusion and ca. 2 km relief at the crust-mantle interface contribute to the steps. We use inverse and forward models of gravity data constrained by existing seismic and petrological data to evaluate models for the along-axis steps. EAGLE seismic data will be acquired across and along the magmatic segments to improve our understanding of breakup processes.

  3. Efficient cooling of rocky planets by intrusive magmatism

    NASA Astrophysics Data System (ADS)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  4. Modal Composition and Age of Intrusions in North-Central and Northeast Nevada

    USGS Publications Warehouse

    du Bray, Edward A.; Crafford, A. Elizabeth Jones

    2007-01-01

    Introduction Data presented in this report characterize igneous intrusions of north-central and northeast Nevada and were compiled as part of the Metallogeny of the Great Basin project conducted by the U.S. Geological Survey (USGS) between 2001 and 2007. The compilation pertains to the area bounded by lats 38.5 and 42 N., long 118.5 W., and the Nevada-Utah border (fig. 1). The area contains numerous large plutons and smaller stocks but also contains equally numerous smaller, shallowly emplaced intrusions, including dikes, sills, and endogenous dome complexes. Igneous intrusions (hereafter, intrusions) of multiple ages are major constituents of the geologic framework of north-central and northeast Nevada (Stewart and Carlson, 1978). Mesozoic and Cenozoic intrusions are particularly numerous and considered to be related to subduction along the west edge of the North American plate during this time. Henry and Ressel (2000) and Ressel and others (2000) have highlighted the association between magmatism and ore deposits along the Carlin trend. Similarly, Theodore (2000) has demonstrated the association between intrusions and ore deposits in the Battle Mountain area. Decades of geologic investigations in north-central and northeast Nevada (hereafter, the study area) demonstrate that most hydrothermal ore deposits are spatially, and probably temporally and genetically, associated with intrusions. Because of these associations, studies of many individual intrusions have been conducted, including those by a large number of Master's and Doctoral thesis students (particularly University of Nevada at Reno students and associated faculty), economic geologists working on behalf of exploration and mining companies, and USGS earth scientists. Although the volume of study area intrusions is large and many are associated with ore deposits, no synthesis of available data that characterize these rocks has been assembled. Compilations that have been produced for intrusions in Nevada

  5. From measurements to metrics: PCA-based indicators of cyber anomaly

    NASA Astrophysics Data System (ADS)

    Ahmed, Farid; Johnson, Tommy; Tsui, Sonia

    2012-06-01

    We present a framework of the application of Principal Component Analysis (PCA) to automatically obtain meaningful metrics from intrusion detection measurements. In particular, we report the progress made in applying PCA to analyze the behavioral measurements of malware and provide some preliminary results in selecting dominant attributes from an arbitrary number of malware attributes. The results will be useful in formulating an optimal detection threshold in the principal component space, which can both validate and augment existing malware classifiers.

  6. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    NASA Astrophysics Data System (ADS)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  7. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    PubMed Central

    Chapman, Helen R.; Kirby-Turner, Nick

    2018-01-01

    Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised) evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists. PMID:29719519

  8. Investigating the long-term geodetic response to magmatic intrusions at volcanoes in northern California

    NASA Astrophysics Data System (ADS)

    Parker, A. L.; Biggs, J.; Annen, C.; Houseman, G. A.; Yamasaki, T.; Wright, T. J.; Walters, R. J.; Lu, Z.

    2014-12-01

    Ratios of intrusive to extrusive activity at volcanic arcs are thought to be high, with estimates ranging between 5:1 and 30:1. Understanding the geodetic response to magmatic intrusion is therefore fundamental to large-scale studies of volcano deformation, providing insight into the dynamics of the inter-eruptive period of the volcano cycle and the building of continental crust. In northern California, we identify two volcanoes - Medicine Lake Volcano (MLV) and Lassen Volcanic Center (LaVC) - that exhibit long-term (multi-decadal) subsidence. We test the hypothesis that deformation at these volcanoes results from processes associated with magmatic intrusions. We first constrain the spatial and temporal characteristics of the deformation fields, establishing the first time-series of deformation at LaVC using InSAR data, multi-temporal analysis techniques and global weather models. Although the rates of deformation at the two volcanoes are similar (~1 cm/yr), our results show that the ratio of vertical to horizontal displacements is significantly different, suggesting contrasting source geometries. To test the origin of deformation, we develop modeling strategies to investigate thermal and viscoelastic processes associated with magmatic intrusions. The first model we develop couples analytical geodetic models to a numerical model of volume loss due to cooling and crystallization based upon temperature-melt fraction relationships from petrological experiments. This model provides evidence that magmatic intrusion at MLV has occurred more recently than the last eruption ~1 ka. The second model we test uses a finite element approach to simulate the time-dependent viscoelastic response of the crust to magmatic intrusion. We assess the magnitude and timescales of ground deformation that may result from these processes, exploring the model parameter space before applying the models to our InSAR observations of subsidence in northern California.

  9. Inducing and modulating intrusive emotional memories: a review of the trauma film paradigm.

    PubMed

    Holmes, Emily A; Bourne, Corin

    2008-03-01

    Highly affect-laden memory intrusions are a feature of several psychological disorders with intrusive images of trauma especially associated with post-traumatic stress disorder (PTSD). The trauma film paradigm provides a prospective experimental tool for investigating analogue peri-traumatic cognitive mechanisms underlying intrusion development. We review several historical papers and some more recent key studies that have used the trauma film paradigm. A heuristic diagram is presented, designed to simplify predictions about analogue peri-traumatic processing and intrusion development, which can also be related to the processing elements of recent cognitive models of PTSD. Results show intrusions can be induced in the laboratory and their frequency amplified/attenuated in line with predictions. Successful manipulations include competing task type (visuospatial vs. verbal) and use of a cognitive coping strategy. Studies show that spontaneous peri-traumatic dissociation also affects intrusion frequency although attempts to manipulate dissociation have failed. It is hoped that further use of this paradigm may lead to prophylactic training for at risk groups and an improved understanding of intrusions across psychopathologies.

  10. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  11. Congenital neurodevelopmental anomalies in pediatric and young adult cancer.

    PubMed

    Wong-Siegel, Jeannette R; Johnson, Kimberly J; Gettinger, Katie; Cousins, Nicole; McAmis, Nicole; Zamarione, Ashley; Druley, Todd E

    2017-10-01

    Congenital anomalies that are diagnosed in at least 120,000 US infants every year are the leading cause of infant death and contribute to disability and pediatric hospitalizations. Several large-scale epidemiologic studies have provided substantial evidence of an association between congenital anomalies and cancer risk in children, suggesting potential underlying cancer-predisposing conditions and the involvement of developmental genetic pathways. Electronic medical records from 1,107 pediatric, adolescent, and young adult oncology patients were reviewed. The observed number (O) of congenital anomalies among children with a specific pediatric cancer subtype was compared to the expected number (E) of anomalies based on the frequency of congenital anomalies in the entire study population. The O/E ratios were tested for significance using Fisher's exact test. The Kaplan-Meier method was used to compare overall and neurological malignancy survival rates following tumor diagnosis. Thirteen percent of patients had a congenital anomaly diagnosis prior to their cancer diagnosis. When stratified by congenital anomaly subtype, there was an excess of neurological anomalies among children with central nervous system tumors (O/E = 1.56, 95%CI 1.13-2.09). Male pediatric cancer patients were more likely than females to have a congenital anomaly, particularly those <5 years of age (O/E 1.35, 95%CI 0.97-1.82). Our study provides additional insight into the association between specific congenital anomaly types and pediatric cancer development. Moreover, it may help to inform the development of new screening policies and support hypothesis-driven research investigating mechanisms underlying tumor predisposition in children with congenital anomalies. © 2017 The Authors. American Journal of Medical Genetics Part A Published by Wiley Periodicals, Inc.

  12. Deep intrusions, lateral magma transport and related uplift at ocean island volcanoes

    NASA Astrophysics Data System (ADS)

    Klügel, Andreas; Longpré, Marc-Antoine; García-Cañada, Laura; Stix, John

    2015-12-01

    Oceanic intraplate volcanoes grow by accumulation of erupted material as well as by coeval or discrete magmatic intrusions. Dykes and other intrusive bodies within volcanic edifices are comparatively well studied, but intrusive processes deep beneath the volcanoes remain elusive. Although there is geological evidence for deep magmatic intrusions contributing to volcano growth through uplift, this has rarely been demonstrated by real-time monitoring. Here we use geophysical and petrological data from El Hierro, Canary Islands, to show that intrusions from the mantle and subhorizontal transport of magma within the oceanic crust result in rapid endogenous island growth. Seismicity and ground deformation associated with a submarine eruption in 2011-2012 reveal deep subhorizontal intrusive sheets (sills), which have caused island-scale uplift of tens of centimetres. The pre-eruptive intrusions migrated 15-20 km laterally within the lower oceanic crust, opening pathways that were subsequently used by the erupted magmas to ascend from the mantle to the surface. During six post-eruptive episodes between 2012 and 2014, further sill intrusions into the lower crust and upper mantle have caused magma to migrate up to 20 km laterally, resulting in magma accumulation exceeding that of the pre-eruptive phase. A comparison of geobarometric data for the 2011-2012 El Hierro eruption with data for other Atlantic intraplate volcanoes shows similar bimodal pressure distributions, suggesting that eruptive phases are commonly accompanied by deep intrusions of sills and lateral magma transport. These processes add significant material to the oceanic crust, cause uplift, and are thus fundamentally important for the growth and evolution of volcanic islands. We suggest that the development of such a magma accumulation zone in the lower oceanic crust begins early during volcano evolution, and is a consequence of increasing size and complexity of the mantle reservoir system, and potentially

  13. Magnetic fabric constraints of the emplacement of igneous intrusions

    NASA Astrophysics Data System (ADS)

    Maes, Stephanie M.

