Sample records for non-intrusive characterization methods

  1. Non-Intrusive Optical Diagnostic Methods for Flowfield Characterization

    NASA Technical Reports Server (NTRS)

    Tabibi, Bagher M.; Terrell, Charles A.; Spraggins, Darrell; Lee, Ja. H.; Weinstein, Leonard M.

    1997-01-01

    Non-intrusive optical diagnostic techniques such as Electron Beam Fluorescence (EBF), Laser-Induced Fluorescence (LIF), and Focusing Schlieren (FS) have been setup for high-speed flow characterization and large flowfield visualization, respectively. Fluorescence emission from the First Negative band of N2(+) with the (0,0) vibration transition (at lambda =391.44 nm) was obtained using the EBF technique and a quenching rate of N2(+)* molecules by argon gas was reported. A very high sensitivity FS system was built and applied in the High-Speed Flow Generator (HFG) at NASA LaRC. A LIF system is available at the Advanced Propulsion Laboratory (APL) on campus and a plume exhaust velocity measurement, measuring the Doppler shift from lambda = 728.7 nm of argon gas, is under way.

  2. Non-intrusive methods of characterizing vehicles on the highway.

    DOT National Transportation Integrated Search

    2003-06-01

    Over the past year we have worked on the development of a real-time laser-based non-intrusive field-deployable detection system for delineation of moving vehicles. The primary goal of the project is to develop a roadway detection system that can be u...

  3. Non-Intrusive, Time-Resolved Hall Thruster Near-Field Electron Temperature Measurements

    DTIC Science & Technology

    2011-08-01

    With the growing interest in Hall thruster technology, comes the need to fully characterize the plasma dynamics that determine performance. Of...instabilities characteristic of Hall thruster behavior, time resolved techniques must be developed. This study presents a non-intrusive method of

  4. Non-Intrusive Pressure/Multipurpose Sensor and Method

    NASA Technical Reports Server (NTRS)

    Smith, William C. (Inventor)

    2001-01-01

    Method and apparatus are provided for determining pressure using a non-intrusive sensor that is easily attachable to the plumbing of a pressurized system. A bent mode implementation and a hoop mode implementation of the invention are disclosed. Each of these implementations is able to nonintrusively measure pressure while fluid is flowing. As well, each implementation may be used to measure mass flow rate simultaneously with pressure. An ultra low noise control system is provided for making pressure measurements during gas flow. The control system includes two tunable digital bandpass filters with center frequencies that are responsive to a clock frequency. The clock frequency is divided by a factor of N to produce a driving vibrational signal for resonating a metal sensor section.

  5. Expansion tunnel characterization and development of non-intrusive microwave plasma diagnostics

    NASA Astrophysics Data System (ADS)

    Dufrene, Aaron T.

    The focus of this research is the development of non-intrusive microwave diagnostics for characterization of expansion tunnels. The main objectives of this research are to accurately characterize the LENS XX expansion tunnel facility, develop non-intrusive RF diagnostics that will work in short-duration expansion tunnel testing, and to determine plasma properties and other information that might otherwise be unknown, less accurate, intrusive, or more difficult to determine through conventional methods. Testing was completed in LENS XX, a new large-scale expansion tunnel facility at CUBRC, Inc. This facility is the largest known expansion tunnel in the world with an inner diameter of 24 inches, a 96 inch test section, and an end-to-end length of more than 240 ft. Expansion tunnels are currently the only facilities capable of generating high-enthalpy test conditions with minimal or no freestream dissociation or ionization. However, short test times and freestream noise at some conditions have limited development of these facilities. To characterize the LENS XX facility, the first step is to evaluate the facility pressure, vacuum, temperature, and other mechanical restrictions to derive a theoretical testing parameter space. Test condition maps are presented for a variety of parameters and gases based on 1D perfect gas dynamics. Test conditions well beyond 10 km/s or 50 MJ/kg are identified with minimum test times of 200 us. Additionally, a four-chamber expansion tube configuration is considered for extending the stagnation enthalpy range of the facility even further. A microwave shock speed diagnostic measures primary and secondary shock speeds accurately every 30 in. down the entire length of the facility resulting in a more accurate determination of freestream conditions required for computational comparisons. The high resolution of this measurement is used to assess shock speed attenuation as well as secondary diaphragm performance. Negligible shock attenuation is

  6. Integrating Intrusive and Non-intrusive Characterization Methods To Achieve A Conceptual Site Model For The SLDA FUSRAP

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durham, L.A.; Peterson, J.M.; Frothingham, D.G.

    2008-07-01

    The U.S. Army Corps of Engineers (USACE) is addressing radiological contamination following Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) requirements at the Shallow Land Disposal Area (SLDA) site, which is a radiologically contaminated property that is part of the Formerly Utilized Sites Remedial Action Program (FUSRAP). The SLDA is an 18-hectare (44- acre) site in Parks Township, Armstrong County, Pennsylvania, about 37 kilometers (23 miles) east-northeast of Pittsburgh. According to historical record, radioactive wastes were disposed of at the SLDA in a series of trenches by the Nuclear Materials and Equipment Company (NUMEC) in the 1960's. The wastes originatedmore » from the nearby Apollo nuclear fuel fabrication facility, which began operations under NUMEC in the late 1950's and fabricated enriched uranium into naval reactor fuel elements. It is believed that the waste materials were buried in a series of pits constructed adjacent to one another in accordance with an Atomic Energy Commission (AEC) regulation that has since been rescinded. A CERCLA remedial investigation/feasibility study (RI/FS) process was completed for the SLDA site, and the results of the human health risk assessment indicated that the radiologically contaminated wastes could pose a risk to human health in the future. There are no historical records that provide the exact location of these pits. However, based on geophysical survey results conducted in the 1980's, these pits were defined by geophysical anomalies and were depicted on historical site drawings as trenches. At the SLDA site, a combination of investigative methods and tools was used in the RI/FS and site characterization activities. The SLDA site provides an excellent example of how historical documents and data, historical aerial photo analysis, physical sampling, and non-intrusive geophysical and gamma walkover surveys were used in combination to reduce the uncertainty in the location of the

  7. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  8. Vapor Intrusion Characterization Report (Revision 1.0)

    EPA Pesticide Factsheets

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  9. TReacLab: An object-oriented implementation of non-intrusive splitting methods to couple independent transport and geochemical software

    NASA Astrophysics Data System (ADS)

    Jara, Daniel; de Dreuzy, Jean-Raynald; Cochepin, Benoit

    2017-12-01

    Reactive transport modeling contributes to understand geophysical and geochemical processes in subsurface environments. Operator splitting methods have been proposed as non-intrusive coupling techniques that optimize the use of existing chemistry and transport codes. In this spirit, we propose a coupler relying on external geochemical and transport codes with appropriate operator segmentation that enables possible developments of additional splitting methods. We provide an object-oriented implementation in TReacLab developed in the MATLAB environment in a free open source frame with an accessible repository. TReacLab contains classical coupling methods, template interfaces and calling functions for two classical transport and reactive software (PHREEQC and COMSOL). It is tested on four classical benchmarks with homogeneous and heterogeneous reactions at equilibrium or kinetically-controlled. We show that full decoupling to the implementation level has a cost in terms of accuracy compared to more integrated and optimized codes. Use of non-intrusive implementations like TReacLab are still justified for coupling independent transport and chemical software at a minimal development effort but should be systematically and carefully assessed.

  10. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    PubMed

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  11. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    DOE PAGES

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-flymore » during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.« less

  12. Geophysical characterization of saltwater intrusion in a coastal aquifer: The case of Martil-Alila plain (North Morocco)

    NASA Astrophysics Data System (ADS)

    Himi, Mahjoub; Tapias, Josefiina; Benabdelouahab, Sara; Salhi, Adil; Rivero, Luis; Elgettafi, Mohamed; El Mandour, Abdenabi; Stitou, Jamal; Casas, Albert

    2017-02-01

    Several factors can affect the quantity and the quality of groundwater resources, but in coastal aquifers seawater intrusion is often the most significant issue regarding freshwater supply. Further, saltwater intrusion is a worldwide issue because about seventy percent of the world's population lives in coastal regions. Generally, fresh groundwater not affected by saltwater intrusion is characterized by low salinity and therefore low electrical conductivity (EC) values. Consequently, high values of EC in groundwater along the coastline are usually associated to seawater intrusion. This effect is amplified if the coastal aquifer is overexploited with a subsequent gradual displacement of the freshwater-saltwater interface towards the continent. Delineation of marine intrusion in coastal aquifers has traditionally relied upon observation wells and collection of water samples. This approach may miss important hydrologic features related to saltwater intrusion in areas where access is difficult and where wells are widely spaced. Consequently, the scarcity of sampling points and sometimes their total absence makes the number of data available limited and most of the time not representative for mapping the spatial and temporal variability of groundwater salinity. In this study, we use a series of geophysical methods for characterizing the aquifer geometry and the extension of saltwater intrusion in the Martil-Alila coastal region (Morocco) as a complement to geological and hydrogeochemical data. For this reason, we carried out three geophysical surveys: Gravity, Electrical Resistivity and Frequency Domain Electromagnetic. The geometry of the basin has been determined from the interpretation of a detailed gravity survey. Electrical resistivity models derived from vertical electrical soundings allowed to characterize the vertical and the lateral extensions of aquifer formations. Finally, frequency domain electromagnetic methods allowed delineating the extension of the

  13. Intrusive Method for Uncertainty Quantification in a Multiphase Flow Solver

    NASA Astrophysics Data System (ADS)

    Turnquist, Brian; Owkes, Mark

    2016-11-01

    Uncertainty quantification (UQ) is a necessary, interesting, and often neglected aspect of fluid flow simulations. To determine the significance of uncertain initial and boundary conditions, a multiphase flow solver is being created which extends a single phase, intrusive, polynomial chaos scheme into multiphase flows. Reliably estimating the impact of input uncertainty on design criteria can help identify and minimize unwanted variability in critical areas, and has the potential to help advance knowledge in atomizing jets, jet engines, pharmaceuticals, and food processing. Use of an intrusive polynomial chaos method has been shown to significantly reduce computational cost over non-intrusive collocation methods such as Monte-Carlo. This method requires transforming the model equations into a weak form through substitution of stochastic (random) variables. Ultimately, the model deploys a stochastic Navier Stokes equation, a stochastic conservative level set approach including reinitialization, as well as stochastic normals and curvature. By implementing these approaches together in one framework, basic problems may be investigated which shed light on model expansion, uncertainty theory, and fluid flow in general. NSF Grant Number 1511325.

  14. The electrical self-potential method is a non-intrusive snow-hydrological sensor

    NASA Astrophysics Data System (ADS)

    Thompson, S. S.; Kulessa, B.; Essery, R. L. H.; Lüthi, M. P.

    2015-08-01

    Our ability to measure, quantify and assimilate hydrological properties and processes of snow in operational models is disproportionally poor compared to the significance of seasonal snowmelt as a global water resource and major risk factor in flood and avalanche forecasting. Encouraged by recent theoretical, modelling and laboratory work, we show here that the diurnal evolution of aerially-distributed self-potential magnitudes closely track those of bulk meltwater fluxes in melting in-situ snowpacks at Rhone and Jungfraujoch glaciers, Switzerland. Numerical modelling infers temporally-evolving liquid water contents in the snowpacks on successive days in close agreement with snow-pit measurements. Muting previous concerns, the governing physical and chemical properties of snow and meltwater became temporally invariant for modelling purposes. Because measurement procedure is straightforward and readily automated for continuous monitoring over significant spatial scales, we conclude that the self-potential geophysical method is a highly-promising non-intrusive snow-hydrological sensor for measurement practice, modelling and operational snow forecasting.

  15. A New Intrusion Detection Method Based on Antibody Concentration

    NASA Astrophysics Data System (ADS)

    Zeng, Jie; Li, Tao; Li, Guiyang; Li, Haibo

    Antibody is one kind of protein that fights against the harmful antigen in human immune system. In modern medical examination, the health status of a human body can be diagnosed by detecting the intrusion intensity of a specific antigen and the concentration indicator of corresponding antibody from human body’s serum. In this paper, inspired by the principle of antigen-antibody reactions, we present a New Intrusion Detection Method Based on Antibody Concentration (NIDMBAC) to reduce false alarm rate without affecting detection rate. In our proposed method, the basic definitions of self, nonself, antigen and detector in the intrusion detection domain are given. Then, according to the antigen intrusion intensity, the change of antibody number is recorded from the process of clone proliferation for detectors based on the antigen classified recognition. Finally, building upon the above works, a probabilistic calculation method for the intrusion alarm production, which is based on the correlation between the antigen intrusion intensity and the antibody concen-tration, is proposed. Our theoretical analysis and experimental results show that our proposed method has a better performance than traditional methods.