    Fabric analysis is critical to evaluating the history, kinematics, and dynamics of geological deformation. This is particularly true of igneous intrusions, where the development of fabric is used to constrain magmatic flow and emplacement mechanisms. Fabric analysis was applied to three mafic intrusions, with different tectonic and petrogenetic histories, to study emplacement and magma flow: the Insizwa sill (Mesozoic Karoo Large Igneous Province, South Africa), Sonju Lake intrusion (Proterozoic Midcontinent Rift, Minnesota, USA), and Palisades sill (Mesozoic rift basin, New Jersey, USA). Multiple fabric analysis techniques were used to define the fabric in each intrusive body. Using digital image analysis techniques on multiple thin sections, the three-dimensional shape-preferred orientation (SPO) of populations of mineral phases were calculated. Low-field anisotropy of magnetic susceptibility (AMS) measurements were used as a proxy for the mineral fabric of the ferromagnetic phases (e.g., magnetite). In addition, a new technique---high-field AMS---was used to isolate the paramagnetic component of the fabric (e.g., silicate fabric). Each fabric analysis technique was then compared to observable field fabrics as a framework for interpretation. In the Insizwa sill, magnetic properties were used to corroborate vertical petrologic zonation and distinguish sub-units within lithologically defined units. Abrupt variation in magnetic properties provides evidence supporting the formation of the Insizwa sill by separate magma intrusions. Low-field AMS fabrics in the Sonju Lake intrusion exhibit consistent SW-plunging lineations and SW-dipping foliations. These fabric orientations provide evidence that the cumulate layers in the intrusion were deposited in a dynamic environment, and indicate magma flowed from southwest to northeast, parallel to the pre-existing rift structures. In the Palisades sill, the magnetite SPO and low-field AMS lineation have developed orthogonal to

  14. Replacing intrusive thoughts: investigating thought control in relation to OCD symptoms.

    PubMed

    Ólafsson, Ragnar P; Snorrason, Ívar; Bjarnason, Reynar K; Emmelkamp, Paul M G; Ólason, Daníel Þ; Kristjánsson, Árni

    2014-12-01

    Control of obsessive thoughts in Obsessive Compulsive Disorder (OCD) involves both avoidance and removal of undesirable intrusive thoughts. Thought suppression tasks tap both of these processes but experimental results have been inconsistent. Experimental tasks allowing more focused study of the processes involved in controlling intrusive thoughts may be needed. In two experiments, control over neutral, standardized intrusive and personal intrusive thoughts was investigated as participants attempted to replace them with neutral thoughts. Non-selected university students (Experiment 1: N = 61) and university students scoring high and low on self-report measure of OC symptoms (Experiment 2: N = 40) performed a computerized thought replacement task. In experiment 1 replacing personal intrusive thoughts took longer than replacing neutral thoughts. Self-reports showed that intrusive thoughts were rated more difficult to replace and were associated with greater thought reoccurrence during replacement, larger emotional reaction and more discomfort. These results were largely replicated in experiment 2. Furthermore, the high OC symptom group experienced greater overall difficulty controlling thoughts on the replacement task, experienced more reoccurrences of personal intrusive thoughts, larger emotional reactions and discomfort associated with them, and felt a greater urge to remove them. All participants were non-clinical university students, and older adults with OCD should be tested. The findings are in line with cognitive behavioural theories of OCD. They support the usefulness of thought replacement as a research paradigm to study thought control in OCD and possibly other psychological conditions characterized by repetitive thoughts. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Stratospheric Intrusion-Influenced Ozone Air Quality Exceedences Investigated in MERRA-2

    NASA Technical Reports Server (NTRS)

    Knowland, K. Emma; Ott, Lesley; Duncan, Bryan; Wargan, Krzysztof

    2017-01-01

    Ozone near the surface is harmful to human health and is a result of the photochemical reaction with both man-made and natural precursor pollutant sources. Therefore, in order to reduce near surface ozone concentrations, communities must reduce anthropogenic pollution sources. However, the injection of stratospheric ozone into the troposphere, known as a stratospheric intrusion, can also lead to concentrations of ground-level ozone exceeding air quality standards. Stratospheric intrusions are dynamical atmospheric features, however, these intrusions have been misrepresented in models and reanalyses until recently, as the features of a stratospheric intrusion are best identified in horizontal resolutions of approximately 50 km or smaller. NASA's Modern-Era Retrospective Analysis for Research and Applications Version-2 (MERRA-2) reanalysis is a publicly-available high-resolution dataset (50 km) with assimilated ozone that characterizes stratospheric ozone on the same spatiotemporal resolution as the meteorology. We show that stratospheric intrusions that impact surface air quality are well represented in the MERRA-2 reanalysis. This is demonstrated through a case study analysis of stratospheric intrusion events which were identified by the United States Environmental Protection Agency (EPA) to impact surface ozone air quality in spring 2012 in Colorado. The stratospheric intrusions are identified in MERRA-2 by the folding of the dynamical tropopause under the jet stream and subsequent isentropic descent of dry, O3-rich stratospheric air towards the surface where ozone air quality exceedences were observed. The MERRA-2 reanalysis can support air quality agencies for more rapid identification of the impact of stratospheric air on ground-level ozone.

  16. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    USGS Publications Warehouse

    duBray, E.A.

    2007-01-01

    Importantly, modal composition, age, and geochemical characteristics of intrusions associated with large mineral deposits along the trends, are indistinguishable from non-mineralized intrusions in northern Nevada and thus do not identify intrusions associated with significant deposits. Moreover, intrusion age and composition show little correlation with mineral-deposit type, abundance, and size. Given the lack of diagnostic characteristics for intrusions associated with deposits, it is uncertain whether age, modal composition, and geochemical data can identify intrusions associated with mineral deposits. These findings suggest that associations between northern Nevada intrusions and mineral deposits reflect superimposition of many geologic factors, none of which was solely responsible for mineral-deposit formation. These factors might include intrusion size, efficiency of fluid and metal extraction from magma, prevailing redox and sulfidation conditions, or derivation of metals and ligands from host rocks and groundwater. The abundance and diversity of mineral deposits in northern Nevada may partly reflect geochemical inheritance, for example, along the mineral trends rather than the influence of petrologically unique magma or associated fluids.

  17. Analysis of genitourinary anomalies in patients with VACTERL (Vertebral anomalies, Anal atresia, Cardiac malformations, Tracheo-Esophageal fistula, Renal anomalies, Limb abnormalities) association

    PubMed Central

    Solomon, Benjamin D.; Raam, Manu S.; Pineda-Alvarez, Daniel E.

    2010-01-01

    Purpose The goal of this study was to describe a novel pattern of genitourinary (GU) anomalies in VACTERL association, which involves congenital anomalies affecting the vertebrae, anus, heart, trachea and esophagus, kidneys, and limbs. Procedures We collected clinical data on 105 patients diagnosed with VACTERL association and analyzed a subset of 89 patients who met more stringent inclusion criteria. Findings Twenty-one percent of patients have GU anomalies, which are more severe (but not more frequent) in females. Anomalies were noted in patients without malformations affecting the renal, lower vertebral, or lower gastrointestinal systems. Conclusions There should be a high index of suspicion for the presence of GU anomalies even in patient who do not have spatially similar malformations. PMID:21235632

  18. Integrating Intrusive and Non-intrusive Characterization Methods To Achieve A Conceptual Site Model For The SLDA FUSRAP

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durham, L.A.; Peterson, J.M.; Frothingham, D.G.

    2008-07-01

    The U.S. Army Corps of Engineers (USACE) is addressing radiological contamination following Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) requirements at the Shallow Land Disposal Area (SLDA) site, which is a radiologically contaminated property that is part of the Formerly Utilized Sites Remedial Action Program (FUSRAP). The SLDA is an 18-hectare (44- acre) site in Parks Township, Armstrong County, Pennsylvania, about 37 kilometers (23 miles) east-northeast of Pittsburgh. According to historical record, radioactive wastes were disposed of at the SLDA in a series of trenches by the Nuclear Materials and Equipment Company (NUMEC) in the 1960's. The wastes originatedmore » from the nearby Apollo nuclear fuel fabrication facility, which began operations under NUMEC in the late 1950's and fabricated enriched uranium into naval reactor fuel elements. It is believed that the waste materials were buried in a series of pits constructed adjacent to one another in accordance with an Atomic Energy Commission (AEC) regulation that has since been rescinded. A CERCLA remedial investigation/feasibility study (RI/FS) process was completed for the SLDA site, and the results of the human health risk assessment indicated that the radiologically contaminated wastes could pose a risk to human health in the future. There are no historical records that provide the exact location of these pits. However, based on geophysical survey results conducted in the 1980's, these pits were defined by geophysical anomalies and were depicted on historical site drawings as trenches. At the SLDA site, a combination of investigative methods and tools was used in the RI/FS and site characterization activities. The SLDA site provides an excellent example of how historical documents and data, historical aerial photo analysis, physical sampling, and non-intrusive geophysical and gamma walkover surveys were used in combination to reduce the uncertainty in the location of the

  19. Intrusive Rock Database for the Digital Geologic Map of Utah

    USGS Publications Warehouse

    Nutt, C.J.; Ludington, Steve

    2003-01-01

    Digital geologic maps offer the promise of rapid and powerful answers to geologic questions using Geographic Information System software (GIS). Using modern GIS and database methods, a specialized derivative map can be easily prepared. An important limitation can be shortcomings in the information provided in the database associated with the digital map, a database which is often based on the legend of the original map. The purpose of this report is to show how the compilation of additional information can, when prepared as a database that can be used with the digital map, be used to create some types of derivative maps that are not possible with the original digital map and database. This Open-file Report consists of computer files with information about intrusive rocks in Utah that can be linked to the Digital Geologic Map of Utah (Hintze et al., 2000), an explanation of how to link the databases and map, and a list of references for the databases. The digital map, which represents the 1:500,000-scale Geologic Map of Utah (Hintze, 1980), can be obtained from the Utah Geological Survey (Map 179DM). Each polygon in the map has a unique identification number. We selected the polygons identified on the geologic map as intrusive rock, and constructed a database (UT_PLUT.xls) that classifies the polygons into plutonic map units (see tables). These plutonic map units are the key information that is used to relate the compiled information to the polygons on the map. The map includes a few polygons that were coded as intrusive on the state map but are largely volcanic rock; in these cases we note the volcanic rock names (rhyolite and latite) as used in the original sources Some polygons identified on the digital state map as intrusive rock were misidentified; these polygons are noted in a separate table of the database, along with some information about their true character. Fields may be empty because of lack of information from references used or difficulty in finding

  20. Observational Constraints on the Identification of Shallow Lunar Magmatism: Insights from Floor-Fractured Craters

    NASA Technical Reports Server (NTRS)

    Jozwiak, L. M.; Head, J. W., III; Neumann, G. A.; Wilson, L.