  16. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  17. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  18. A Non-Intrusive Algorithm for Sensitivity Analysis of Chaotic Flow Simulations

    NASA Technical Reports Server (NTRS)

    Blonigan, Patrick J.; Wang, Qiqi; Nielsen, Eric J.; Diskin, Boris

    2017-01-01

    We demonstrate a novel algorithm for computing the sensitivity of statistics in chaotic flow simulations to parameter perturbations. The algorithm is non-intrusive but requires exposing an interface. Based on the principle of shadowing in dynamical systems, this algorithm is designed to reduce the effect of the sampling error in computing sensitivity of statistics in chaotic simulations. We compare the effectiveness of this method to that of the conventional finite difference method.

  19. Resident Load Influence Analysis Method for Price Based on Non-intrusive Load Monitoring and Decomposition Data

    NASA Astrophysics Data System (ADS)

    Jiang, Wenqian; Zeng, Bo; Yang, Zhou; Li, Gang

    2018-01-01

    In the non-invasive load monitoring mode, the load decomposition can reflect the running state of each load, which will help the user reduce unnecessary energy costs. With the demand side management measures of time of using price, a resident load influence analysis method for time of using price (TOU) based on non-intrusive load monitoring data are proposed in the paper. Relying on the current signal of the resident load classification, the user equipment type, and different time series of self-elasticity and cross-elasticity of the situation could be obtained. Through the actual household load data test with the impact of TOU, part of the equipment will be transferred to the working hours, and users in the peak price of electricity has been reduced, and in the electricity at the time of the increase Electrical equipment, with a certain regularity.

  20. Railway clearance intrusion detection method with binocular stereo vision

    NASA Astrophysics Data System (ADS)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  1. TTP AL921102: An integrated geophysics program for non-intrusive characterization of mixed-waste landfill sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hasbrouck, J.C.

    1992-11-01

    Chem-Nuclear Geotech, Inc. (Geotech), operating contractor for the US Department of Energy Grand Junction Projects Office, is conducting the Integrated Geophysics Program for Non-Intrusive Characterization of Mixed-Waste Landfill Sites (Technical Task Plan [TTP] AL921102). The TTP is part of the Mixed-Waste Landfill Integrated Demonstration (MWLID). The objective of this task was to demonstrate that an integrated program of surface geophysics can be used to effectively and nonintrusively characterize n-mixed-waste landfill sites. To accomplish this objective, integrated field demonstrations were conducted over two previously identified areas of interest (designated Areas A and B) within the MWLID test site at the Chemicalmore » Waste Landfill (CWL), Technical Area 3, at the Sandia National Laboratories, Albuquerque, New Mexico (Figures 1 and 2). Area A was centered roughly around the Chromic Acid and Organics Pits in the southeast-central portion of the landfill and Area B was centered around the 60's Pits'' area in the northeast-central portion of the landfill. Pit locations were known in Area A and suspected in Area B. This progress report describes the geophysical surveys conducted by Geotech and presents preliminary displays and analyses. Volume 2 of this report contains the raw data for all the surveys conducted by Geotech for this TTP.« less

  2. The domain interface method: a general-purpose non-intrusive technique for non-conforming domain decomposition problems

    NASA Astrophysics Data System (ADS)

    Cafiero, M.; Lloberas-Valls, O.; Cante, J.; Oliver, J.

    2016-04-01

    A domain decomposition technique is proposed which is capable of properly connecting arbitrary non-conforming interfaces. The strategy essentially consists in considering a fictitious zero-width interface between the non-matching meshes which is discretized using a Delaunay triangulation. Continuity is satisfied across domains through normal and tangential stresses provided by the discretized interface and inserted in the formulation in the form of Lagrange multipliers. The final structure of the global system of equations resembles the dual assembly of substructures where the Lagrange multipliers are employed to nullify the gap between domains. A new approach to handle floating subdomains is outlined which can be implemented without significantly altering the structure of standard industrial finite element codes. The effectiveness of the developed algorithm is demonstrated through a patch test example and a number of tests that highlight the accuracy of the methodology and independence of the results with respect to the framework parameters. Considering its high degree of flexibility and non-intrusive character, the proposed domain decomposition framework is regarded as an attractive alternative to other established techniques such as the mortar approach.

  3. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    PubMed

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  4. Draft Plan to Develop Non-Intrusive Load Monitoring Test Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mayhorn, Ebony T.; Sullivan, Greg P.; Petersen, Joseph M.

    2015-09-29

    This document presents a Draft Plan proposed to develop a common test protocol that can be used to evaluate the performance requirements of Non-Intrusive Load Monitoring. Development on the test protocol will be focused on providing a consistent method that can be used to quantify and compare the performance characteristics of NILM products. Elements of the protocols include specifications for appliances to be used, metrics, instrumentation, and a procedure to simulate appliance behavior during tests. In addition, three priority use cases for NILM will be identified and their performance requirements will specified.

  5. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    PubMed Central

    Alcalá, José M.; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-01-01

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented. PMID:28208672

  6. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena.

  7. The Electrical Self-Potential Method as a Non-Intrusive Snow-Hydrological Sensor

    NASA Astrophysics Data System (ADS)

    Kulessa, B.; Thompson, S. S.; Luethi, M. P.; Essery, R.

    2015-12-01

    Building on growing momentum in the application of geophysical techniques to snow problems and, specifically, on new theory and an electrical geophysical snow hydrological model published recently; we demonstrate for the first time that the electrical self-potential geophysical technique can sense in-situ bulk meltwater fluxes. This has broad and immediate implications for snow measurement practice, modelling and operational snow forecasting. Our ability to measure, quantify and assimilate hydrological properties and processes of snow in operational models is disproportionally poor compared to the significance of seasonal snowmelt as a global water resource and major risk factor in flood and avalanche forecasting. Encouraged by recent theoretical, modelling and laboratory work, we show here that the diurnal evolution of aerially-distributed self-potential magnitudes closely track those of bulk meltwater fluxes in melting in-situ snowpacks at Rhone and Jungfraujoch glaciers, Switzerland. Numerical modelling infers temporally-evolving liquid water contents in the snowpacks on successive days in close agreement with snow-pit measurements. Muting previous concerns, the governing physical and chemical properties of snow and meltwater became temporally invariant for modelling purposes. Because measurement procedure is straightforward and readily automated for continuous monitoring over significant spatial scales, we conclude that the self-potential geophysical method is a highly-promising non-intrusive snow-hydrological sensor for measurement practice, modelling and operational snow forecasting.

  8. A Non-Intrusive Cyber Physical Social Sensing Solution to People Behavior Tracking: Mechanism, Prototype, and Field Experiments.

    PubMed

    Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid

    2017-01-13

    Tracking people's behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people's access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people's access behaviors can be correctly tracked within a one-second delay.

  9. Demonstration of non-intrusive traffic data collection devices in Alaska.

    DOT National Transportation Integrated Search

    2010-05-01

    The purpose of this document is to present findings from the Demonstration of Non-Intrusive Traffic Data Collection Devices in Alaska. This project was initiated by the : Alaska Department of Transportation and Public Facilities (DOT&PF) to evaluate ...

  10. A Non-Intrusive Cyber Physical Social Sensing Solution to People Behavior Tracking: Mechanism, Prototype, and Field Experiments

    PubMed Central

    Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid

    2017-01-01

    Tracking people’s behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people’s access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people’s access behaviors can be correctly tracked within a one-second delay. PMID:28098772

  11. Non-intrusive torque measurement for rotating shafts using optical sensing of zebra-tapes

    NASA Astrophysics Data System (ADS)

    Zappalá, D.; Bezziccheri, M.; Crabtree, C. J.; Paone, N.

    2018-06-01

    Non-intrusive, reliable and precise torque measurement is critical to dynamic performance monitoring, control and condition monitoring of rotating mechanical systems. This paper presents a novel, contactless torque measurement system consisting of two shaft-mounted zebra tapes and two optical sensors mounted on stationary rigid supports. Unlike conventional torque measurement methods, the proposed system does not require costly embedded sensors or shaft-mounted electronics. Moreover, its non-intrusive nature, adaptable design, simple installation and low cost make it suitable for a large variety of advanced engineering applications. Torque measurement is achieved by estimating the shaft twist angle through analysis of zebra tape pulse train time shifts. This paper presents and compares two signal processing methods for torque measurement: rising edge detection and cross-correlation. The performance of the proposed system has been proven experimentally under both static and variable conditions and both processing approaches show good agreement with reference measurements from an in-line, invasive torque transducer. Measurement uncertainty has been estimated according to the ISO GUM (Guide to the expression of uncertainty in measurement). Type A analysis of experimental data has provided an expanded uncertainty relative to the system full-scale torque of  ±0.30% and  ±0.86% for the rising edge and cross-correlation approaches, respectively. Statistical simulations performed by the Monte Carlo method have provided, in the worst case, an expanded uncertainty of  ±1.19%.

  12. Active Learning Framework for Non-Intrusive Load Monitoring: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jin, Xin

    2016-05-16

    Non-Intrusive Load Monitoring (NILM) is a set of techniques that estimate the electricity usage of individual appliances from power measurements taken at a limited number of locations in a building. One of the key challenges in NILM is having too much data without class labels yet being unable to label the data manually for cost or time constraints. This paper presents an active learning framework that helps existing NILM techniques to overcome this challenge. Active learning is an advanced machine learning method that interactively queries a user for the class label information. Unlike most existing NILM systems that heuristically requestmore » user inputs, the proposed method only needs minimally sufficient information from a user to build a compact and yet highly representative load signature library. Initial results indicate the proposed method can reduce the user inputs by up to 90% while still achieving similar disaggregation performance compared to a heuristic method. Thus, the proposed method can substantially reduce the burden on the user, improve the performance of a NILM system with limited user inputs, and overcome the key market barriers to the wide adoption of NILM technologies.« less

  13. A non-intrusive screening methodology for environmental hazard assessment at waste disposal sites for water resources protection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simons, B.A.; Woldt, W.E.; Jones, D.D.

    The environmental and health risks posed by unregulated waste disposal sites are potential concerns of Pacific Rim regions and island ares because of the need to protect aquifers and other valuable water resources. A non-intrusive screening methodology to determine site characteristics including possible soil and/or groundwater contamination, areal extent of waste, etc. is being developed and tested at waste disposal sites in Nebraska. This type of methodology would be beneficial to Pacific Rim regions in investigating and/or locating unknown or poorly documented contamination areas for hazard assessment and groundwater protection. Traditional assessment methods are generally expensive, time consuming, and potentiallymore » exacerbate the problem. Ideally, a quick and inexpensive assessment method to reliably characterize these sites is desired. Electromagnetic (EM) conductivity surveying and soil-vapor sampling techniques, combined with innovative three-dimensional geostatistical methods are used to map the data to develop a site characterization of the subsurface and to aid in tracking any contaminant plumes. The EM data is analyzed to determine/estimate the extent and volume of waste and/or leachate. Soil-vapor data are analyzed to estimate a site`s volatile organic compound (VOC) emission rate to the atmosphere. The combined information could then be incorporated as one part of an overall hazard assessment system.« less

  14. Non-Intrusive, Distributed Gas Sensing Technology for Advanced Spacesuits

    NASA Technical Reports Server (NTRS)

    Delgado, Jesus; Phillips, Straun; Rubtsov, Vladimir; Chullen, Cinda

    2015-01-01

    Chemical sensors for monitoring gas composition, including oxygen, humidity, carbon dioxide, and trace contaminants are needed to characterize and validate spacesuit design and operating parameters. This paper reports on the first prototypes of a non-intrusive gas sensing technology based on flexible sensitive patches positioned inside spacesuit prototypes and interrogated by optical fibers routed outside the suit, taking advantage of the transparent materials of the suit prototypes. The sensitive patches are based on luminescent materials whose emission parameters vary with the partial pressure of a specific gas. Patches sensitive to carbon dioxide, humidity, oxygen, and ammonia have been developed, and their preliminary characterization in the laboratory using Mark III-like helmet parts is described. The first prototype system consists of a four-channel fiber optic luminescent detector that can be used to monitor any of the selected target gases at four locations. To switch from one gas to another we replace the (disposable) sensor patches and adjust the system settings. Repeatability among sensitive patches and of sensor performance from location to location has been confirmed, assuring that suit engineers will have flexibility in selecting multiple sensing points, fitting the sensor elements into the spacesuit, and easily repositioning the sensor elements as desired. The evaluation of the first prototype for monitoring carbon dioxide during washout studies in a space suit prototype is presented.

  15. Non-Intrusive, Distributed Gas Sensing Technology for Advanced Spacesuits

    NASA Technical Reports Server (NTRS)

    Delgado, Jesus; Phillips, Straun; Rubtsov, Vladimir; Chullen, Cinda

    2015-01-01

    Chemical sensors for monitoring gas composition, including oxygen, humidity, carbon dioxide, and trace contaminants, are needed to characterize and validate spacesuit design and operating parameters. This paper reports on the first prototypes of a non-intrusive gas sensing technology based on flexible sensitive patches positioned inside spacesuit prototypes and interrogated via optical fibers routed outside the suit, taking advantage of the transparent materials of the suit prototypes. The sensitive patches are based on luminescent materials whose emission parameters vary with the partial pressure of a specific gas. Patches sensitive to carbon dioxide, humidity, and temperature have been developed, and their preliminary laboratory characterization in Mark III-like helmet parts is described. The first prototype system consists of a four-channel fiber optic luminescent detector that can be used to monitor any of the selected target gases at four locations. To switch from one gas to another we replace the (disposable) sensor patches and adjust the system settings. Repeatability among sensitive patches and of sensor performance from location to location has been confirmed, assuring that suit engineers will have flexibility in selecting multiple sensing points, fitting the sensor elements into the spacesuit, and easily repositioning the sensor elements as desired. The evaluation of the first prototype for monitoring carbon dioxide during washout studies in a spacesuit prototype is presented.

  16. Non-intrusive reduced order modeling of nonlinear problems using neural networks

    NASA Astrophysics Data System (ADS)

    Hesthaven, J. S.; Ubbiali, S.

    2018-06-01

    We develop a non-intrusive reduced basis (RB) method for parametrized steady-state partial differential equations (PDEs). The method extracts a reduced basis from a collection of high-fidelity solutions via a proper orthogonal decomposition (POD) and employs artificial neural networks (ANNs), particularly multi-layer perceptrons (MLPs), to accurately approximate the coefficients of the reduced model. The search for the optimal number of neurons and the minimum amount of training samples to avoid overfitting is carried out in the offline phase through an automatic routine, relying upon a joint use of the Latin hypercube sampling (LHS) and the Levenberg-Marquardt (LM) training algorithm. This guarantees a complete offline-online decoupling, leading to an efficient RB method - referred to as POD-NN - suitable also for general nonlinear problems with a non-affine parametric dependence. Numerical studies are presented for the nonlinear Poisson equation and for driven cavity viscous flows, modeled through the steady incompressible Navier-Stokes equations. Both physical and geometrical parametrizations are considered. Several results confirm the accuracy of the POD-NN method and show the substantial speed-up enabled at the online stage as compared to a traditional RB strategy.

  17. Non-Intrusive Load Monitoring Approaches for Disaggregated Energy Sensing: A Survey

    PubMed Central

    Zoha, Ahmed; Gluhak, Alexander; Imran, Muhammad Ali; Rajasegarar, Sutharshan

    2012-01-01

    Appliance Load Monitoring (ALM) is essential for energy management solutions, allowing them to obtain appliance-specific energy consumption statistics that can further be used to devise load scheduling strategies for optimal energy utilization. Fine-grained energy monitoring can be achieved by deploying smart power outlets on every device of interest; however it incurs extra hardware cost and installation complexity. Non-Intrusive Load Monitoring (NILM) is an attractive method for energy disaggregation, as it can discern devices from the aggregated data acquired from a single point of measurement. This paper provides a comprehensive overview of NILM system and its associated methods and techniques used for disaggregated energy sensing. We review the state-of-the art load signatures and disaggregation algorithms used for appliance recognition and highlight challenges and future research directions. PMID:23223081

  18. Non-intrusive head movement analysis of videotaped seizures of epileptic origin.

    PubMed

    Mandal, Bappaditya; Eng, How-Lung; Lu, Haiping; Chan, Derrick W S; Ng, Yen-Ling

    2012-01-01

    In this work we propose a non-intrusive video analytic system for patient's body parts movement analysis in Epilepsy Monitoring Unit. The system utilizes skin color modeling, head/face pose template matching and face detection to analyze and quantify the head movements. Epileptic patients' heads are analyzed holistically to infer seizure and normal random movements. The patient does not require to wear any special clothing, markers or sensors, hence it is totally non-intrusive. The user initializes the person-specific skin color and selects few face/head poses in the initial few frames. The system then tracks the head/face and extracts spatio-temporal features. Support vector machines are then used on these features to classify seizure-like movements from normal random movements. Experiments are performed on numerous long hour video sequences captured in an Epilepsy Monitoring Unit at a local hospital. The results demonstrate the feasibility of the proposed system in pediatric epilepsy monitoring and seizure detection.

  19. An Optimal Method for Detecting Internal and External Intrusion in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.

    Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

  20. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    PubMed Central

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression. PMID:27069381

  1. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    PubMed

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  2. Non-contact method for characterization of small size thermoelectric modules.

    PubMed

    Manno, Michael; Yang, Bao; Bar-Cohen, Avram

    2015-08-01

    Conventional techniques for characterization of thermoelectric performance require bringing measurement equipment into direct contact with the thermoelectric device, which is increasingly error prone as device size decreases. Therefore, the novel work presented here describes a non-contact technique, capable of accurately measuring the maximum ΔT and maximum heat pumping of mini to micro sized thin film thermoelectric coolers. The non-contact characterization method eliminates the measurement errors associated with using thermocouples and traditional heat flux sensors to test small samples and large heat fluxes. Using the non-contact approach, an infrared camera, rather than thermocouples, measures the temperature of the hot and cold sides of the device to determine the device ΔT and a laser is used to heat to the cold side of the thermoelectric module to characterize its heat pumping capacity. As a demonstration of the general applicability of the non-contact characterization technique, testing of a thin film thermoelectric module is presented and the results agree well with those published in the literature.

  3. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

    PubMed Central

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-01-01

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu–Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors. PMID:23529146

  4. A distributed signature detection method for detecting intrusions in sensor systems.

    PubMed

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-03-25

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

  5. Innovative methods to reduce salt water intrusion in harbours

    NASA Astrophysics Data System (ADS)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  6. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes

    DOEpatents

    Piper, Thomas C.

    1982-01-01

    An arrangement for deleting liquid in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.072 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  7. Adjoint sensitivity analysis of chaotic dynamical systems with non-intrusive least squares shadowing

    NASA Astrophysics Data System (ADS)

    Blonigan, Patrick J.

    2017-11-01

    This paper presents a discrete adjoint version of the recently developed non-intrusive least squares shadowing (NILSS) algorithm, which circumvents the instability that conventional adjoint methods encounter for chaotic systems. The NILSS approach involves solving a smaller minimization problem than other shadowing approaches and can be implemented with only minor modifications to preexisting tangent and adjoint solvers. Adjoint NILSS is demonstrated on a small chaotic ODE, a one-dimensional scalar PDE, and a direct numerical simulation (DNS) of the minimal flow unit, a turbulent channel flow on a small spatial domain. This is the first application of an adjoint shadowing-based algorithm to a three-dimensional turbulent flow.

  8. Evaluation and analysis of non-intrusive techniques for detecting illicit substances

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Micklich, B.J.; Roche, C.T.; Fink, C.L.

    1995-12-31

    Argonne National Laboratory (ANL) and the Houston Advanced Research Center (HARC) have been tasked by the Counterdrug Technology Assessment Center of the Office of National Drug Control Policy to conduct evaluations and analyses of technologies for the non-intrusive inspection of containers for illicit substances. These technologies span the range of nuclear, X-ray, and chemical techniques used in nondestructive sample analysis. ANL has performed assessments of nuclear and X-ray inspection concepts and undertaken site visits with developers to understand the capabilities and the range of applicability of candidate systems. ANL and HARC have provided support to law enforcement agencies (LEAs), includingmore » participation in numerous field studies. Both labs have provided staff to assist in the Narcotics Detection Technology Assessment (NDTA) program for evaluating drug detection systems. Also, the two labs are performing studies of drug contamination of currency. HARC has directed technical evaluations of automated ballistics imaging and identification systems under consideration by law enforcement agencies. ANL and HARC have sponsored workshops and a symposium, and are participating in a Non-Intrusive Inspection Study being led by Dynamics Technology, Incorporated.« less

  9. Non-Intrusive Impedance-Based Cable Tester

    NASA Technical Reports Server (NTRS)

    Medelius, Pedro J. (Inventor); Simpson, Howard J. (Inventor)

    1999-01-01

    A non-intrusive electrical cable tester determines the nature and location of a discontinuity in a cable through application of an oscillating signal to one end of the cable. The frequency of the oscillating signal is varied in increments until a minimum, close to zero voltage is measured at a signal injection point which is indicative of a minimum impedance at that point. The frequency of the test signal at which the minimum impedance occurs is then employed to determine the distance to the discontinuity by employing a formula which relates this distance to the signal frequency and the velocity factor of the cable. A numerically controlled oscillator is provided to generate the oscillating signal, and a microcontroller automatically controls operation of the cable tester to make the desired measurements and display the results. The device is contained in a portable housing which may be hand held to facilitate convenient use of the device in difficult to access locations.

  10. Non-Intrusive Load Monitoring of HVAC Components using Signal Unmixing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rahimpour, Alireza; Qi, Hairong; Fugate, David L

    Heating, Ventilating and Air Conditioning units (HVAC) are a major electrical energy consumer in buildings. Monitoring of the operation and energy consumption of HVAC would increase the awareness of building owners and maintenance service providers of the condition and quality of performance of these units, enabling conditioned-based maintenance which would help achieving higher energy efficiency. In this paper, a novel non-intrusive load monitoring method based on group constrained non-negative matrix factorization is proposed for monitoring the different components of HVAC unit by only measuring the whole building aggregated power signal. At the first level of this hierarchical approach, power consumptionmore » of the building is decomposed to energy consumption of the HVAC unit and all the other electrical devices operating in the building such as lighting and plug loads. Then, the estimated power signal of the HVAC is used for estimating the power consumption profile of the HVAC major electrical loads such as compressors, condenser fans and indoor blower. Experiments conducted on real data collected from a building testbed maintained at the Oak Ridge National Laboratory (ORNL) demonstrate high accuracy on the disaggregation task.« less

  11. A Non-Intrusive GMA Welding Process Quality Monitoring System Using Acoustic Sensing.

    PubMed

    Cayo, Eber Huanca; Alfaro, Sadek Crisostomo Absi

    2009-01-01

    Most of the inspection methods used for detection and localization of welding disturbances are based on the evaluation of some direct measurements of welding parameters. This direct measurement requires an insertion of sensors during the welding process which could somehow alter the behavior of the metallic transference. An inspection method that evaluates the GMA welding process evolution using a non-intrusive process sensing would allow not only the identification of disturbances during welding runs and thus reduce inspection time, but would also reduce the interference on the process caused by the direct sensing. In this paper a nonintrusive method for weld disturbance detection and localization for weld quality evaluation is demonstrated. The system is based on the acoustic sensing of the welding electrical arc. During repetitive tests in welds without disturbances, the stability acoustic parameters were calculated and used as comparison references for the detection and location of disturbances during the weld runs.

  12. A Non-Intrusive GMA Welding Process Quality Monitoring System Using Acoustic Sensing

    PubMed Central

    Cayo, Eber Huanca; Alfaro, Sadek Crisostomo Absi

    2009-01-01

    Most of the inspection methods used for detection and localization of welding disturbances are based on the evaluation of some direct measurements of welding parameters. This direct measurement requires an insertion of sensors during the welding process which could somehow alter the behavior of the metallic transference. An inspection method that evaluates the GMA welding process evolution using a non-intrusive process sensing would allow not only the identification of disturbances during welding runs and thus reduce inspection time, but would also reduce the interference on the process caused by the direct sensing. In this paper a nonintrusive method for weld disturbance detection and localization for weld quality evaluation is demonstrated. The system is based on the acoustic sensing of the welding electrical arc. During repetitive tests in welds without disturbances, the stability acoustic parameters were calculated and used as comparison references for the detection and location of disturbances during the weld runs. PMID:22399990

  13. Replacing intrusive thoughts: investigating thought control in relation to OCD symptoms.

    PubMed

    Ólafsson, Ragnar P; Snorrason, Ívar; Bjarnason, Reynar K; Emmelkamp, Paul M G; Ólason, Daníel Þ; Kristjánsson, Árni

    2014-12-01

    Control of obsessive thoughts in Obsessive Compulsive Disorder (OCD) involves both avoidance and removal of undesirable intrusive thoughts. Thought suppression tasks tap both of these processes but experimental results have been inconsistent. Experimental tasks allowing more focused study of the processes involved in controlling intrusive thoughts may be needed. In two experiments, control over neutral, standardized intrusive and personal intrusive thoughts was investigated as participants attempted to replace them with neutral thoughts. Non-selected university students (Experiment 1: N = 61) and university students scoring high and low on self-report measure of OC symptoms (Experiment 2: N = 40) performed a computerized thought replacement task. In experiment 1 replacing personal intrusive thoughts took longer than replacing neutral thoughts. Self-reports showed that intrusive thoughts were rated more difficult to replace and were associated with greater thought reoccurrence during replacement, larger emotional reaction and more discomfort. These results were largely replicated in experiment 2. Furthermore, the high OC symptom group experienced greater overall difficulty controlling thoughts on the replacement task, experienced more reoccurrences of personal intrusive thoughts, larger emotional reactions and discomfort associated with them, and felt a greater urge to remove them. All participants were non-clinical university students, and older adults with OCD should be tested. The findings are in line with cognitive behavioural theories of OCD. They support the usefulness of thought replacement as a research paradigm to study thought control in OCD and possibly other psychological conditions characterized by repetitive thoughts. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. Non-intrusive acoustic measurement of flow velocity and temperature in a high subsonic Mach number jet

    NASA Astrophysics Data System (ADS)

    Otero, R., Jr.; Lowe, K. T.; Ng, W. F.