    2016-01-01

    Floor-fractured craters are a class of lunar crater hypothesized to form in response to the emplacement of a shallow magmatic intrusion beneath the crater floor. The emplacement of a shallow magmatic body should result in a positive Bouguer anomaly relative to unaltered complex craters, a signal which is observed for the average Bouguer anomaly interior to the crater walls. We observe the Bouguer anomaly of floor-fractured craters on an individual basis using the unfiltered Bouguer gravity solution from GRAIL and also a degree 100-600 band-filtered Bouguer gravity solution. The low-magnitude of anomalies arising from shallow magmatic intrusions makes identification using unfiltered Bouguer gravity solutions inconclusive. The observed anomalies in the degree 100-600 Bouguer gravity solution are spatially heterogeneous, although there is spatial correlation between volcanic surface morphologies and positive Bouguer anomalies. We interpret these observations to mean that the spatial heterogeneity observed in the Bouguer signal is the result of variable degrees of magmatic degassing within the intrusions.

  1. MAGSAT anomaly map and continental drift

    NASA Technical Reports Server (NTRS)

    Lemouel, J. L. (Principal Investigator); Galdeano, A.; Ducruix, J.

    1981-01-01

    Anomaly maps of high quality are needed to display unambiguously the so called long wave length anomalies. The anomalies were analyzed in terms of continental drift and the nature of their sources is discussed. The map presented confirms the thinness of the oceanic magnetized layer. Continental magnetic anomalies are characterized by elongated structures generally of east-west trend. Paleomagnetic reconstruction shows that the anomalies found in India, Australia, and Antarctic exhibit a fair consistency with the African anomalies. It is also shown that anomalies are locked under the continents and have a fixed geometry.

  2. A Load-Based Temperature Prediction Model for Anomaly Detection

    NASA Astrophysics Data System (ADS)

    Sobhani, Masoud

    Electric load forecasting, as a basic requirement for the decision-making in power utilities, has been improved in various aspects in the past decades. Many factors may affect the accuracy of the load forecasts, such as data quality, goodness of the underlying model and load composition. Due to the strong correlation between the input variables (e.g., weather and calendar variables) and the load, the quality of input data plays a vital role in forecasting practices. Even if the forecasting model were able to capture most of the salient features of the load, a low quality input data may result in inaccurate forecasts. Most of the data cleansing efforts in the load forecasting literature have been devoted to the load data. Few studies focused on weather data cleansing for load forecasting. This research proposes an anomaly detection method for the temperature data. The method consists of two components: a load-based temperature prediction model and a detection technique. The effectiveness of the proposed method is demonstrated through two case studies: one based on the data from the Global Energy Forecasting Competition 2014, and the other based on the data published by ISO New England. The results show that by removing the detected observations from the original input data, the final load forecast accuracy is enhanced.

  3. Optimize the Coverage Probability of Prediction Interval for Anomaly Detection of Sensor-Based Monitoring Series

    PubMed Central

    Liu, Datong; Peng, Yu; Peng, Xiyuan

    2018-01-01

    Effective anomaly detection of sensing data is essential for identifying potential system failures. Because they require no prior knowledge or accumulated labels, and provide uncertainty presentation, the probability prediction methods (e.g., Gaussian process regression (GPR) and relevance vector machine (RVM)) are especially adaptable to perform anomaly detection for sensing series. Generally, one key parameter of prediction models is coverage probability (CP), which controls the judging threshold of the testing sample and is generally set to a default value (e.g., 90% or 95%). There are few criteria to determine the optimal CP for anomaly detection. Therefore, this paper designs a graphic indicator of the receiver operating characteristic curve of prediction interval (ROC-PI) based on the definition of the ROC curve which can depict the trade-off between the PI width and PI coverage probability across a series of cut-off points. Furthermore, the Youden index is modified to assess the performance of different CPs, by the minimization of which the optimal CP is derived by the simulated annealing (SA) algorithm. Experiments conducted on two simulation datasets demonstrate the validity of the proposed method. Especially, an actual case study on sensing series from an on-orbit satellite illustrates its significant performance in practical application. PMID:29587372

  4. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  5. Multi-Level Anomaly Detection on Time-Varying Graph Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bridges, Robert A; Collins, John P; Ferragut, Erik M

    This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data. We introduce a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. Specifically, probability models describing coarse subgraphs are built by aggregating probabilities at finer levels, and these closely related hierarchical models simultaneously detect deviations from expectation. This technique provides insight into a graph's structure and internal context that may shed light on a detected event. Additionally, thismore » multi-scale analysis facilitates intuitive visualizations by allowing users to narrow focus from an anomalous graph to particular subgraphs or nodes causing the anomaly. For evaluation, two hierarchical anomaly detectors are tested against a baseline Gaussian method on a series of sampled graphs. We demonstrate that our graph statistics-based approach outperforms both a distribution-based detector and the baseline in a labeled setting with community structure, and it accurately detects anomalies in synthetic and real-world datasets at the node, subgraph, and graph levels. To illustrate the accessibility of information made possible via this technique, the anomaly detector and an associated interactive visualization tool are tested on NCAA football data, where teams and conferences that moved within the league are identified with perfect recall, and precision greater than 0.786.« less

  6. Final OSWER Vapor Intrusion Guidance

    EPA Science Inventory

    EPA is preparing to finalize its guidance on assessing and addressing vapor intrusion, which is defined as migration of volatile constituents from contaminated media in the subsurface (soil or groundwater) into the indoor environment. In November 2002, EPA issued draft guidance o...

  7. Influence of Age, Thought Content, and Anxiety on Suppression of Intrusive Thoughts

    PubMed Central

    Beadel, Jessica R.; Green, Jennifer S.; Hosseinbor, Shahrzad; Teachman, Bethany A.

    2013-01-01

    Understanding differences in responses following attempts to suppress versus simply monitor intrusive thoughts is important given the established relationship between intrusive thinking and numerous forms of psychopathology. Moreover, these differences may vary as a function of age. Because of the links between aging and both enhancement in emotion regulation skills and decline in inhibition skills, older and younger adults were expected to differ in their responses (e.g., experience of negative affect and thought recurrence) to attempts at suppressing intrusive thoughts. This study examined whether efforts to suppress thought content that varied in valence and age-relevance differentially affected older (N = 40, aged 66–92) and younger (N = 42, aged 16–25) adults’ ability to inhibit intrusive thought recurrence and their resulting negative affect. Interestingly, older adults experienced less recurrence for most thoughts than younger adults. Also, for several dependent variables (negative affect and perceived difficulty suppressing intrusive thoughts), older adults showed less decline in their magnitude of response across thinking periods (i.e., from suppression to monitoring) than did younger adults. These age effects were not generally moderated by level of trait anxiety, though higher anxiety did predict intrusive thought responding in expected directions, such as greater negative affect. These findings point to independent influences of age and anxiety, and suggest a complex mix of risk and protective factors for older adults’ responses to intrusive thoughts. PMID:23395408

  8. Synergy of climate change and local pressures on saltwater intrusion in heterogeneous coastal aquifers

    NASA Astrophysics Data System (ADS)

    Abou Najm, M.; Safi, A.; El-Fadel, M.; Doummar, J.; Alameddine, I.

    2016-12-01

    The relative importance of climate change induced sea level rise on the salinization of a highly urbanized karstified coastal aquifers were compared with non-sustainable pumping. A 3D variable-density groundwater flow and solute transport model was used to predict the displacement of the saltwater-freshwater interface in a pilot aquifer located along the Eastern Mediterranean. The results showed that the influence of sea level rise was marginal when compared with the encroachment of salinity associated with anthropogenic abstraction. Model predictions of salinity mass and volumetric displacement of the interface corresponding to a long-term monthly transient model showed that the saltwater intrusion dynamic is highly sensitive to change in the abstraction rates which were estimated based on combinations of water consumption rates and population growth rates. Salinity encroachment, however, appeared to be more sensitive to water consumption rates in comparison to population growth rates, where a 50% increase in the rate of former led to four times more intrusion as compared to an equivalent increase in population growth rate over 20 years. Coupling both increase in population growth and increased consumption rates had a synergistic effect that aggravated the intrusion beyond the sum of the individual impacts. Adaptation strategies targeting a decrease in groundwater exploitation proved to be effective in retarding the intrusion.

  9. Experimental saltwater intrusion in coastal aquifers using automated image analysis: Applications to homogeneous aquifers

    NASA Astrophysics Data System (ADS)

    Robinson, G.; Ahmed, Ashraf A.; Hamill, G. A.

    2016-07-01

    This paper presents the applications of a novel methodology to quantify saltwater intrusion parameters in laboratory-scale experiments. The methodology uses an automated image analysis procedure, minimising manual inputs and the subsequent systematic errors that can be introduced. This allowed the quantification of the width of the mixing zone which is difficult to measure in experimental methods that are based on visual observations. Glass beads of different grain sizes were tested for both steady-state and transient conditions. The transient results showed good correlation between experimental and numerical intrusion rates. The experimental intrusion rates revealed that the saltwater wedge reached a steady state condition sooner while receding than advancing. The hydrodynamics of the experimental mixing zone exhibited similar traits; a greater increase in the width of the mixing zone was observed in the receding saltwater wedge, which indicates faster fluid velocities and higher dispersion. The angle of intrusion analysis revealed the formation of a volume of diluted saltwater at the toe position when the saltwater wedge is prompted to recede. In addition, results of different physical repeats of the experiment produced an average coefficient of variation less than 0.18 of the measured toe length and width of the mixing zone.