    2018-01-01

    In previous studies, sonic anemometry and thermometry have generally been used to measure low subsonic Mach flow conditions. Recently, a novel configuration was proposed and used to measure unheated jet velocities up to Mach 0.83 non-intrusively. The objective of this investigation is to test the novel configuration in higher temperature conditions and explore the effects of fluid temperature on mean velocity and temperature measurement accuracy. The current work presents non-intrusive acoustic measurements of single-stream jet conditions up to Mach 0.7 and total temperatures from 299 K to 700 K. Comparison of acoustically measured velocity and static temperature with probe data indicate root mean square (RMS) velocity errors of 2.6 m s-1 (1.1% of the maximum jet centerline velocity), 4.0 m s-1 (1.2%), and 8.5 m s-1 (2.4%), respectively, for 299, 589, and 700 K total temperature flows up to Mach 0.7. RMS static temperature errors of 7.5 K (2.5% of total temperature), 8.1 K (1.3%), and 23.3 K (3.3%) were observed for the same respective total temperature conditions. To the authors’ knowledge, this is the first time a non-intrusive acoustic technique has been used to simultaneously measure mean fluid velocity and static temperatures in high subsonic Mach numbers up to 0.7. Overall, the findings of this work support the use of acoustics for non-intrusive flow monitoring. The ability to measure mean flow conditions at high subsonic Mach numbers and temperatures makes this technique a viable candidate for gas turbine applications, in particular.

  15. Non-intrusive Shock Measurements Using Laser Doppler Vibrometers

    NASA Technical Reports Server (NTRS)

    Statham, Shannon M.; Kolaini, Ali R.

    2012-01-01

    Stud mount accelerometers are widely used by the aerospace industry to measure shock environments during hardware qualification. The commonly used contact-based sensors, however, interfere with the shock waves and distort the acquired signature, which is a concern not actively discussed in the community. To alleviate these interference issues, engineers at the Jet Propulsion Laboratory are investigating the use of non-intrusive sensors, specifically Laser Doppler Vibrometers, as alternatives to the stud mounted accelerometers. This paper will describe shock simulation tests completed at the Jet Propulsion Laboratory, compare the measurements from stud mounted accelerometers and Laser Doppler Vibrometers, and discuss the advantages and disadvantages of introducing Laser Doppler Vibrometers as alternative sensors for measuring shock environments.

  16. Non-intrusive practitioner pupil detection for unmodified microscope oculars.

    PubMed

    Fuhl, Wolfgang; Santini, Thiago; Reichert, Carsten; Claus, Daniel; Herkommer, Alois; Bahmani, Hamed; Rifai, Katharina; Wahl, Siegfried; Kasneci, Enkelejda

    2016-12-01

    Modern microsurgery is a long and complex task requiring the surgeon to handle multiple microscope controls while performing the surgery. Eye tracking provides an additional means of interaction for the surgeon that could be used to alleviate this situation, diminishing surgeon fatigue and surgery time, thus decreasing risks of infection and human error. In this paper, we introduce a novel algorithm for pupil detection tailored for eye images acquired through an unmodified microscope ocular. The proposed approach, the Hough transform, and six state-of-the-art pupil detection algorithms were evaluated on over 4000 hand-labeled images acquired from a digital operating microscope with a non-intrusive monitoring system for the surgeon eyes integrated. Our results show that the proposed method reaches detection rates up to 71% for an error of ≈3% w.r.t the input image diagonal; none of the state-of-the-art pupil detection algorithms performed satisfactorily. The algorithm and hand-labeled data set can be downloaded at:: www.ti.uni-tuebingen.de/perception. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Non-intrusive speed sensor. [space shuttle main engine turbopumps

    NASA Technical Reports Server (NTRS)

    Maram, J.; Wyett, L.

    1984-01-01

    A computerized literature search was performed to identify candidate technologies for remote, non-intrusive speed sensing applications in Space Shuttle Main Engine (SSME) turbopumps. The three most promising technologies were subjected to experimental evaluation to quantify their performance characteristics under the harsh environmental requirements within the turbopumps. Although the infrared and microwave approaches demonstrated excellent cavitation immunity in laboratory tests, the variable-source magnetic speed sensor emerged as the most viable approach. Preliminary design of this speed sensor encountered no technical obstacles and resulted in viable and feasible speed nut, sensor housing, and sensor coil designs.

  18. Characterization and calibration of seawater intrusion models using electrical resistivity tomography (Invited)

    NASA Astrophysics Data System (ADS)

    Nguyen, F. H.; Kemna, A.; Antonsson, A.; Engesgaard, P. K.; Beaujean, J.

    2009-12-01

    The urban development of coastal regions create seawater intrusion (SWI) problems which threatens groundwater quality and coastal ecosystems. To study SWI, one needs both robust measuring technologies, and reliable predictions. A key aspect in the calibration of SWI models involves reproducing measured groundwater chloride concentrations. Drilling such multi-screen wells to obtain a whole concentration profile is a risky task if reliable information about the position of the salt wedge is not available. Electrical resistivity tomography (ERT) is increasingly being used to characterize seawater intrusion and constrain corresponding models, given its high sensitivity to ion concentration in groundwater and its relatively high spatial resolution. We have investigated the potential of ERT using field data from a site in Almeria, SE Spain and synthetic data. Simulations have been run for several scenarios, with a simple hydrogeological model reflecting the local site conditions. The simulations showed that only the lower salt concentrations of the seawater-freshwater transition zone could be recovered, due to the loss of resolution with depth. We quantified this capability in terms of image appraisal indicators (cumulative sensitivity) associated with the measurement setup and showed that the mismatch between the targeted and imaged parameter values occurs from a certain threshold. Similarly, heterogeneity may only be determined accurately if located in an adequately sensitive area. Inversion of the synthetic data was performed by coupling an inversion code (PEST) with a finite-difference density-dependent flow and transport modeling code (HTS). The numerical results demonstrate the capacity of sensitivity-filtered ERT images to constrain transverse hydraulic dispersivity and longitudinal hydraulic conductivity of homogeneous seawater intrusion models. At the field site, we identified SWI at the scale of a few kilometers down to a hundred meters. Borehole logs show a

  19. Non-intrusive flow measurements on a reentry vehicle

    NASA Technical Reports Server (NTRS)

    Miles, R. B.; Satavicca, D. A.; Zimmermann, G. M.

    1983-01-01

    This study evaluates the utility of various non-intrusive techniques for the measurement of the flow field on the windward side of the Space Shuttle or a similar re-entry vehicle. Included are linear (Rayleigh, Raman, Mie, Laser Doppler Velocimetry, Resonant Doppler Velocimetry) and nonlinear (Coherent Anti-Stokes Raman, Laser Induced Fluorescence) light scattering, electron beam fluorescence, thermal emission and mass spectroscopy. Flow field properties are taken from a nonequilibrium flow model by Shinn, Moss and Simmonds at NASA Langley. Conclusions are, when possible, based on quantitative scaling of known laboratory results to the conditions projected. Detailed discussion with researchers in the field contributed further to these conclusions and provided valuable insights regarding the experimental feasibility of each of the techniques.

  20. Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system

    NASA Astrophysics Data System (ADS)

    Hu, Haibin

    2017-05-01

    Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.

  1. Department of Defense counterdrug technology development of non-intrusive inspection systems

    NASA Astrophysics Data System (ADS)

    Pennella, John J.

    1997-02-01

    The Naval Surface Warfare Center Dahlgren Division serves as the executive agent for the DoD's Contraband Detection and Cargo Container Inspection Technology Development Program. The goal of the DoD non-intrusive inspection (NII) program is to develop prototype equipment that can be used to inspect containers and vehicles, quickly and in large numbers without unnecessary delays in the movement of legitimate cargo. This paper summaries the past accomplishments of the program, current status, and future plans.

  2. Mellin Transform-Based Correction Method for Linear Scale Inconsistency of Intrusion Events Identification in OFPS

    NASA Astrophysics Data System (ADS)

    Wang, Baocheng; Qu, Dandan; Tian, Qing; Pang, Liping

    2018-05-01

    For the problem that the linear scale of intrusion signals in the optical fiber pre-warning system (OFPS) is inconsistent, this paper presents a method to correct the scale. Firstly, the intrusion signals are intercepted, and an aggregate of the segments with equal length is obtained. Then, the Mellin transform (MT) is applied to convert them into the same scale. The spectral characteristics are obtained by the Fourier transform. Finally, we adopt back-propagation (BP) neural network to identify intrusion types, which takes the spectral characteristics as input. We carried out the field experiments and collected the optical fiber intrusion signals which contain the picking signal, shoveling signal, and running signal. The experimental results show that the proposed algorithm can effectively improve the recognition accuracy of the intrusion signals.

  3. Tree Sampling as a Method to Assess Vapor Intrusion Potential at a Site Characterized by VOC-Contaminated Groundwater and Soil.

    PubMed

    Wilson, Jordan L; Limmer, Matthew A; Samaranayake, V A; Schumacher, John G; Burken, Joel G

    2017-09-19

    Vapor intrusion (VI) by volatile organic compounds (VOCs) in the built environment presents a threat to human health. Traditional VI assessments are often time-, cost-, and labor-intensive; whereas traditional subsurface methods sample a relatively small volume in the subsurface and are difficult to collect within and near structures. Trees could provide a similar subsurface sample where roots act as the "sampler' and are already onsite. Regression models were developed to assess the relation between PCE concentrations in over 500 tree-core samples with PCE concentrations in over 50 groundwater and 1000 soil samples collected from a tetrachloroethylene- (PCE-) contaminated Superfund site and analyzed using gas chromatography. Results indicate that in planta concentrations are significantly and positively related to PCE concentrations in groundwater samples collected at depths less than 20 m (adjusted R 2 values greater than 0.80) and in soil samples (adjusted R 2 values greater than 0.90). Results indicate that a 30 cm diameter tree characterizes soil concentrations at depths less than 6 m over an area of 700-1600 m 2 , the volume of a typical basement. These findings indicate that tree sampling may be an appropriate method to detect contamination at shallow depths at sites with VI.

  4. Tree sampling as a method to assess vapor intrusion potential at a site characterized by VOC-contaminated groundwater and soil

    USGS Publications Warehouse

    Wilson, Jordan L.; Limmer, Matthew A.; Samaranayake, V. A.; Schumacher, John G.; Burken, Joel G.

    2017-01-01

    Vapor intrusion (VI) by volatile organic compounds (VOCs) in the built environment presents a threat to human health. Traditional VI assessments are often time-, cost-, and labor-intensive; whereas traditional subsurface methods sample a relatively small volume in the subsurface and are difficult to collect within and near structures. Trees could provide a similar subsurface sample where roots act as the “sampler’ and are already onsite. Regression models were developed to assess the relation between PCE concentrations in over 500 tree-core samples with PCE concentrations in over 50 groundwater and 1000 soil samples collected from a tetrachloroethylene- (PCE-) contaminated Superfund site and analyzed using gas chromatography. Results indicate that in planta concentrations are significantly and positively related to PCE concentrations in groundwater samples collected at depths less than 20 m (adjusted R2 values greater than 0.80) and in soil samples (adjusted R2 values greater than 0.90). Results indicate that a 30 cm diameter tree characterizes soil concentrations at depths less than 6 m over an area of 700–1600 m2, the volume of a typical basement. These findings indicate that tree sampling may be an appropriate method to detect contamination at shallow depths at sites with VI.

  5. Non-intrusive optical study of gas and its exchange in human maxillary sinuses

    NASA Astrophysics Data System (ADS)

    Persson, L.; Andersson, M.; Svensson, T.; Cassel-Engquist, M.; Svanberg, K.; Svanberg, S.

    2007-07-01

    We demonstrate a novel non-intrusive technique based on tunable diode laser absorption spectroscopy to investigate human maxillary sinuses in vivo. The technique relies on the fact that free gases have much sharper absorption features (typical a few GHz) than the surrounding tissue. Molecular oxygen was detected at 760 nm. Volunteers have been investigated by injecting near-infrared light fibre-optically in contact with the palate inside the mouth. The multiply scattered light was detected externally by a handheld probe on and around the cheek bone. A significant signal difference in oxygen imprint was observed when comparing volunteers with widely different anamnesis regarding maxillary sinus status. Control measurements through the hand and through the cheek below the cheekbone were also performed to investigate any possible oxygen offset in the setup. These provided a consistently non-detectable signal level. The passages between the nasal cavity and the maxillary sinuses were also non-intrusively optically studied, to the best of our knowledge for the first time. These measurements provide information on the channel conductivity which may prove useful in facial sinus diagnostics. The results suggest that a clinical trial together with an ear-nose-throat (ENT) clinic should be carried out to investigate the clinical use of the new technique.

  6. TTP AL921102: An integrated geophysics program for non-intrusive characterization of mixed-waste landfill sites. FY 1992 year-end progress report: Volume 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hasbrouck, J.C.