  10. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    PubMed Central

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  11. Maxillary molar intrusion with micro-implant anchorage (MIA).

    PubMed

    Park, Hyo-Sang; Jang, Bong-Kyu; Kyung, Hee-Moon

    2005-11-01

    Intrusion of the maxillary molars is difficult to accomplish using traditional methods of anchorage. To describe methods of maxillary molar intrusion with the aid of micro-implants. Micro-implants provide stable intra-oral anchorage and enable the maxillary molars to be intruded without the usual side effects. Three adult patients are presented showing how micro-implants can be used to intrude the maxillary molars. In the first patient micro-implants were placed in the alveolar process between the second premolar and first molar, in the second patient micro-implants were placed in the palatal alveolar process between the first and second molars, and in the third patient a micro-implant was placed in the palate paramedially. A transpalatal bar was used to prevent bucco- or linguoversion of the molars during intrusion. The maxillary molars can be intruded with intra-oral anchorage derived from microscrew implants.

  12. The pattern and variability of winter Kuroshio intrusion northeast of Taiwan

    NASA Astrophysics Data System (ADS)

    Liu, Xiaohui; Dong, Changming; Chen, Dake; Su, Jilan

    2014-08-01

    The variations of the Kuroshio path and velocity northeast of Taiwan are analyzed based on along-track satellite altimeter data as well as high-resolution model experiments. Observations reveal that in winter the Kuroshio intrusion into the East China Sea (ECS) at this location is manifested by a secondary maximum current core (SMCC) shoreward of the Kuroshio's main path. The SMCC varies significantly on interannual time scale, and its variability is strikingly out of phase with that of the Kuroshio entering the ECS, meaning that the stronger the Kuroshio, the weaker the SMCC, and vice versa. Model experiments corroborate the observational results and, more importantly, indicate that the Kuroshio intrusion here follows two primary routes, a large anticyclonic loop that separates from the Kuroshio at the northern end of Taiwan and moves forward to form the SMCC, and a straight northward path onto the shelf when the Kuroshio turns sharply eastward along the continental slope of the ECS. The intrusion is controlled by both local forcing and remote effect, with its pattern and variability depending mostly on the local heat flux and the inertia of the Kuroshio Current. This article was corrected on 12 SEP 2014. See the end of the full text for details.

  13. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ondrej Linda; Todd Vollmer; Jason Wright

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrainedmore » computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.« less

  14. Discovering System Health Anomalies Using Data Mining Techniques

    NASA Technical Reports Server (NTRS)

    Sriastava, Ashok, N.

    2005-01-01

    We present a data mining framework for the analysis and discovery of anomalies in high-dimensional time series of sensor measurements that would be found in an Integrated System Health Monitoring system. We specifically treat the problem of discovering anomalous features in the time series that may be indicative of a system anomaly, or in the case of a manned system, an anomaly due to the human. Identification of these anomalies is crucial to building stable, reusable, and cost-efficient systems. The framework consists of an analysis platform and new algorithms that can scale to thousands of sensor streams to discovers temporal anomalies. We discuss the mathematical framework that underlies the system and also describe in detail how this framework is general enough to encompass both discrete and continuous sensor measurements. We also describe a new set of data mining algorithms based on kernel methods and hidden Markov models that allow for the rapid assimilation, analysis, and discovery of system anomalies. We then describe the performance of the system on a real-world problem in the aircraft domain where we analyze the cockpit data from aircraft as well as data from the aircraft propulsion, control, and guidance systems. These data are discrete and continuous sensor measurements and are dealt with seamlessly in order to discover anomalous flights. We conclude with recommendations that describe the tradeoffs in building an integrated scalable platform for robust anomaly detection in ISHM applications.

  15. Pre-stressor cognitive control is related to intrusive cognition of a stressful film.

    PubMed

    Wessel, Ineke; Overwijk, Sippie; Verwoerd, Johan; de Vrieze, Nienke

    2008-04-01

    It has been suggested that relatively weak cognitive control existing prior to a stressful event may be associated with intrusive memories of that stressor afterwards. We explored this in two analog studies employing unselected participants who saw an emotional film fragment and completed behavioral (i.e., color-naming interference [CNI]) and self-report indices of intrusions. Prior to film presentation, several cognitive control tests were administered. Study 1 showed that better updating/monitoring was linked to less CNI from negative film-related words. However, better updating/monitoring was associated with more diary reports of intrusive memories. Study 2 showed that a better resistance to pro-active interference (PI) predicted less self-reported film-related intrusive cognition after 24h. However, after this delay, both self-reported intrusions and CNI were not related to updating/monitoring. Taken together, the results suggest that a specific pre-existing cognitive control function (i.e., resistance to PI) may be involved in the regulation of post-stressor intrusive memory phenomena.

  16. Layered intrusion formation by top down thermal migration zone refining (Invited)

    NASA Astrophysics Data System (ADS)

    Lundstrom, C.

    2009-12-01

    The formation of layered mafic intrusions by crystallization from cooling magmas represents the textbook example of igneous differentiation, often attributed to fractional crystallization through gravitational settling. Yet in detail, such interpretations have significant problems such that it remains unclear how these important features form. Put in the Earth perspective that no km scale blob of >50% melt has ever been imaged geophysically and that geochronological studies repeatedly indicate age inconsistencies with “big tank” magma chambers, it may be questioned if km scale magma chambers have ever existed. I will present the case for forming layered intrusions by a top down process whereby arriving basaltic magma reaches a permeability barrier, begins to underplate and forms the intrusion incrementally by sill injection with the body growing downward at ~1 mm/yr rate or less. A temperature gradient zone occurs in the overlying previously emplaced sills, leading to chemical components migrating by diffusion. As long as the rate of diffusion can keep up with rate of sill addition, the body will differentiate along a path similar to a liquid line of descent. In this talk, I will integrate data from 3 areas: 1) laboratory experiments examining the behavior of partially molten silicates in a temperature gradient (thermal migration); 2) numerical modeling of the moving temperature gradient zone process using IRIDIUM (Boudreau, 2003); 3) measurements of Fe isotope ratios and geochronology from the Sonju Lake Intrusion in the Duluth Complex. This model provides the ability to form km scale intrusions by a seismically invisible means, can explain million year offsets in chronology, and has implications for reef development and PGE concentration. Most importantly, this model of top down layered intrusion formation, following a similar recent proposal for granitoid formation (Lundstrom, 2009), represents a testable hypothesis: because temperature gradient driven

  17. Extending TOPS: Ontology-driven Anomaly Detection and Analysis System

    NASA Astrophysics Data System (ADS)

    Votava, P.; Nemani, R. R.; Michaelis, A.

    2010-12-01

    Terrestrial Observation and Prediction System (TOPS) is a flexible modeling software system that integrates ecosystem models with frequent satellite and surface weather observations to produce ecosystem nowcasts (assessments of current conditions) and forecasts useful in natural resources management, public health and disaster management. We have been extending the Terrestrial Observation and Prediction System (TOPS) to include a capability for automated anomaly detection and analysis of both on-line (streaming) and off-line data. In order to best capture the knowledge about data hierarchies, Earth science models and implied dependencies between anomalies and occurrences of observable events such as urbanization, deforestation, or fires, we have developed an ontology to serve as a knowledge base. We can query the knowledge base and answer questions about dataset compatibilities, similarities and dependencies so that we can, for example, automatically analyze similar datasets in order to verify a given anomaly occurrence in multiple data sources. We are further extending the system to go beyond anomaly detection towards reasoning about possible causes of anomalies that are also encoded in the knowledge base as either learned or implied knowledge. This enables us to scale up the analysis by eliminating a large number of anomalies early on during the processing by either failure to verify them from other sources, or matching them directly with other observable events without having to perform an extensive and time-consuming exploration and analysis. The knowledge is captured using OWL ontology language, where connections are defined in a schema that is later extended by including specific instances of datasets and models. The information is stored using Sesame server and is accessible through both Java API and web services using SeRQL and SPARQL query languages. Inference is provided using OWLIM component integrated with Sesame.

  18. SEISMIC DISCRIMINATION OF THERMAL AND MAGNETIC ANOMALIES IN SUNSPOT UMBRAE

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lindsey, C.; Cally, P. S.; Rempel, M.

    2010-08-20

    Efforts to model sunspots based on helioseismic signatures need to discriminate between the effects of (1) a strong magnetic field that introduces time-irreversible, vantage-dependent phase shifts, apparently connected to fast- and slow-mode coupling and wave absorption and (2) a thermal anomaly that includes cool gas extending an indefinite depth beneath the photosphere. Helioseismic observations of sunspots show travel times considerably reduced with respect to equivalent quiet-Sun signatures. Simulations by Moradi and Cally of waves skipping across sunspots with photospheric magnetic fields of order 3 kG show travel times that respond strongly to the magnetic field and relatively weakly to themore » thermal anomaly by itself. We note that waves propagating vertically in a vertical magnetic field are relatively insensitive to the magnetic field, while remaining highly responsive to the attendant thermal anomaly. Travel-time measurements for waves with large skip distances into the centers of axially symmetric sunspots are therefore a crucial resource for discrimination of the thermal anomaly beneath sunspot umbrae from the magnetic anomaly. One-dimensional models of sunspot umbrae based on compressible-radiative-magnetic-convective simulations such as by Rempel et al. can be fashioned to fit observed helioseismic travel-time spectra in the centers of sunspot umbrae. These models are based on cooling of the upper 2-4 Mm of the umbral subphotosphere with no significant anomaly beneath 4.5 Mm. The travel-time reductions characteristic of these models are primarily a consequence of a Wilson depression resulting from a strong downward buoyancy of the cooled umbral medium.« less

  19. Indoor Air Vapor Intrusion Mitigation Approaches

    EPA Pesticide Factsheets

    The National Risk Management Research Laboratory has developed a technology transfer document regarding management and treatment of vapor intrusion into building structures. This document describes the range of mitigation technologies available.

  20. Developing an automatic classification system of vegetation anomalies for early warning with the ASAP (Anomaly hot Spots of Agricultural Production) system

    NASA Astrophysics Data System (ADS)

    Meroni, M.; Rembold, F.; Urbano, F.; Lemoine, G.

    2016-12-01

    Anomaly maps and time profiles of remote sensing derived indicators relevant to monitor crop and vegetation stress can be accessed online thanks to a rapidly growing number of web based portals. However, timely and systematic global analysis and coherent interpretation of such information, as it is needed for example for SDG 2 related monitoring, remains challenging. With the ASAP system (Anomaly hot Spots of Agricultural Production) we propose a two-step analysis to provide monthly warning of production deficits in water-limited agriculture worldwide. The first step is fully automated and aims at classifying each administrative unit (1st sub-national level) into a number of possible warning levels, ranging from "none" to "watch" and up to "extended alarm". The second step involves the verification of the automatic warnings and integration into a short national level analysis by agricultural analysts. In this paper we describe the methodological development of the automatic vegetation anomaly classification system. Warnings are triggered only during the crop growing season, defined by a remote sensing based phenology. The classification takes into consideration the fraction of the agricultural and rangelands area for each administrative unit that is affected by a severe anomaly of two rainfall-based indicators (the Standardized Precipitation Index (SPI), computed at 1 and 3-month scale) and one biophysical indicator (the cumulative NDVI from the start of the growing season). The severity of the warning thus depends on the timing, the nature and the number of indicators for which an anomaly is detected. The prototype system is using global NDVI images of the METOP sensor, while a second version is being developed based on 1km Modis NDVI with temporal smoothing and near real time filtering. Also a specific water balance model is under development to include agriculture water stress information in addition to the SPI. The monthly warning classification and crop

  1. Predicting The Intrusion Layer From Deep Ocean Oil Spills

    NASA Astrophysics Data System (ADS)

    Wang, Dayang; Chow, Aaron; Adams, E. Eric

    2015-11-01

    Oil spills from deep ocean blowout events motivate our study of multiphase plumes in a water column. Key to understanding the long-term fate of these plumes is the ability to predict the depth and persistence of intrusion layers. While intrusion layers from multiphase plumes have been studied under stagnant conditions, their behavior in the presence of crossflow, especially in mild crossflow, remains poorly understood. The classical classification of plume behavior identifies two regimes: crossflow-dominant and stratification-dominant--but it does not account for the interplay between the two effects, leaving the transition region unexplored. We conduct laboratory tank experiments to investigate the behavior of intrusion layers under the simultaneous action of crossflow and stratification. Our experiments use an inverted frame of reference, using glass beads with a range of sizes to simulate oil droplets. We find that crossflow creates enhanced mixing, which in turn leads to a shallower intrusion layer of the released fluid (correspondingly, a deeper layer in the case of a deep ocean blowout). We develop a mathematical formulation that extends previous models to account for crossflow effects, and use field observations to validate the analytical and experimental findings.

  2. MAGSAT anomaly field inversion and interpretation for the US

    NASA Technical Reports Server (NTRS)

    Mayhew, M. A. (Principal Investigator)

    1982-01-01

    Long wavelength anomalies in the total magnetic field measured by MAGSAT over the United States and adjacent areas are inverted to an equivalent layer crustal magnetization distribution. The model is based on an equal area dipole grid at the Earth's surface. Model resolution, defined as the closest dipole spacing giving a solution having physical significance, is about 220 km for MAGSAT data in the elevation range 300-500 km. The magnetization contours correlate well with large scale tectonic provinces. A higher resolution (200 km) model based on relatively noise free synthetic "pseudodata" is also presented. Magnetic anomaly component data measured by MAGSAT is compared with synthetic anomaly component fields arising from an equivalent source dipole array at the Earth's surface generated from total field anomaly data alone. An excellent inverse correlation between apparent magnetization and heat flow in the western U.S. is demonstrated. A regional heat flow map which is presented and compared with published maps, predicts high heat flow in Nebraska and the Dakotas, suggesting the presence of a "blind" geothermal area of regional extent.

  3. First branchial groove anomaly.

    PubMed

    Kumar, M; Hickey, S; Joseph, G

    2000-06-01

    First branchial groove anomalies are very rare. We report a case of a first branchial groove anomaly presented as an infected cyst in an 11-month-old child. Management of such lesions is complicated because of their close association with the facial nerve. Surgical management must include identification and protection of the facial nerve. Embryology and facial nerve disposition in relation to the anomaly are reviewed.

  4. Common dental anomalies in cleft lip and palate patients.

    PubMed

    Haque, Sanjida; Alam, Mohammad Khursheed

    2015-01-01

    Cleft lip and palate (CLP) is the most common orofacial congenital malformation in live births. CLP can occur individually or in combination with other congenital deformities. Affected patients experience a number of dental, aesthetic, speech, hearing, and psychological complications and have a higher incidence of severe dental conditions. The purpose of this study is to characterise the different types of dental anomalies that are frequently associated with CLP patients based on a literature survey. By literature survey, this study characterises the different types of dental anomalies that are frequently associated with cleft lip and palate patients. Common dental anomalies associated with CLP are supernumerary tooth, congenitally missing tooth, delayed tooth development, morphological anomalies in both deciduous and permanent dentition, delayed eruption of permanent maxillary incisors, microdontia, and abnormal tooth number. The incidence of certain dental anomalies is strongly correlated with Cleft lip and palate, a finding that is consistent with previous studies.

  5. Anomaly detection for medical images based on a one-class classification

    NASA Astrophysics Data System (ADS)

    Wei, Qi; Ren, Yinhao; Hou, Rui; Shi, Bibo; Lo, Joseph Y.; Carin, Lawrence

    2018-02-01

    Detecting an anomaly such as a malignant tumor or a nodule from medical images including mammogram, CT or PET images is still an ongoing research problem drawing a lot of attention with applications in medical diagnosis. A conventional way to address this is to learn a discriminative model using training datasets of negative and positive samples. The learned model can be used to classify a testing sample into a positive or negative class. However, in medical applications, the high unbalance between negative and positive samples poses a difficulty for learning algorithms, as they will be biased towards the majority group, i.e., the negative one. To address this imbalanced data issue as well as leverage the huge amount of negative samples, i.e., normal medical images, we propose to learn an unsupervised model to characterize the negative class. To make the learned model more flexible and extendable for medical images of different scales, we have designed an autoencoder based on a deep neural network to characterize the negative patches decomposed from large medical images. A testing image is decomposed into patches and then fed into the learned autoencoder to reconstruct these patches themselves. The reconstruction error of one patch is used to classify this patch into a binary class, i.e., a positive or a negative one, leading to a one-class classifier. The positive patches highlight the suspicious areas containing anomalies in a large medical image. The proposed method has been tested on InBreast dataset and achieves an AUC of 0.84. The main contribution of our work can be summarized as follows. 1) The proposed one-class learning requires only data from one class, i.e., the negative data; 2) The patch-based learning makes the proposed method scalable to images of different sizes and helps avoid the large scale problem for medical images; 3) The training of the proposed deep convolutional neural network (DCNN) based auto-encoder is fast and stable.

  6. Evolving optimised decision rules for intrusion detection using particle swarm paradigm

    NASA Astrophysics Data System (ADS)

    Sivatha Sindhu, Siva S.; Geetha, S.; Kannan, A.

    2012-12-01

    The aim of this article is to construct a practical intrusion detection system (IDS) that properly analyses the statistics of network traffic pattern and classify them as normal or anomalous class. The objective of this article is to prove that the choice of effective network traffic features and a proficient machine-learning paradigm enhances the detection accuracy of IDS. In this article, a rule-based approach with a family of six decision tree classifiers, namely Decision Stump, C4.5, Naive Baye's Tree, Random Forest, Random Tree and Representative Tree model to perform the detection of anomalous network pattern is introduced. In particular, the proposed swarm optimisation-based approach selects instances that compose training set and optimised decision tree operate over this trained set producing classification rules with improved coverage, classification capability and generalisation ability. Experiment with the Knowledge Discovery and Data mining (KDD) data set which have information on traffic pattern, during normal and intrusive behaviour shows that the proposed algorithm produces optimised decision rules and outperforms other machine-learning algorithm.

  7. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    NASA Astrophysics Data System (ADS)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  8. Application of isostatic gravity anomaly in the Yellow Sea area

    NASA Astrophysics Data System (ADS)

    Hao, Z.; Qin, J.; Huang, W.; Wu, X.

    2017-12-01

    In order to study the deep crustal structure of the Yellow Sea area, we used the Airy-Heiskanen model to calculate the isostatic gravity anomaly of this area. Based on the Bouguer gravity anomaly and water depth data of this area, we chose the calculating parameters as standard crustal thickness 30 km, crust-mantle density difference 0.6g/cm3and grid spacing 0.1°×0.1°. This study reveals that there are six faults and four isostatic negative anomalies in the study area. The isostatic anomalies in much of Yellow Sea areas give priority to those with positive anomalies. The isostatic anomalies in North Yellow Sea are higher than South Yellow Sea with Jiashan-Xiangshui fault as the boundary. In the north of the study area, isostatic anomalies are characterized by large areas of positive anomaly. The change is relatively slow, and the trends give priority to the trend NE or NEE. In the middle of the north Yellow Sea basin, there is a local negative anomaly, arranged as a string of beads in NE to discontinuous distribution. Negative anomaly range is small, basically corresponds to the region's former Cenozoic sedimentary basin position. To the south of Jiashan-Xiangshui fault and west of Yellow Sea eastern margin fault, including most of the south Yellow Sea and Jiangsu province, the isostatic anomalies are lower. And the positive and negative anomalies are alternative distribution, and negative anomaly trap in extensive development. The trends give priority to NE, NEE, both to the NW. On the basis of the characteristics of isostatic gravity anomalies, it is concluded that the Yellow Sea belongs to continental crustal isostatic area whose isostatic anomalies is smooth and slow. ReferencesHeiskanen, W. A., F. A. V. Meinesz, and S. A. Korff (1958), The Earth and Its Gravity Field, McGraw-Hill, New York. Meng, X. J., X. H. Zhang, and J. Y. Yang (2014), Geophysical survey in eastern China seas and the characteristics of gravity and magnetic fields, Marine Geoglogy

  9. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks

    PubMed Central

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-01-01

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks. PMID:27754380

  10. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks.