    1992-11-01

    Chem-Nuclear Geotech, Inc. (Geotech), operating contractor for the US Department of Energy Grand Junction Projects Office, is conducting the Integrated Geophysics Program for Non-Intrusive Characterization of Mixed-Waste Landfill Sites (Technical Task Plan [TTP] AL921102). The TTP is part of the Mixed-Waste Landfill Integrated Demonstration (MWLID). The objective of this task was to demonstrate that an integrated program of surface geophysics can be used to effectively and nonintrusively characterize n-mixed-waste landfill sites. To accomplish this objective, integrated field demonstrations were conducted over two previously identified areas of interest (designated Areas A and B) within the MWLID test site at the Chemicalmore » Waste Landfill (CWL), Technical Area 3, at the Sandia National Laboratories, Albuquerque, New Mexico (Figures 1 and 2). Area A was centered roughly around the Chromic Acid and Organics Pits in the southeast-central portion of the landfill and Area B was centered around the ``60`s Pits`` area in the northeast-central portion of the landfill. Pit locations were known in Area A and suspected in Area B. This progress report describes the geophysical surveys conducted by Geotech and presents preliminary displays and analyses. Volume 2 of this report contains the raw data for all the surveys conducted by Geotech for this TTP.« less

  7. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application

    DOEpatents

    Piper, T.C.

    1980-09-24

    An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  8. Non-Intrusive Techniques of Inspections During the Pre-Launch Phase of Space Vehicle

    NASA Technical Reports Server (NTRS)

    Thirumalainambi, Rejkumar; Bardina, Jorge E.

    2005-01-01

    This paper addresses a method of non-intrusive local inspection of surface and sub-surface conditions, interfaces, laminations and seals in both space vehicle and ground operations with an integrated suite of imaging sensors during pre-launch operations. It employs an advanced Raman spectrophotometer with additional spectrophotometers and lidar mounted on a flying robot to constantly monitor the space hardware as well as inner surface of the vehicle and ground operations hardware. This paper addresses a team of micro flying robots with necessary sensors and photometers to monitor the entire space vehicle internally and externally. The micro flying robots can reach altitude with least amount of energy, where astronauts have difficulty in reaching and monitoring the materials and subsurface faults. The micro flying robot has an embedded fault detection system which acts as an advisory system and in many cases micro flying robots act as a Supervisor to fix the problems. As missions expand to a sustainable presence in the Moon, and extend for durations longer than one year in lunar outpost, the effectiveness of the instrumentation and hardware has to be revolutionized if NASA is to meet high levels of mission safety, reliability, and overall success. The micro flying robot uses contra-rotating propellers powered by an ultra-thin, ultrasonic motor with currently the world's highest power weight ratio, and is balanced in mid-air by means of the world's first stabilizing mechanism using a linear actuator. The essence of micromechatronics has been brought together in high-density mounting technology to minimize the size and weight. The robot can take suitable payloads of photometers, embedded chips for image analysis and micro pumps for sealing cracks or fixing other material problems. This paper also highlights advantages that this type of non-intrusive techniques offer over costly and monolithic traditional techniques.

  9. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    PubMed

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  10. Attenuating fearful memories: effect of cued extinction on intrusions.

    PubMed

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  11. Orthodontic intrusion of maxillary incisors: a 3D finite element method study

    PubMed Central

    Saga, Armando Yukio; Maruo, Hiroshi; Argenta, Marco André; Maruo, Ivan Toshio; Tanaka, Orlando Motohiro

    2016-01-01

    Objective: In orthodontic treatment, intrusion movement of maxillary incisors is often necessary. Therefore, the objective of this investigation is to evaluate the initial distribution patterns and magnitude of compressive stress in the periodontal ligament (PDL) in a simulation of orthodontic intrusion of maxillary incisors, considering the points of force application. Methods: Anatomic 3D models reconstructed from cone-beam computed tomography scans were used to simulate maxillary incisors intrusion loading. The points of force application selected were: centered between central incisors brackets (LOAD 1); bilaterally between the brackets of central and lateral incisors (LOAD 2); bilaterally distal to the brackets of lateral incisors (LOAD 3); bilaterally 7 mm distal to the center of brackets of lateral incisors (LOAD 4). Results and Conclusions: Stress concentrated at the PDL apex region, irrespective of the point of orthodontic force application. The four load models showed distinct contour plots and compressive stress values over the midsagittal reference line. The contour plots of central and lateral incisors were not similar in the same load model. LOAD 3 resulted in more balanced compressive stress distribution. PMID:27007765

  12. Petrological evidence for non-linear increase of magmatic intrusion rates before eruption at open vent mafic volcanoe

    NASA Astrophysics Data System (ADS)

    Ruth, D. C. S.; Costa Rodriguez, F.

    2015-12-01

    The most active volcanoes on earth erupt in a yearly to decadal time scales, typically erupt mafic magmas and are open-vent systems with prominent degassing plumes (e.g. Mayon, Arenal, Llaima, Etna). Here we investigate the plumbing systems, dynamics, and processes that drive eruptions at these systems. These are key questions for improving hazard evaluation, and better understanding the unrest associated with these types of volcanoes. The petrology and geochemistry from six historical eruptions (1947-2006) of Mayon volcano (Philippines) shows that all lavas are basaltic andesite with phenocrysts of plagioclase + orthopyroxene (Opx) + clinopyroxene. Opx crystals show a variety of compositions and zoning patterns (reverse, normal or complex) with Mg# (= 100 *Mg/[Mg+Fe]) varying from 67 to 81. The simplest interpretation is that the low Mg# parts of the crystals resided on an upper crustal and crystal rich reservoir that was intruded by more primitive magmas from which the high Mg# parts of the crystals grew. Modelling Mg-Fe diffusion in Opx shows that times since magma injection and eruption range from a few days up to 3.5 years in all of the investigated eruptions. The longest diffusion times are shorter than the repose times between the eruptions, which implies that crystal recycling between eruptive events is negligible. This is a surprising result that shows that for each eruption a different part of the evolved crystal-rich plumbing system is activated. This can be due to random intrusion location or an irreversibility of the plumbing system that prevents multiple eruptions from the same crystal-rich part. Moreover, we find that the number of intrusions markedly increases before each eruption in a non-linear manner. Such an increased rate of intrusions with time might reflect non-linear rheological properties of the crystal-rich system, of the enclosing rocks, or the non-linear evolution of crystal-melt reaction-dissolution fronts during magma intrusions.

  13. Nuclear resonance fluorescence imaging in non-intrusive cargo inspection

    NASA Astrophysics Data System (ADS)

    Bertozzi, William; Ledoux, Robert J.

    2005-12-01

    Nuclear resonance fluorescence is able to non-intrusively interrogate a region space and measure the isotopic content of the material in that space for any element with atomic number greater than that of helium. The technique involves exposing material to a continuous energy distribution of photons and detecting the scattered photons that have a discrete energy distribution unique to an isotope. The interrogating photons, which range from 2 to 8 MeV, are the most penetrating probes and can "see" through many inches of steel. Determination of the chemical components of the material occupying a region of space greatly enhances the identification of threats such as explosives, fissile materials, toxic materials and weapons of mass destruction. Systems can be designed to involve minimal operator intervention, to minimize dose to the sample, and to provide high throughput at commercial seaports, airports and other entry points.

  14. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  15. A Non-Intrusive Pressure Sensor by Detecting Multiple Longitudinal Waves

    PubMed Central

    Zhou, Hongliang; Lin, Weibin; Ge, Xiaocheng; Zhou, Jian

    2016-01-01

    Pressure vessels are widely used in industrial fields, and some of them are safety-critical components in the system—for example, those which contain flammable or explosive material. Therefore, the pressure of these vessels becomes one of the critical measurements for operational management. In the paper, we introduce a new approach to the design of non-intrusive pressure sensors, based on ultrasonic waves. The model of this sensor is built based upon the travel-time change of the critically refracted longitudinal wave (LCR wave) and the reflected longitudinal waves with the pressure. To evaluate the model, experiments are carried out to compare the proposed model with other existing models. The results show that the proposed model can improve the accuracy compared to models based on a single wave. PMID:27527183

  16. Visual behavior characterization for intrusion and misuse detection

    NASA Astrophysics Data System (ADS)

    Erbacher, Robert F.; Frincke, Deborah

    2001-05-01

    As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.

  17. Characterizing and Improving Distributed Intrusion Detection Systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizingmore » and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.« less

  18. Beta-blockers May Reduce Intrusive Thoughts in Newly Diagnosed Cancer Patients

    PubMed Central

    Lindgren, Monica E.; Fagundes, Christopher P.; Alfano, Catherine M.; Povoski, Stephen P.; Agnese, Doreen M.; Arnold, Mark W.; Farrar, William B.; Yee, Lisa D.; Carson, William E.; Schmidt, Carl R.; Kiecolt-Glaser, Janice K.

    2012-01-01

    Objective A cancer diagnosis provokes significant levels of emotional distress, with intrusive thoughts being the most common manifestation among breast cancer survivors. Cancer-related intrusive thoughts can take the form of emotional memories, flashbacks, nightmares, and intrusive images. Emotional arousal after a severe life stressor prolongs adrenergic activation, which in turn may increase risk for posttraumatic symptomatology. However, antihypertensive beta-blockers block adrenergic activation and are known to reduce traumatic memories and related psychological distress. Thus, the current study examined the association between beta-blocker use and the severity of cancer-related intrusive thoughts and related symptoms following a cancer diagnosis. Methods The 174 breast and 36 female colorectal cancer patients who had recently undergone diagnostic screening or biopsy included 39 beta-blocker users and 171 non-users. Prior to any cancer treatment including surgery, participants completed questionnaires that included the Impact of Events Scale (IES) and the Center for Epidemiological Studies Depression Scale (CES-D). Analyses controlled for age, education, cancer stage, cancer type, days since diagnosis, marital status, depression, and comorbidities. Results Although the high rates of cancer-related distress in this sample were similar to those of other studies with recently diagnosed patients, beta-blocker users endorsed 32% fewer cancer-related intrusive thoughts than non-users. Conclusions Recently diagnosed cancer patients using beta-blockers reported less cancer-related psychological distress. These results suggest that beta-blocker use may benefit cancer patients’ psychological adjustment following diagnosis, and provide a promising direction for future investigations on the pharmacological benefits of beta-blockers for cancer-related distress. PMID:23255459

  19. Multifidelity, Multidisciplinary Design Under Uncertainty with Non-Intrusive Polynomial Chaos

    NASA Technical Reports Server (NTRS)

    West, Thomas K., IV; Gumbert, Clyde

    2017-01-01

    The primary objective of this work is to develop an approach for multifidelity uncertainty quantification and to lay the framework for future design under uncertainty efforts. In this study, multifidelity is used to describe both the fidelity of the modeling of the physical systems, as well as the difference in the uncertainty in each of the models. For computational efficiency, a multifidelity surrogate modeling approach based on non-intrusive polynomial chaos using the point-collocation technique is developed for the treatment of both multifidelity modeling and multifidelity uncertainty modeling. Two stochastic model problems are used to demonstrate the developed methodologies: a transonic airfoil model and multidisciplinary aircraft analysis model. The results of both showed the multifidelity modeling approach was able to predict the output uncertainty predicted by the high-fidelity model as a significant reduction in computational cost.

  20. Non-intrusive high voltage measurement using slab coupled optical sensors

    NASA Astrophysics Data System (ADS)

    Stan, Nikola; Chadderdon, Spencer; Selfridge, Richard H.; Schultz, Stephen M.

    2014-03-01

    We present an optical fiber non-intrusive sensor for measuring high voltage transients. The sensor converts the unknown voltage to electric field, which is then measured using slab-coupled optical fiber sensor (SCOS). Since everything in the sensor except the electrodes is made of dielectric materials and due to the small field sensor size, the sensor is minimally perturbing to the measured voltage. We present the details of the sensor design, which eliminates arcing and minimizes local dielectric breakdown using Teflon blocks and insulation of the whole structure with transformer oil. The structure has a capacitance of less than 3pF and resistance greater than 10 GΩ. We show the measurement of 66.5 kV pulse with a 32.6μs time constant. The measurement matches the expected value of 67.8 kV with less than 2% error.

  1. multiUQ: An intrusive uncertainty quantification tool for gas-liquid multiphase flows

    NASA Astrophysics Data System (ADS)

    Turnquist, Brian; Owkes, Mark

    2017-11-01

    Uncertainty quantification (UQ) can improve our understanding of the sensitivity of gas-liquid multiphase flows to variability about inflow conditions and fluid properties, creating a valuable tool for engineers. While non-intrusive UQ methods (e.g., Monte Carlo) are simple and robust, the cost associated with these techniques can render them unrealistic. In contrast, intrusive UQ techniques modify the governing equations by replacing deterministic variables with stochastic variables, adding complexity, but making UQ cost effective. Our numerical framework, called multiUQ, introduces an intrusive UQ approach for gas-liquid flows, leveraging a polynomial chaos expansion of the stochastic variables: density, momentum, pressure, viscosity, and surface tension. The gas-liquid interface is captured using a conservative level set approach, including a modified reinitialization equation which is robust and quadrature free. A least-squares method is leveraged to compute the stochastic interface normal and curvature needed in the continuum surface force method for surface tension. The solver is tested by applying uncertainty to one or two variables and verifying results against the Monte Carlo approach. NSF Grant #1511325.