    PubMed

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-10-13

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks.

  11. Fear of cancer progression and cancer-related intrusive cognitions in breast cancer survivors.

    PubMed

    Mehnert, Anja; Berg, Petra; Henrich, Gerhard; Herschbach, Peter

    2009-12-01

    To assess the character and frequency of fear of progression (FoP) and to clarify its relationship with cancer-related intrusive cognitions in breast cancer survivors. A sample of 1083 patients was recruited in this cross-sectional study through a population-based Cancer Registry an average of 47 month following diagnosis (66% response rate). Participants completed self-report measures assessing fear of cancer progression (FoP-Q-SF), posttraumatic stress-disorder symptoms (PCL-C), coping strategies (DWI) and quality of life (QoL) (SF-8). In total, 23.6% of women were classified as having moderate to high FoP. Being nervous prior to doctors' appointments or examinations and being afraid of relying on strangers for activities of daily living were the most frequent fears. FoP was significantly associated with younger age, having children, disease progress, chemotherapy, perceived amount of impairments, physical and mental QoL, but not with time since initial diagnosis. Intrusive cognitions were screened in 37% of the sample. We found significant correlations between FoP and intrusive thoughts (r=0.63), avoidance (r=0.57), hyperarousal (r=0.54) and posttraumatic stress disorder diagnosis (r=0.42). Factors significantly associated with moderate and high FoP included a depressive coping style as well as an active problem-oriented coping style, intrusion, avoidance and hyperarousal symptoms (Nagelkerke's R(2)=0.44). Findings of this study give information regarding the frequency and the character of anxiety in breast cancer survivors and underline the relation of FoP to the reality of living with breast cancer. Results suggest that intrusive cognitions as well as avoidance and hyperarousal symptoms seem to be closely related to future-oriented fears of cancer recurrence.

  12. Persistent anomalies of the extratropical Northern Hemisphere wintertime circulation as an initiator of El Niño/Southern Oscillation events

    DOE PAGES

    Anderson, Bruce T.; Hassanzadeh, Pedram; Caballero, Rodrigo

    2017-08-31

    Climates across both hemispheres are strongly influenced by tropical Pacific variability associated with the El Niño/Southern Oscillation (ENSO). Conversely, extratropical variability also can affect the tropics. In particular, seasonal-mean alterations of near-surface winds associated with the North Pacific Oscillation (NPO) serve as a significant extratropical forcing agent of ENSO. However, it is still unclear what dynamical processes give rise to year-to-year shifts in these long-lived NPO anomalies. Here in this paper we show that intraseasonal variability in boreal winter pressure patterns over the Central North Pacific (CNP) imparts a significant signature upon the seasonal-mean circulations characteristic of the NPO. Furthermore » we show that the seasonal-mean signature results in part from year-to-year variations in persistent, quasi-stationary low-pressure intrusions into the subtropics of the CNP, accompanied by the establishment of persistent, quasi-stationary high-pressure anomalies over high latitudes of the CNP. Overall, we find that the frequency of these persistent extratropical anomalies (PEAs) during a given winter serves as a key modulator of intraseasonal variability in extratropical North Pacific circulations and, through their influence on the seasonal-mean circulations in and around the southern lobe of the NPO, the state of the equatorial Pacific 9–12 months later.« less

  13. Persistent anomalies of the extratropical Northern Hemisphere wintertime circulation as an initiator of El Niño/Southern Oscillation events

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, Bruce T.; Hassanzadeh, Pedram; Caballero, Rodrigo

    Climates across both hemispheres are strongly influenced by tropical Pacific variability associated with the El Niño/Southern Oscillation (ENSO). Conversely, extratropical variability also can affect the tropics. In particular, seasonal-mean alterations of near-surface winds associated with the North Pacific Oscillation (NPO) serve as a significant extratropical forcing agent of ENSO. However, it is still unclear what dynamical processes give rise to year-to-year shifts in these long-lived NPO anomalies. Here in this paper we show that intraseasonal variability in boreal winter pressure patterns over the Central North Pacific (CNP) imparts a significant signature upon the seasonal-mean circulations characteristic of the NPO. Furthermore » we show that the seasonal-mean signature results in part from year-to-year variations in persistent, quasi-stationary low-pressure intrusions into the subtropics of the CNP, accompanied by the establishment of persistent, quasi-stationary high-pressure anomalies over high latitudes of the CNP. Overall, we find that the frequency of these persistent extratropical anomalies (PEAs) during a given winter serves as a key modulator of intraseasonal variability in extratropical North Pacific circulations and, through their influence on the seasonal-mean circulations in and around the southern lobe of the NPO, the state of the equatorial Pacific 9–12 months later.« less

  14. Features extraction algorithm about typical railway perimeter intrusion event

    NASA Astrophysics Data System (ADS)

    Zhou, Jieyun; Wang, Chaodong; Liu, Lihai

    2017-10-01

    Research purposes: Optical fiber vibration sensing system has been widely used in the oil, gas, frontier defence, prison and power industries. But, there are few reports about the application in railway defence. That is because the surrounding environment is complicated and there are many challenges to be overcomed in the optical fiber vibration sensing system application. For example, how to eliminate the effects of vibration caused by train, the natural environments such as wind and rain and how to identify and classify the intrusion events. In order to solve these problems, the feature signals of these events should be extracted firstly. Research conclusions: (1) In optical fiber vibration sensing system based on Sagnac interferometer, the peak-to-peak value, peak-to-average ratio, standard deviation, zero-crossing rate, short-term energy and kurtosis may serve as feature signals. (2) The feature signals of resting state, climbing concrete fence, breaking barbed wire, knocking concrete fence and rainstorm have been extracted, which shows significant difference among each other. (3) The research conclusions can be used in the identification and classification of intrusion events.

  15. Hybrid feature selection for supporting lightweight intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  16. Variation of depth to the brittle-ductile transition due to cooling of a midcrustal intrusion.

    USGS Publications Warehouse

    Gettings, M.E.

    1988-01-01

    The depth to the brittle-ductile transition in the crust is often defined by the intersection of a shear resistance relation in the brittle upper crust that increases linearly with depth and a power law relation for ductile flow in the lower crust that depends strongly on T. Transient variation of this depth caused by a magmatic intrusion at a depth near the regional transition can be modelled by a heat conduction model for a rectangular parallelepiped superimposed on a linear geothermal gradient. When parameters appropriate for the southeastern US are used, a moderate-sized intrusion is found to decrease the transition depth by as much as 7 km; significant variations last approx 10 m.y. Since the base of the seismogenic zone is identified with the brittle-ductile transition, these results imply that intrusions of late Tertiary age or younger could be important sources of clustered seismicity. -A.W.H.

  17. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    NASA Astrophysics Data System (ADS)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  18. Anomaly Detection in Power Quality at Data Centers

    NASA Technical Reports Server (NTRS)

    Grichine, Art; Solano, Wanda M.

    2015-01-01

    The goal during my internship at the National Center for Critical Information Processing and Storage (NCCIPS) is to implement an anomaly detection method through the StruxureWare SCADA Power Monitoring system. The benefit of the anomaly detection mechanism is to provide the capability to detect and anticipate equipment degradation by monitoring power quality prior to equipment failure. First, a study is conducted that examines the existing techniques of power quality management. Based on these findings, and the capabilities of the existing SCADA resources, recommendations are presented for implementing effective anomaly detection. Since voltage, current, and total harmonic distortion demonstrate Gaussian distributions, effective set-points are computed using this model, while maintaining a low false positive count.

  19. Data reduction and tying in regional gravity surveys—results from a new gravity base station network and the Bouguer gravity anomaly map for northeastern Mexico

    NASA Astrophysics Data System (ADS)

    Hurtado-Cardador, Manuel; Urrutia-Fucugauchi, Jaime

    2006-12-01

    Since 1947 Petroleos Mexicanos (Pemex) has conducted oil exploration projects using potential field methods. Geophysical exploration companies under contracts with Pemex carried out gravity anomaly surveys that were referred to different floating data. Each survey comprises observations of gravity stations along highways, roads and trails at intervals of about 500 m. At present, 265 separate gravimeter surveys that cover 60% of the Mexican territory (mainly in the oil producing regions of Mexico) are available. This gravity database represents the largest, highest spatial resolution information, and consequently has been used in the geophysical data compilations for the Mexico and North America gravity anomaly maps. Regional integration of gravimeter surveys generates gradients and spurious anomalies in the Bouguer anomaly maps at the boundaries of the connected surveys due to the different gravity base stations utilized. The main objective of this study is to refer all gravimeter surveys from Pemex to a single new first-order gravity base station network, in order to eliminate problems of gradients and spurious anomalies. A second objective is to establish a network of permanent gravity base stations (BGP), referred to a single base from the World Gravity System. Four regional loops of BGP covering eight States of Mexico were established to support the tie of local gravity base stations from each of the gravimeter surveys located in the vicinity of these loops. The third objective is to add the gravity constants, measured and calculated, for each of the 265 gravimeter surveys to their corresponding files in the Pemex and Instituto Mexicano del Petroleo database. The gravity base used as the common datum is the station SILAG 9135-49 (Latin American System of Gravity) located in the National Observatory of Tacubaya in Mexico City. We present the results of the installation of a new gravity base network in northeastern Mexico, reference of the 43 gravimeter surveys

  20. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    PubMed

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  1. Real-time anomaly detection for very short-term load forecasting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luo, Jian; Hong, Tao; Yue, Meng

    Although the recent load information is critical to very short-term load forecasting (VSTLF), power companies often have difficulties in collecting the most recent load values accurately and timely for VSTLF applications. This paper tackles the problem of real-time anomaly detection in most recent load information used by VSTLF. This paper proposes a model-based anomaly detection method that consists of two components, a dynamic regression model and an adaptive anomaly threshold. The case study is developed using the data from ISO New England. This paper demonstrates that the proposed method significantly outperforms three other anomaly detection methods including two methods commonlymore » used in the field and one state-of-the-art method used by a winning team of the Global Energy Forecasting Competition 2014. Lastly, a general anomaly detection framework is proposed for the future research.« less

  2. Real-time anomaly detection for very short-term load forecasting

    DOE PAGES

    Luo, Jian; Hong, Tao; Yue, Meng

    2018-01-06

    Although the recent load information is critical to very short-term load forecasting (VSTLF), power companies often have difficulties in collecting the most recent load values accurately and timely for VSTLF applications. This paper tackles the problem of real-time anomaly detection in most recent load information used by VSTLF. This paper proposes a model-based anomaly detection method that consists of two components, a dynamic regression model and an adaptive anomaly threshold. The case study is developed using the data from ISO New England. This paper demonstrates that the proposed method significantly outperforms three other anomaly detection methods including two methods commonlymore » used in the field and one state-of-the-art method used by a winning team of the Global Energy Forecasting Competition 2014. Lastly, a general anomaly detection framework is proposed for the future research.« less

  3. Microarray-based comparative genomic hybridization analysis in neonates with congenital anomalies: detection of chromosomal imbalances.

    PubMed

    Emy Dorfman, Luiza; Leite, Júlio César L; Giugliani, Roberto; Riegel, Mariluce

    2015-01-01

    To identify chromosomal imbalances by whole-genome microarray-based comparative genomic hybridization (array-CGH) in DNA samples of neonates with congenital anomalies of unknown cause from a birth defects monitoring program at a public maternity hospital. A blind genomic analysis was performed retrospectively in 35 stored DNA samples of neonates born between July of 2011 and December of 2012. All potential DNA copy number variations detected (CNVs) were matched with those reported in public genomic databases, and their clinical significance was evaluated. Out of a total of 35 samples tested, 13 genomic imbalances were detected in 12/35 cases (34.3%). In 4/35 cases (11.4%), chromosomal imbalances could be defined as pathogenic; in 5/35 (14.3%) cases, DNA CNVs of uncertain clinical significance were identified; and in 4/35 cases (11.4%), normal variants were detected. Among the four cases with results considered causally related to the clinical findings, two of the four (50%) showed causative alterations already associated with well-defined microdeletion syndromes. In two of the four samples (50%), the chromosomal imbalances found, although predicted as pathogenic, had not been previously associated with recognized clinical entities. Array-CGH analysis allowed for a higher rate of detection of chromosomal anomalies, and this determination is especially valuable in neonates with congenital anomalies of unknown etiology, or in cases in which karyotype results cannot be obtained. Moreover, although the interpretation of the results must be refined, this method is a robust and precise tool that can be used in the first-line investigation of congenital anomalies, and should be considered for prospective/retrospective analyses of DNA samples by birth defect monitoring programs. Copyright © 2014 Sociedade Brasileira de Pediatria. Published by Elsevier Editora Ltda. All rights reserved.

  4. Impact of the bottom drag coefficient on saltwater intrusion in the extremely shallow estuary

    NASA Astrophysics Data System (ADS)

    Lyu, Hanghang; Zhu, Jianrong

    2018-02-01

    The interactions between the extremely shallow, funnel-shaped topography and dynamic processes in the North Branch (NB) of the Changjiang Estuary produce a particular type of saltwater intrusion, saltwater spillover (SSO), from the NB into the South Branch (SB). This dominant type of saltwater intrusion threatens the winter water supplies of reservoirs located in the estuary. Simulated SSO was weaker than actual SSO in previous studies, and this problem has not been solved until now. The improved ECOM-si model with the advection scheme HSIMT-TVD was applied in this study. Logarithmic and Chézy-Manning formulas of the bottom drag coefficient (BDC) were established in the model to investigate the associated effect on saltwater intrusion in the NB. Modeled data and data collected at eight measurement stations located in the NB from February 19 to March 1, 2017, were compared, and three skill assessment indicators, the correlation coefficient (CC), root-mean-square error (RMSE), and skill score (SS), of water velocity and salinity were used to quantitatively validate the model. The results indicated that the water velocities modeled using the Chézy-Manning formula of BDC were slightly more accurate than those based on the logarithmic BDC formula, but the salinities produced by the latter formula were more accurate than those of the former. The results showed that the BDC increases when water depth decreases during ebb tide, and the results based on the Chézy-Manning formula were smaller than those based on the logarithmic formula. Additionally, the landward net water flux in the upper reaches of the NB during spring tide increases based on the Chézy-Manning formula, and saltwater intrusion in the NB was enhanced, especially in the upper reaches of the NB. At a transect in the upper reaches of the NB, the net transect water flux (NTWF) is upstream in spring tide and downstream in neap tide, and the values produced by the Chézy-Manning formula are much larger than

  5. Effect of winds and waves on salt intrusion in the Pearl River estuary

    NASA Astrophysics Data System (ADS)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  6. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    PubMed

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  7. Gravitational Anomalies Caused by Zonal Winds in Jupiter

    NASA Astrophysics Data System (ADS)

    Schubert, G.; Kong, D.; Zhang, K.

    2012-12-01

    We present an accurate three-dimensional non-spherical numerical calculation of the gravitational anomalies caused by zonal winds in Jupiter. The calculation is based on a three-dimensional finite element method and accounts for the full effect of significant departure from spherical geometry caused by rapid rotation. Since the speeds of Jupiter's zonal winds are much smaller than that of its rigid-body rotation, our numerical calculation is carried out in two stages. First, we compute the non-spherical distributions of density and pressure at the equilibrium within Jupiter via a hybrid inverse approach by determining an a priori unknown coefficient in the polytropic equation of state that results in a match to the observed shape of Jupiter. Second, by assuming that Jupiter's zonal winds extend throughout the interior along cylinders parallel to the rotation axis, we compute gravitational anomalies produced by the wind-related density anomalies, providing an upper bound to the gravitational anomalies caused by the Jovian zonal winds.

  8. Host-Based Multivariate Statistical Computer Operating Process Anomaly Intrusion Detection System (PAIDS)

    DTIC Science & Technology

    2009-03-01

    viii 3.2.3 Sub7 ...from TaskInfo in Excel Format. 3.2.3 Sub7 Also known as SubSeven, this is one of the best known, most widely distributed backdoor programs on the...engineering the spread of viruses, worms, backdoors and other malware. The Sub7 Trojan establishes a server on the victim computer that

  9. A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis

    DTIC Science & Technology

    2014-04-01

    objective? • What vulnerabilities exist in the target system? • What damage or other consequences are likely? • What exploit scripts or other attack...languages C, R, and Python; no response capabilities. JUNG https://blogs.reucon.com/asterisk- java /tag/visualization/ Create custom layouts and can...annotate graphs, links, nodes with any Java data type. Must be familiar with coding in Java to call the routines; no monitoring or response

  10. 3D inversion and modeling of magnetic and gravimetric data characterizing the geophysical anomaly source in Pratinha I in the southeast of Brazil

    NASA Astrophysics Data System (ADS)

    Louro, Vinicius Hector Abud; Mantovani, Marta Silvia Maria

    2012-05-01

    The Alto do Paranaíba Igneous Province (APIP) is known for its great mineral exploratory interest in phosphates, niobium, titanium, and diamonds, among others. In the years of 2005 and 2006, the Economic Development Company of Minas Gerais (CODEMIG — http://www.comig.com.br/) performed an airborne magnetic survey over the portion of this igneous province which belongs to Minas Gerais state, denominated Area 7. This survey revealed at the coordinates (19°45'S, 46°10'W) a tripolar anomaly here referred as Pratinha I. This anomaly does not present evidences of outcropping or topographic remodeling. So, boreholes or studies over its sources make the geophysical methods the best and less expensive solution for studying the body in its subsurface. Besides, two gravimetric ground surveys were performed in 2009 and 2010, confirming the existence of a density contrast over the region of the magnetic anomaly. Therefore, through the magnetometry and gravimetry processing, 3D modeling and inversions, it was possible to estimate the geometry, density and magnetic susceptibility, which when analyzed with the regional geology, enabled the proposition of an igneous intrusion of probable alkaline or kamafugitic composition to justify the gravimetric and magnetic response in the region.

  11. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    PubMed Central

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  12. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    PubMed

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  13. Linking magnetic fabric and cumulate texture in layered mafic-ultramafic intrusions (Invited)

    NASA Astrophysics Data System (ADS)

    O Driscoll, B.; Stevenson, C.; Magee, C.