  2. Transient Torque Method: A Fast and Non-Intrusive Technique to Simultaneously Determine Viscosity and Electrical Conductivity of Semiconducting and Metallic Melts

    NASA Technical Reports Server (NTRS)

    Li, C.; Ban, H.; Lin, B.; Scripa, R. N.; Su, C.; Lehoczky, S. L.; Zhu, S.

    2003-01-01

    A transient torque method was developed to rapidly and simultaneously determine the viscosity and electrical conductivity of semiconducting or metallic melts. The experimental setup is similar to that for the oscillation cup technique. The melt sample is sealed inside a fused silica ampoule, and the ampoule is suspended by a long quartz fiber to form a torsional oscillation system. A rotating magnetic field is used to induce a rotating flow in the conductive melt, which causes the ampoule to rotate along its axis. A sensitive angular detector is used to measure the deflection angle of the ampoule. Based on the transient behavior of the deflection angle as the rotating magnetic field is applied, the electrical conductivity and viscosity of the melt can be obtained simultaneously by numerically fitting the data to a set of governing equations. The transient torque viscometer was applied successfully to measure the viscosity and electrical conductivity of high purity mercury at 53.4 C. The results were in excellent agreement with the published data. The main advantage of the technique is that the measurement can be completed in one or two minutes, as opposed to the one or two-hour measurement time required by the oscillation cup technique. The method is non-intrusive; capable of rapid measurement of the viscosity of toxic, high vapor pressure melts at elevated temperatures. In addition, the transient torque viscometer can also be operated as an oscillation cup viscometer if desired.

  3. Non-Intrusive Magneto-Optic Detecting System for Investigations of Air Switching Arcs

    NASA Astrophysics Data System (ADS)

    Zhang, Pengfei; Zhang, Guogang; Dong, Jinlong; Liu, Wanying; Geng, Yingsan

    2014-07-01

    In current investigations of electric arc plasmas, experiments based on modern testing technology play an important role. To enrich the testing methods and contribute to the understanding and grasping of the inherent mechanism of air switching arcs, in this paper, a non-intrusive detecting system is described that combines the magneto-optic imaging (MOI) technique with the solution to inverse electromagnetic problems. The detecting system works in a sequence of main steps as follows: MOI of the variation of the arc flux density over a plane, magnetic field information extracted from the magneto-optic (MO) images, arc current density distribution and spatial pattern reconstruction by inverting the resulting field data. Correspondingly, in the system, an MOI set-up is designed based on the Faraday effect and the polarization properties of light, and an intelligent inversion algorithm is proposed that involves simulated annealing (SA). Experiments were carried out for high current (2 kA RMS) discharge cases in a typical low-voltage switchgear. The results show that the MO detection system possesses the advantages of visualization, high resolution and response, and electrical insulation, which provides a novel diagnostics tool for further studies of the arc.

  4. Intrusion-based reasoning and depression: cross-sectional and prospective relationships.

    PubMed

    Berle, David; Moulds, Michelle L

    2014-01-01

    Intrusion-based reasoning refers to the tendency to form interpretations about oneself or a situation based on the occurrence of a negative intrusive autobiographical memory. Intrusion-based reasoning characterises post-traumatic stress disorder, but has not yet been investigated in depression. We report two studies that aimed to investigate this. In Study 1 both high (n = 42) and low (n = 28) dysphoric participants demonstrated intrusion-based reasoning. High-dysphoric individuals engaged in self-referent intrusion-based reasoning to a greater extent than did low-dysphoric participants. In Study 2 there were no significant differences in intrusion-based reasoning between currently depressed (n = 27) and non-depressed (n = 51) participants, and intrusion-based reasoning did not predict depressive symptoms at 6-month follow-up. Interestingly, previously (n = 26) but not currently (n = 27) depressed participants engaged in intrusion-based reasoning to a greater extent than never-depressed participants (n = 25), indicating the possibility that intrusion-based reasoning may serve as a "scar" from previous episodes. The implications of these findings are discussed.

  5. Non-intrusive telemetry applications in the oilsands: from visible light and x-ray video to acoustic imaging and spectroscopy

    NASA Astrophysics Data System (ADS)

    Shaw, John M.

    2013-06-01

    While the production, transport and refining of oils from the oilsands of Alberta, and comparable resources elsewhere is performed at industrial scales, numerous technical and technological challenges and opportunities persist due to the ill defined nature of the resource. For example, bitumen and heavy oil comprise multiple bulk phases, self-organizing constituents at the microscale (liquid crystals) and the nano scale. There are no quantitative measures available at the molecular level. Non-intrusive telemetry is providing promising paths toward solutions, be they enabling technologies targeting process design, development or optimization, or more prosaic process control or process monitoring applications. Operation examples include automated large object and poor quality ore during mining, and monitoring the thickness and location of oil water interfacial zones within separation vessels. These applications involve real-time video image processing. X-ray transmission video imaging is used to enumerate organic phases present within a vessel, and to detect individual phase volumes, densities and elemental compositions. This is an enabling technology that provides phase equilibrium and phase composition data for production and refining process development, and fluid property myth debunking. A high-resolution two-dimensional acoustic mapping technique now at the proof of concept stage is expected to provide simultaneous fluid flow and fluid composition data within porous inorganic media. Again this is an enabling technology targeting visualization of diverse oil production process fundamentals at the pore scale. Far infrared spectroscopy coupled with detailed quantum mechanical calculations, may provide characteristic molecular motifs and intermolecular association data required for fluid characterization and process modeling. X-ray scattering (SAXS/WAXS/USAXS) provides characteristic supramolecular structure information that impacts fluid rheology and process

  6. Investigation of non-premixed flame combustion characters in GO2/GH2 shear coaxial injectors using non-intrusive optical diagnostics

    NASA Astrophysics Data System (ADS)

    Dai, Jian; Yu, NanJia; Cai, GuoBiao

    2015-12-01

    Single-element combustor experiments are conducted for three shear coaxial geometry configuration injectors by using gaseous oxygen and gaseous hydrogen (GO2/GH2) as propellants. During the combustion process, several spatially and timeresolved non-intrusive optical techniques, such as OH planar laser induced fluorescence (PLIF), high speed imaging, and infrared imaging, are simultaneously employed to observe the OH radical concentration distribution, flame fluctuations, and temperature fields. The results demonstrate that the turbulent flow phenomenon of non-premixed flame exhibits a remarkable periodicity, and the mixing ratio becomes a crucial factor to influence the combustion flame length. The high speed and infrared images have a consistent temperature field trend. As for the OH-PLIF images, an intuitionistic local flame structure is revealed by single-shot instantaneous images. Furthermore, the means and standard deviations of OH radical intensity are acquired to provide statistical information regarding the flame, which may be helpful for validation of numerical simulations in future. Parameters of structure configurations, such as impinging angle and oxygen post thickness, play an important role in the reaction zone distribution. Based on a successful flame contour extraction method assembled with non-linear anisotropic diffusive filtering and variational level-set, it is possible to implement a fractal analysis to describe the fractal characteristics of the non-premixed flame contour. As a result, the flame front cannot be regarded as a fractal object. However, this turbulent process presents a self-similarity characteristic.

  7. Intrusion errors in visuospatial working memory performance.

    PubMed

    Cornoldi, Cesare; Mammarella, Nicola

    2006-02-01

    This study tested the hypothesis that failure in active visuospatial working memory tasks involves a difficulty in avoiding intrusions due to information that is already activated. Two experiments are described, in which participants were required to process several series of locations on a 4 x 4 matrix and then to produce only the final location of each series. Results revealed a higher number of errors due to already activated locations (intrusions) compared with errors due to new locations (inventions). Moreover, when participants were required to pay extra attention to some irrelevant (non-final) locations by tapping on the table, intrusion errors increased. Results are discussed in terms of current models of working memory functioning.

  8. Mandibular canine intrusion with the segmented arch technique: A finite element method study.

    PubMed

    Caballero, Giselle Milagros; Carvalho Filho, Osvaldo Abadia de; Hargreaves, Bernardo Oliveira; Brito, Hélio Henrique de Araújo; Magalhães Júnior, Pedro Américo Almeida; Oliveira, Dauro Douglas

    2015-06-01

    Mandibular canines are anatomically extruded in approximately half of the patients with a deepbite. Although simultaneous orthodontic intrusion of the 6 mandibular anterior teeth is not recommended, a few studies have evaluated individual canine intrusion. Our objectives were to use the finite element method to simulate the segmented intrusion of mandibular canines with a cantilever and to evaluate the effects of different compensatory buccolingual activations. A finite element study of the right quadrant of the mandibular dental arch together with periodontal structures was modeled using SolidWorks software (Dassault Systèmes Americas, Waltham, Mass). After all bony, dental, and periodontal ligament structures from the second molar to the canine were graphically represented, brackets and molar tubes were modeled. Subsequently, a 0.021 × 0.025-in base wire was modeled with stainless steel properties and inserted into the brackets and tubes of the 4 posterior teeth to simulate an anchorage unit. Finally, a 0.017 × 0.025-in cantilever was modeled with titanium-molybdenum alloy properties and inserted into the first molar auxiliary tube. Discretization and boundary conditions of all anatomic structures tested were determined with HyperMesh software (Altair Engineering, Milwaukee, Wis), and compensatory toe-ins of 0°, 4°, 6°, and 8° were simulated with Abaqus software (Dassault Systèmes Americas). The 6° toe-in produced pure intrusion of the canine. The highest amounts of periodontal ligament stress in the anchor segment were observed around the first molar roots. This tooth showed a slight tendency for extrusion and distal crown tipping. Moreover, the different compensatory toe-ins tested did not significantly affect the other posterior teeth. The segmented mechanics simulated in this study may achieve pure mandibular canine intrusion when an adequate amount of compensatory toe-in (6°) is incorporated into the cantilever to prevent buccal and lingual crown

  9. Characterization of pore structure in cement-based materials using pressurization-depressurization cycling mercury intrusion porosimetry (PDC-MIP)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhou Jian, E-mail: Jian.Zhou@tudelft.n; Ye Guang, E-mail: g.ye@tudelft.n; Magnel Laboratory for Concrete Research, Department of Structural Engineering, Ghent University, Technologiepark-Zwijnaarde 904 B-9052, Ghent

    2010-07-15

    Numerous mercury intrusion porosimetry (MIP) studies have been carried out to investigate the pore structure in cement-based materials. However, the standard MIP often results in an underestimation of large pores and an overestimation of small pores because of its intrinsic limitation. In this paper, an innovative MIP method is developed in order to provide a more accurate estimation of pore size distribution. The new MIP measurements are conducted following a unique mercury intrusion procedure, in which the applied pressure is increased from the minimum to the maximum by repeating pressurization-depressurization cycles instead of a continuous pressurization followed by a continuousmore » depressurization. Accordingly, this method is called pressurization-depressurization cycling MIP (PDC-MIP). By following the PDC-MIP testing sequence, the volumes of the throat pores and the corresponding ink-bottle pores can be determined at every pore size. These values are used to calculate pore size distribution by using the newly developed analysis method. This paper presents an application of PDC-MIP on the investigation of the pore size distribution in cement-based materials. The experimental results of PDC-MIP are compared with those measured by standard MIP. The PDC-MIP is further validated with the other experimental methods and numerical tool, including nitrogen sorption, backscanning electron (BSE) image analysis, Wood's metal intrusion porosimetry (WMIP) and the numerical simulation by the cement hydration model HYMOSTRUC3D.« less

  10. New Non-Intrusive Inspection Technologies for Nuclear Security and Nonproliferation

    NASA Astrophysics Data System (ADS)

    Ledoux, Robert J.

    2015-10-01

    Comprehensive monitoring of the supply chain for nuclear materials has historically been hampered by non-intrusive inspection systems that have such large false alarm rates that they are impractical in the flow of commerce. Passport Systems, Inc. (Passport) has developed an active interrogation system which detects fissionable material, high Z material, and other contraband in land, sea and air cargo. Passport's design utilizes several detection modalities including high resolution imaging, passive radiation detection, effective-Z (EZ-3D™) anomaly detection, Prompt Neutrons from Photofission (PNPF), and Nuclear Resonance Fluorescence (NRF) isotopic identification. These technologies combine to: detect fissionable, high-Z, radioactive and contraband materials, differentiate fissionable materials from high-Z shielding materials, and isotopically identify actinides, Special Nuclear Materials (SNM), and other contraband (e.g. explosives, drugs, nerve agents). Passport's system generates a 3-D image of the scanned object which contains information such as effective-Z and density, as well as a 2-D image and isotopic and fissionable information for regions of interest.

  11. Forensic identification of resampling operators: A semi non-intrusive approach.

    PubMed

    Cao, Gang; Zhao, Yao; Ni, Rongrong

    2012-03-10

    Recently, several new resampling operators have been proposed and successfully invalidate the existing resampling detectors. However, the reliability of such anti-forensic techniques is unaware and needs to be investigated. In this paper, we focus on the forensic identification of digital image resampling operators including the traditional type and the anti-forensic type which hides the trace of traditional resampling. Various resampling algorithms involving geometric distortion (GD)-based, dual-path-based and postprocessing-based are investigated. The identification is achieved in the manner of semi non-intrusive, supposing the resampling software could be accessed. Given an input pattern of monotone signal, polarity aberration of GD-based resampled signal's first derivative is analyzed theoretically and measured by effective feature metric. Dual-path-based and postprocessing-based resampling can also be identified by feeding proper test patterns. Experimental results on various parameter settings demonstrate the effectiveness of the proposed approach. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  12. Non-Intrusive Measurement Techniques Applied to the Hybrid Solid Fuel Degradation

    NASA Astrophysics Data System (ADS)

    Cauty, F.

    2004-10-01

    The knowledge of the solid fuel regression rate and the time evolution of the grain geometry are requested for hybrid motor design and control of its operating conditions. Two non-intrusive techniques (NDT) have been applied to hybrid propulsion : both are based on wave propagation, the X-rays and the ultrasounds, through the materials. X-ray techniques allow local thickness measurements (attenuated signal level) using small probes or 2D images (Real Time Radiography), with a link between the size of field of view and accuracy. Beside the safety hazards associated with the high-intensity X-ray systems, the image analysis requires the use of quite complex post-processing techniques. The ultrasound technique is more widely used in energetic material applications, including hybrid fuels. Depending upon the transducer size and the associated equipment, the application domain is large, from tiny samples to the quad-port wagon wheel grain of the 1.1 MN thrust HPDP motor. The effect of the physical quantities has to be taken into account in the wave propagation analysis. With respect to the various applications, there is no unique and perfect experimental method to measure the fuel regression rate. The best solution could be obtained by combining two techniques at the same time, each technique enhancing the quality of the global data.

  13. Non-intrusive uncertainty quantification of computational fluid dynamics simulations: notes on the accuracy and efficiency

    NASA Astrophysics Data System (ADS)

    Zimoń, Małgorzata; Sawko, Robert; Emerson, David; Thompson, Christopher

    2017-11-01

    Uncertainty quantification (UQ) is increasingly becoming an indispensable tool for assessing the reliability of computational modelling. Efficient handling of stochastic inputs, such as boundary conditions, physical properties or geometry, increases the utility of model results significantly. We discuss the application of non-intrusive generalised polynomial chaos techniques in the context of fluid engineering simulations. Deterministic and Monte Carlo integration rules are applied to a set of problems, including ordinary differential equations and the computation of aerodynamic parameters subject to random perturbations. In particular, we analyse acoustic wave propagation in a heterogeneous medium to study the effects of mesh resolution, transients, number and variability of stochastic inputs. We consider variants of multi-level Monte Carlo and perform a novel comparison of the methods with respect to numerical and parametric errors, as well as computational cost. The results provide a comprehensive view of the necessary steps in UQ analysis and demonstrate some key features of stochastic fluid flow systems.

  14. Seismic signature of active intrusions in mountain chains.

    PubMed

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  15. Seismic signature of active intrusions in mountain chains

    PubMed Central

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains. PMID:29326978

  16. Escalation from normal appearance related intrusive cognitions to clinical preoccupations in Body Dysmorphic Disorder: A cross-sectional study.

    PubMed

    Giraldo-O'Meara, Martha; Belloch, Amparo

    2018-07-01

    Current cognitive approaches to Body Dysmorphic Disorder (BDD) assume that appearance-related intrusive cognitions and their functional consequences characterize the disorder, in a similar way that obsessive intrusive thoughts characterize the Obsessive-Compulsive Disorder (OCD). This study explores whether normal but unwanted appearance-related intrusive thoughts (AITs), escalate to clinical AITs when they are dysfunctionally appraised and instigate counterproductive neutralizing strategies. From a sample of 344 non-clinical individuals who reported a highly upsetting AIT during the past three months two subgroups were extracted according to their high (n = 68) and low (n = 276) vulnerability to BDD. The subjects in the high-risk group obtained significantly higher scores on the frequency of the most disturbing AIT and its emotional impact, interference, and appraisals evaluated with the Appearance Intrusions Questionnaire (AIQ). Additionally, two subgroups of 15 subjects each, with high and low risk to BDD, were formed and their scores were compared to 10 patients with BDD. The AIT had a greater emotional negative impact and more severe consequences on individuals with BDD compared to individuals at high-risk of BDD, which in turn, reported worse consequences of the AIT than those at low-risk. These results empirically support the similarities between BDD and OCD regarding their functional and phenomenological characteristics. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. Development and Application of a Three-Dimensional Finite Element Vapor Intrusion Model

    PubMed Central

    Pennell, Kelly G.; Bozkurt, Ozgur; Suuberg, Eric M.

    2010-01-01

    Details of a three-dimensional finite element model of soil vapor intrusion, including the overall modeling process and the stepwise approach, are provided. The model is a quantitative modeling tool that can help guide vapor intrusion characterization efforts. It solves the soil gas continuity equation coupled with the chemical transport equation, allowing for both advective and diffusive transport. Three-dimensional pressure, velocity, and chemical concentration fields are produced from the model. Results from simulations involving common site features, such as impervious surfaces, porous foundation sub-base material, and adjacent structures are summarized herein. The results suggest that site-specific features are important to consider when characterizing vapor intrusion risks. More importantly, the results suggest that soil gas or subslab gas samples taken without proper regard for particular site features may not be suitable for evaluating vapor intrusion risks; rather, careful attention needs to be given to the many factors that affect chemical transport into and around buildings. PMID:19418819

  18. Geophysical Evidence for Magma Intrusion across the Non-Transform Offset between the Famous and North Famous segments of The Mid-Atlantic Ridge

    NASA Astrophysics Data System (ADS)

    Giusti, M.; Dziak, R. P.; Maia, M.; Perrot, J.; Sukhovich, A.

    2017-12-01

    In August of 2010 an unusually large earthquake sequence of >700 events occurred at the Famous and North Famous segments (36.5-37°N) of the Mid-Atlantic Ridge (MAR), recorded by an array of five hydrophones moored on the MAR flanks. The swarm extended spatially >70 km across the two segments. The non-transform offset (NTO) separating the two segements, which is thought to act as strucutural barrier, did not appear to impede or block the earthquake's spatial distribution. Broadband acoustic energy (1-30 Hz) was also observed and accompanied the onset of the swarm, lasting >20 hours. A total of 18 earthquakes from the swarm were detected teleseismically, four had Centroid-Moment Tensor (CMT) solutions derived. The CMT solutions indicated three normal faulting events, and one non-double couple (explosion) event. The spatio-temporal distribution of the seismicity and broadband energy show evidence of two magma dike intrusions at the North Famous segment, with one intrusion crossing the NTO. This is the first evidence for an intrusion event detected on the MAR south of the Azores since the 2001 Lucky Strike intrusion. Gravimetric data were required to identify whether or not the Famous area is indeed comprised of two segments down to the level of the upper mantle. A high resolution gravity anomaly map of the two segments has been realized, based on a two-dimensional polygons model (Chapman, 1979) and will be compared to gravimetric data originated from SUDACORES experiment (1998, Atalante ship, IFREMER research team). Combined with the earthquake observations, this gravity anomaly map should provide a better understanding the geodynamic processes of this non-transform offset and of the deep magmatic system driving the August 2010 swarm.

  19. [INVITED] Non-intrusive optical imaging of face to probe physiological traits in Autism Spectrum Disorder

    NASA Astrophysics Data System (ADS)

    Samad, Manar D.; Bobzien, Jonna L.; Harrington, John W.; Iftekharuddin, Khan M.

    2016-03-01

    Autism Spectrum Disorders (ASD) can impair non-verbal communication including the variety and extent of facial expressions in social and interpersonal communication. These impairments may appear as differential traits in the physiology of facial muscles of an individual with ASD when compared to a typically developing individual. The differential traits in the facial expressions as shown by facial muscle-specific changes (also known as 'facial oddity' for subjects with ASD) may be measured visually. However, this mode of measurement may not discern the subtlety in facial oddity distinctive to ASD. Earlier studies have used intrusive electrophysiological sensors on the facial skin to gauge facial muscle actions from quantitative physiological data. This study demonstrates, for the first time in the literature, novel quantitative measures for facial oddity recognition using non-intrusive facial imaging sensors such as video and 3D optical cameras. An Institutional Review Board (IRB) approved that pilot study has been conducted on a group of individuals consisting of eight participants with ASD and eight typically developing participants in a control group to capture their facial images in response to visual stimuli. The proposed computational techniques and statistical analyses reveal higher mean of actions in the facial muscles of the ASD group versus the control group. The facial muscle-specific evaluation reveals intense yet asymmetric facial responses as facial oddity in participants with ASD. This finding about the facial oddity may objectively define measurable differential markers in the facial expressions of individuals with ASD.

  20. Characterization of computer network events through simultaneous feature selection and clustering of intrusion alerts

    NASA Astrophysics Data System (ADS)

    Chen, Siyue; Leung, Henry; Dondo, Maxwell

    2014-05-01

    As computer network security threats increase, many organizations implement multiple Network Intrusion Detection Systems (NIDS) to maximize the likelihood of intrusion detection and provide a comprehensive understanding of intrusion activities. However, NIDS trigger a massive number of alerts on a daily basis. This can be overwhelming for computer network security analysts since it is a slow and tedious process to manually analyse each alert produced. Thus, automated and intelligent clustering of alerts is important to reveal the structural correlation of events by grouping alerts with common features. As the nature of computer network attacks, and therefore alerts, is not known in advance, unsupervised alert clustering is a promising approach to achieve this goal. We propose a joint optimization technique for feature selection and clustering to aggregate similar alerts and to reduce the number of alerts that analysts have to handle individually. More precisely, each identified feature is assigned a binary value, which reflects the feature's saliency. This value is treated as a hidden variable and incorporated into a likelihood function for clustering. Since computing the optimal solution of the likelihood function directly is analytically intractable, we use the Expectation-Maximisation (EM) algorithm to iteratively update the hidden variable and use it to maximize the expected likelihood. Our empirical results, using a labelled Defense Advanced Research Projects Agency (DARPA) 2000 reference dataset, show that the proposed method gives better results than the EM clustering without feature selection in terms of the clustering accuracy.

  1. Evolution of optically nondestructive and data-non-intrusive credit card verifiers

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2010-04-01

    Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.

  2. Characterization of electrical appliances in transient state

    NASA Astrophysics Data System (ADS)

    Wójcik, Augustyn; Winiecki, Wiesław

    2017-08-01

    The article contains the study about electrical appliance characterization on the basis of power grid signals. To represent devices, parameters of current and voltage signals recorded during transient states are used. In this paper only transients occurring as a result of switching on devices are considered. The way of data acquisition performed in specialized measurement setup developed for electricity load monitoring is described. The paper presents the method of transients detection and the method of appliance parameters calculation. Using the set of acquired measurement data and appropriate software the set of parameters for several household appliances operating in different operating conditions was processed. Usefulness of appliances characterization in Non-Intrusive Appliance Load Monitoring System (NIALMS) with the use of proposed method is discussed focusing on obtained results.

  3. Cognitive avoidance of intrusive memories: recall vantage perspective and associations with depression.

    PubMed

    Williams, Alishia D; Moulds, Michelle L

    2007-06-01

    Although recent research demonstrates that intrusive memories represent an overlapping cognitive feature of depression and post-traumatic stress disorder (PTSD), there is still a general paucity of research investigating the prevalence and maintenance of intrusive memories in depression. The current study investigated the association between a range of cognitive avoidant mechanisms that characterize PTSD samples (i.e., suppression, rumination, emotional detachment, and an observer vantage perspective) and intrusive memories of negative autobiographical events in relation to dysphoria. Hypotheses were based on the proposition that employment of these cognitive mechanisms would hinder the emotional processing of the negative event, thus contributing to the maintenance of intrusions. Results supported an association between negative intrusive memories, dysphoria, and avoidant mechanisms. Significant differences were also found between field and observer memories and measures of emotional detachment and rumination. Implications relating to intrusive memory maintenance and treatment approaches are discussed.

  4. New device to measure dynamic intrusion/extrusion cycles of lyophobic heterogeneous systems.

    PubMed

    Guillemot, Ludivine; Galarneau, Anne; Vigier, Gérard; Abensur, Thierry; Charlaix, Élisabeth

    2012-10-01

    Lyophobic heterogeneous systems (LHS) are made of mesoporous materials immersed in a non-wetting liquid. One application of LHS is the nonlinear damping of high frequency vibrations. The behaviour of LHS is characterized by P - ΔV cycles, where P is the pressure applied to the system, and ΔV its volume change due to the intrusion of the liquid into the pores of the material, or its extrusion out of the pores. Very few dynamic studies of LHS have been performed until now. We describe here a new apparatus that allows us to carry out dynamic intrusion/extrusion cycles with various liquid/porous material systems, controlling the temperature from ambient to 120 °C and the frequency from 0.01 to 20 Hz. We show that for two LHS: water/MTS and Galinstan/CPG, the energy dissipated during one cycle depends very weakly on the cycle frequency, in strong contrast to conventional dampers.