    2013-12-01

    Research on the magnetic fabrics of igneous rocks, pioneered by Balsley and Buddington[1] and Khan[2], has greatly contributed to our understanding of magma dynamics in lava flows, sheet intrusions and plutons over the past five decades. However, considerably few magnetic fabric studies have focused on layered mafic-ultramafic intrusions, particularly ';lopolithic' intrusions, despite the fact that such rocks may preserve a large range of small-scale kinematic structures potentially related to important magma chamber processes. This may be partly due to the fact that mafic-ultramafic cumulates commonly exhibit visible planar fabrics (mineral lamination), as well as compositional layering, in contrast to the frequent absence of such features in granite bodies or fine-grained mafic lava flows. Indeed, debates in the 1970s and 1980s on the development of layering and mineral fabrics in mafic-ultramafic intrusions, focused around the crystal settling versus in situ crystallisation paradigms, are classic in the subject of igneous petrology. Central to these debates is the notion that a wide range of magma chamber processes occur in layered mafic-ultramafic intrusions that are not frequently considered to occur in their relatively viscous granitic counterparts; in essence, the latter have historically been viewed as much more likely to ';freeze-in' a primary magma flow fabric whilst mafic-ultramafic intrusions are subjected to a more protracted solidification history. This wide array of potential initial sources for layering and mineral fabrics in layered mafic-ultramafic intrusions, together with the possible modification of textures at the postcumulus stage, demands a cautious application of any fabric analysis and presents a problem well-suited to interrogation by the AMS technique. The purpose of this contribution is to provide specific context on the application of AMS to elucidating the formation of cumulates in layered mafic-ultramafic intrusions. Examples of AMS

  14. Unusual extension of the first branchial cleft anomaly.

    PubMed

    Ada, Mehmet; Korkut, Nazim; Güvenç, M Güven; Acioğlu, Engin; Yilmaz, Süleyman; Cevikbaş, Uğur

    2006-03-01

    First branchial cleft is the only branchial structure that persists as the external ear canal, while all other clefts are resorbed. Incomplete obliteration and the degree of closure cause the varied types of first branchial cleft anomalies. They were classified based on the anatomical and histological features. We present an unusual type of first branchial cleft anomaly involving the external auditory canal, the middle ear and the nasopharynx through the eustachian tube.

  15. Seismic data fusion anomaly detection

    NASA Astrophysics Data System (ADS)

    Harrity, Kyle; Blasch, Erik; Alford, Mark; Ezekiel, Soundararajan; Ferris, David

    2014-06-01

    Detecting anomalies in non-stationary signals has valuable applications in many fields including medicine and meteorology. These include uses such as identifying possible heart conditions from an Electrocardiography (ECG) signals or predicting earthquakes via seismographic data. Over the many choices of anomaly detection algorithms, it is important to compare possible methods. In this paper, we examine and compare two approaches to anomaly detection and see how data fusion methods may improve performance. The first approach involves using an artificial neural network (ANN) to detect anomalies in a wavelet de-noised signal. The other method uses a perspective neural network (PNN) to analyze an arbitrary number of "perspectives" or transformations of the observed signal for anomalies. Possible perspectives may include wavelet de-noising, Fourier transform, peak-filtering, etc.. In order to evaluate these techniques via signal fusion metrics, we must apply signal preprocessing techniques such as de-noising methods to the original signal and then use a neural network to find anomalies in the generated signal. From this secondary result it is possible to use data fusion techniques that can be evaluated via existing data fusion metrics for single and multiple perspectives. The result will show which anomaly detection method, according to the metrics, is better suited overall for anomaly detection applications. The method used in this study could be applied to compare other signal processing algorithms.

  16. Enhanced agricultural drought monitoring using a soil water anomaly-based drought index in south-west India

    NASA Astrophysics Data System (ADS)

    Hochstöger, Simon; Pfeil, Isabella; Amarnath, Giriraj; Pani, Peejush; Enenkel, Markus; Wagner, Wolfgang

    2017-04-01

    In India, agriculture accounts for roughly 17% of the GDP and employs around 50% of the total workforce. Especially in the western part of India, most of the agricultural fields are non-irrigated. Hence, agriculture is highly dependent on the monsoon in these areas. However, the absence of rainfall during the monsoon season increases the occurrence of drought periods, which is the main environmental factor affecting agricultural productivity. Rainfall is often not accessible to plants due to runoff or increased rates of evapotranspiration. Therefore, knowledge of the soil moisture state in the root zone of the soil is of great interest in the field of agricultural drought monitoring and operational decision-support. By introducing soil moisture, retrieved via active or passive microwave remote sensors, the gap between rainfall and the subsequent response of vegetation can be closed. Agricultural droughts are strongly influenced by a lack of water availability in the root zone of the soil, making anomalies of the Advanced Scatterometer (ASCAT) soil water index (SWI), representing the water content in lower soil layers, a suitable measure to estimate the water deficit in the soil. These anomalies describe the difference of the actual soil moisture value to the long-term average calculated for the same period. The objective of the study is to investigate the usability of soil moisture anomalies for developing an indicator that is based on critical thresholds, which finally results in a classification with different drought severity levels. In order to evaluate the performance of the drought index, it is compared to the Integrated Drought Severity Index (IDSI), which is developed at the International Water Management Institute in Colombo, Sri Lanka and to rainfall data from the Indian Meteorological Department (IMD). Overall, first analyses show a high potential of using SWI anomalies for agricultural drought monitoring. Most of the drought events detected by negative

  17. Intrusions and provoked and spontaneous confabulations on memory tests in Korsakoff's syndrome.

    PubMed

    Rensen, Yvonne C M; Oosterman, Joukje M; Walvoort, Serge J W; Eling, Paul A T M; Kessels, Roy P C

    2017-03-01

    Intrusions on verbal memory tests have been used as an index for clinical confabulation. Severe memory impairments in combination with executive dysfunction have been suggested to be the underlying mechanism of confabulation, but to date, this relation is unclear. The aim of this study was (a) to examine the relation between (different types of) intrusions and confabulations in a large sample of confabulating patients with Korsakoff's syndrome (KS) and (b) to investigate whether different measures of executive functioning and memory performance are related to provoked and spontaneous confabulation. The Dutch version of the California Verbal Learning Test (CVLT) and various executive function and memory tests were administered to a group of 51 confabulating patients with KS. Professional caregivers rated the severity of provoked and spontaneous confabulation behavior of the patients using the Nijmegen-Venray Confabulation List-20 (NVCL-20). The total number of intrusions on the CVLT was not related to either provoked or spontaneous confabulation scores. None of the CVLT intrusion scores correlated significantly with any of the confabulation scores, but we did find small-to-medium, positive correlations between unrelated intrusions and both provoked confabulations and spontaneous confabulation. Provoked confabulation behavior was associated with executive dysfunction and poorer memory performances. Spontaneous confabulation was not related to performance on measures of executive function and memory. The total number of intrusions on verbal memory tests and clinical confabulations appear to be different phenomena. Only unrelated intrusions produced on the CVLT might possibly be related to confabulations. The production of provoked, but not spontaneous, confabulation is associated with executive dysfunction and memory deficits.

  18. Detection of Perlger-Huet anomaly based on augmented fast marching method and speeded up robust features.

    PubMed

    Sun, Minglei; Yang, Shaobao; Jiang, Jinling; Wang, Qiwei

    2015-01-01

    Pelger-Huet anomaly (PHA) and Pseudo Pelger-Huet anomaly (PPHA) are neutrophil with abnormal morphology. They have the bilobed or unilobed nucleus and excessive clumping chromatin. Currently, detection of this kind of cell mainly depends on the manual microscopic examination by a clinician, thus, the quality of detection is limited by the efficiency and a certain subjective consciousness of the clinician. In this paper, a detection method for PHA and PPHA is proposed based on karyomorphism and chromatin distribution features. Firstly, the skeleton of the nucleus is extracted using an augmented Fast Marching Method (AFMM) and width distribution is obtained through distance transform. Then, caryoplastin in the nucleus is extracted based on Speeded Up Robust Features (SURF) and a K-nearest-neighbor (KNN) classifier is constructed to analyze the features. Experiment shows that the sensitivity and specificity of this method achieved 87.5% and 83.33%, which means that the detection accuracy of PHA is acceptable. Meanwhile, the detection method should be helpful to the automatic morphological classification of blood cells.

  19. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    PubMed

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  20. Infiltration metasomatism within the Rum layered intrusion (Scotland)

    NASA Astrophysics Data System (ADS)

    Leuthold, J.; Blundy, J.; Holness, M.

    2012-04-01

    The well studied Rum Isle layered intrusion was built up by emplacement of a series of 15 macro-rhythmic units. Magma intruded 60.53±0.08 Ma (Hamilton et al., 1998), at a pressure <0.5 kbar (Holness, 1999). Units are composed of feldspathic peridotite at the base, overlain by troctolite and gabbro. Layering is induced by fractional crystallization from picritic magma (Upton et al., 2002; Holness et al., 2007). Rum magma liquid line of descent is complicated by reactive melt percolation within crystal mushes, either originating from continuous compaction of the cumulate pile or from a newly injected reactive picritic magma. The studied Unit 9 sequence is well known for the injection of a picritic sill within the layered intrusion. Clinopyroxene textures are very diverse above the Unit 9 intrusive picritic sill. (1) Late-stage interstitial crystals occur in the basal intrusive peridotite, corresponding to the picritic sill. The Cr2O3 content varies from 1.2 to 0.6 wt% along core to rim profiles. (2) Within the overlying troctolite, poikilitic crystals (up to 2 cm in diameter) enclose randomly oriented plagioclase and olivine, wrapped by a foliated troctolitic assemblage. Within the first 3 meters, the Cr2O3 composition of the few clinopyroxene crystals is very similar to the underlying peridotite one, but it then drops to lower concentration (0.5 to 0 wt%). The plagioclase-clinopyroxene-plagioclase median dihedral angle also decreases from ~90° to ~80° (Sides, 2008). The Cr2O3 content increases progressively towards the troctolite-gabbro wavy horizon. Gabbroic enclaves occur within the troctolite. (3) Cumulus clinopyroxene grains occur in the summit gabbro. Their Cr2O3 content regularly decreases from 1.2-0.8 to 0.7-0.3 across the gabbro pile. Cr-spinel crystals are rare. Median plagioclase-clinopyroxene-plagioclase dihedral angles evolve from ~85° to ~95°. We propose that troctolites, that contain gabbroic enclaves, result from clinopyroxene primocryst