  5. In-situ trainable intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such thatmore » the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.« less

  6. Vapor Intrusion Assessment and Mitigation 2012

    DTIC Science & Technology

    2012-03-26

    1 Geosyntec 0 consultants Vapor Intrusion Assessment and Mitigation 2012 Robert Ettinger, M.S., P.E., Todd McAiary, M.Sc., P.Eng., P.G...REPORT DATE 26 MAR 2012 2. REPORT TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE Vapor Intrusion Assessment and...Updates • Typical Assessment Approaches and Common Challenges • Methods to Distinguish Background Sources (McHugh) • Significance • Compound

  7. Modal Composition and Age of Intrusions in North-Central and Northeast Nevada

    USGS Publications Warehouse

    du Bray, Edward A.; Crafford, A. Elizabeth Jones

    2007-01-01

    Introduction Data presented in this report characterize igneous intrusions of north-central and northeast Nevada and were compiled as part of the Metallogeny of the Great Basin project conducted by the U.S. Geological Survey (USGS) between 2001 and 2007. The compilation pertains to the area bounded by lats 38.5 and 42 N., long 118.5 W., and the Nevada-Utah border (fig. 1). The area contains numerous large plutons and smaller stocks but also contains equally numerous smaller, shallowly emplaced intrusions, including dikes, sills, and endogenous dome complexes. Igneous intrusions (hereafter, intrusions) of multiple ages are major constituents of the geologic framework of north-central and northeast Nevada (Stewart and Carlson, 1978). Mesozoic and Cenozoic intrusions are particularly numerous and considered to be related to subduction along the west edge of the North American plate during this time. Henry and Ressel (2000) and Ressel and others (2000) have highlighted the association between magmatism and ore deposits along the Carlin trend. Similarly, Theodore (2000) has demonstrated the association between intrusions and ore deposits in the Battle Mountain area. Decades of geologic investigations in north-central and northeast Nevada (hereafter, the study area) demonstrate that most hydrothermal ore deposits are spatially, and probably temporally and genetically, associated with intrusions. Because of these associations, studies of many individual intrusions have been conducted, including those by a large number of Master's and Doctoral thesis students (particularly University of Nevada at Reno students and associated faculty), economic geologists working on behalf of exploration and mining companies, and USGS earth scientists. Although the volume of study area intrusions is large and many are associated with ore deposits, no synthesis of available data that characterize these rocks has been assembled. Compilations that have been produced for intrusions in Nevada

  8. Quantification of the Intrusion Process at Kïlauea Volcano, Hawai'I

    NASA Astrophysics Data System (ADS)

    Wright, T. L.; Marsh, B. D.

    2014-12-01

    Knowing the time between initial intrusion and later eruption of a given volume of differentiated magma is key to evaluating the connections among magma transport and emplacement, solidification and differentiation, and melt extraction and eruption. Cooling rates for two Kïlauea lava lakes as well as known parent composition and residence times for intrusions that resulted in fractionated lavas later erupted on the East Rift Zone in 1955 (34 years) and 1977 (22 years) allow intrusion dimensions to be calculated. We model intrusions beneath Kïlauea's East Rift Zone near their point of separation from the magma transport path at ~ 5 km depth using Jaeger's (1957) method calibrated against Alae and Makaopuhi lava lakes with wallrock temperatures above the curie point at 450-550°C. Minimum thicknesses of 50-70 meters are found for intrusions that fed the two fractionated lavas, as well as for long-lived magma bodies identified from geodetic monitoring during many East Rift eruptions. These intrusions began as dikes, but probably became sills or laccolithic bodies that remained near the transport path. Short-lived intrusions also arrested near the magma transport path, but that retain a dike geometry, are hypothesized to serve as a trigger for the small but discrete increments of seaward movement on Kïlauea's south flank that characterize slow-slip earthquakes. Two additional thoughts arise from the quantitative modeling of magma cooling. First, long-term heating of the wallrock surrounding the horizontal East Rift Zone transport path slows the rate of cooling within the conduit, possibly contributing to the longevity of the East Rift eruption that began in 1983. Second, the combined effects of heating of the wall rock and ever-increasing magma supply rate from the mantle may have forced breakdown and widening of the vertical transport conduit, which could explain the 5-15-km deep long-period earthquake swarms beneath Kīlauea's summit between 1987 and 1992.

  9. Evaluation of non-intrusive flow measurement techniques for a re-entry flight experiment

    NASA Technical Reports Server (NTRS)

    Miles, R. B.; Santavicca, D. A.; Zimmermann, M.

    1983-01-01

    This study evaluates various non-intrusive techniques for the measurement of the flow field on the windward side of the Space Shuttle orbiter or a similar reentry vehicle. Included are linear (Rayleigh, Raman, Mie, Laser Doppler Velocimetry, Resonant Doppler Velocimetry) and nonlinear (Coherent Anti-Stokes Raman, Laser-Induced Fluorescence) light scattering, electron-beam fluorescence, thermal emission, and mass spectroscopy. Flow-field properties were taken from a nonequilibrium flow model by Shinn, Moss, and Simmonds at the NASA Langley Research Center. Conclusions are, when possible, based on quantitative scaling of known laboratory results to the conditions projected. Detailed discussion with researchers in the field contributed further to these conclusions and provided valuable insights regarding the experimental feasibility of each of the techniques.

  10. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    NASA Astrophysics Data System (ADS)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  11. An exact computational method for performance analysis of sequential test algorithms for detecting network intrusions

    NASA Astrophysics Data System (ADS)

    Chen, Xinjia; Lacy, Fred; Carriere, Patrick

    2015-05-01

    Sequential test algorithms are playing increasingly important roles for quick detecting network intrusions such as portscanners. In view of the fact that such algorithms are usually analyzed based on intuitive approximation or asymptotic analysis, we develop an exact computational method for the performance analysis of such algorithms. Our method can be used to calculate the probability of false alarm and average detection time up to arbitrarily pre-specified accuracy.

  12. Evidential reasoning research on intrusion detection

    NASA Astrophysics Data System (ADS)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  13. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  14. Posttraumatic Intrusion, Avoidance, and Social Functioning: A 20-Year Longitudinal Study

    ERIC Educational Resources Information Center

    Solomon, Zahava; Mikulincer, Mario

    2007-01-01

    The study assesses posttraumatic intrusion, avoidance, and social functioning among 214 Israeli combat veterans from the first Lebanon War with and without combat stress reaction (CSR) 1, 2, 3, and 20 years after the war. CSR veterans reported higher intrusion and avoidance than did non-CSR veterans. With time, there was a decline in these…

  15. Non-intrusive measurements of frictional forces between micro-spheres and flat surfaces

    NASA Astrophysics Data System (ADS)

    Lin, Wei-Hsun; Daraio, Chiara; Daraio's Group Team

    2014-03-01

    We report a novel, optical pump-probe experimental setup to study micro-friction phenomena between micro-particles and a flat surface. We present a case study of stainless steel microspheres, of diameter near 250 μm, in contact with different surfaces of variable roughness. In these experiments, the contact area between the particles and the substrates is only a few nanometers wide. To excite the particles, we deliver an impulse using a pulsed, high-power laser. The reaction force resulting from the surface ablation induced by the laser imparts a controlled initial velocity to the target particle. This initial velocity can be varied between 10-5 to 1 m/s. We investigate the vibrating and rolling motions of the micro-particles by detecting their velocity and displacement with a laser vibrometer and a high-speed microscope camera. We calculate the effective Hamaker constant from the vibrating motion of a particle, and study its relation to the substrate's surface roughness. We analyze the relation between rolling friction and the minimum momentum required to break surface bonding forces. This non-contact and non-intrusive technique could be employed to study a variety of contact and tribology problems at the microscale.

  16. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    NASA Astrophysics Data System (ADS)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  17. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    PubMed

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Characterization of Pores in Dense Nanopapers and Nanofibrillated Cellulose Membranes: A Critical Assessment of Established Methods.

    PubMed

    Orsolini, Paola; Michen, Benjamin; Huch, Anja; Tingaut, Philippe; Caseri, Walter R; Zimmermann, Tanja

    2015-11-25

    Nanofibrillated cellulose (NFC) is a natural fibrous material that can be readily processed into membranes. NFC membranes for fluid separation work in aqueous medium, thus in their swollen state. The present study is devoted to a critical investigation of porosity, pore volume, specific surface area, and pore size distribution of dry and wet NFC nanopapers, also known as membranes, with various established techniques, such as electron microscopy, helium pycnometry, mercury intrusion, gas adsorption (N2 and Kr), and thermoporometry. Although these techniques can be successfully applied to inorganic materials (e.g., mesoporous silica), it is necessary to appraise them for organic and hydrophilic products such as NFC membranes. This is due to different phenomena occurring at the materials interfaces with the probing fluids. Mercury intrusion and gas adsorption are often used for the characterization of porosity-related properties; nevertheless, both techniques characterize materials in the dry state. In parallel, thermoporometry was employed to monitor the structure changes upon swelling, and a water permeance test was run to show the accessibility of the membranes to fluids. For the first time, the methods were systematically screened, and we highlighted the need of uniform sample treatments prior to the measurements (i.e., sample cutting and outgassing protocols) in order to harmonize results from the literature. The need for revising the applicability range of mercury intrusion and the inappropriateness of nitrogen adsorption were pointed out. We finally present a table for selecting the most appropriate method to determine a desired property and propose guidelines for results interpretation from which future users could profit.

  19. Magmatic intrusions in the lunar crust

    NASA Astrophysics Data System (ADS)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  20. Petroleum Vapor Intrusion

    EPA Pesticide Factsheets

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  1. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  2. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  3. Understanding Dysregulated Behaviors and Compulsions: An Extension of the Emotional Cascade Model and the Mediating Role of Intrusive Thoughts

    PubMed Central

    Jungmann, Stefanie M.; Vollmer, Noelle; Selby, Edward A.; Witthöft, Michael

    2016-01-01

    Objective: The Emotional Cascade Model (ECM) by Selby et al. (2008) proposes that people often engage in dysregulated behaviors to end extreme, aversive emotional states triggered by a self-perpetuating vicious cycle of (excessive) rumination, negative affect, and attempts to suppress negative thoughts. Method: Besides replicating the ECM, we introduced intrusions as a mediator between rumination and behavioral dysregulation and tested this extended ECM for compulsions as part of obsessive–compulsive disorders. A structural equation modeling approach was used to test this in a sample of N = 414, randomly recruited from the general population. Results: Intrusions were found to fully mediate the effect of rumination on a broad array of dysregulated behaviors and compulsions. This mediation endured when controlling for symptoms of depression. Conclusion: These findings support the idea that rumination fuels intrusions, which in turn foster dysregulated behaviors. Therefore, addressing rumination as well as intrusions may improve psychotherapeutic interventions for mental disorders characterized by dysregulated behaviors and/or extreme aversive emotional states. PMID:27445948

  4. Risk-Based Evaluation of Total Petroleum Hydrocarbons in Vapor Intrusion Studies

    PubMed Central

    Brewer, Roger; Nagashima, Josh; Kelley, Michael; Heskett, Marvin; Rigby, Mark

    2013-01-01

    This paper presents a quantitative method for the risk-based evaluation of Total Petroleum Hydrocarbons (TPH) in vapor intrusion investigations. Vapors from petroleum fuels are characterized by a complex mixture of aliphatic and, to a lesser extent, aromatic compounds. These compounds can be measured and described in terms of TPH carbon ranges. Toxicity factors published by USEPA and other parties allow development of risk-based, air and soil vapor screening levels for each carbon range in the same manner as done for individual compounds such as benzene. The relative, carbon range makeup of petroleum vapors can be used to develop weighted, site-specific or generic screening levels for TPH. At some critical ratio of TPH to a targeted, individual compound, the overwhelming proportion of TPH will drive vapor intrusion risk over the individual compound. This is particularly true for vapors associated with diesel and other middle distillate fuels, but can also be the case for low-benzene gasolines or even for high-benzene gasolines if an adequately conservative, target risk is not applied to individually targeted chemicals. This necessitates a re-evaluation of the reliance on benzene and other individual compounds as a stand-alone tool to evaluate vapor intrusion risk associated with petroleum. PMID:23765191

  5. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  6. A web-based non-intrusive ambient system to measure and classify activities of daily living.

    PubMed

    Stucki, Reto A; Urwyler, Prabitha; Rampa, Luca; Müri, René; Mosimann, Urs P; Nef, Tobias

    2014-07-21

    The number of older adults in the global population is increasing. This demographic shift leads to an increasing prevalence of age-associated disorders, such as Alzheimer's disease and other types of dementia. With the progression of the disease, the risk for institutional care increases, which contrasts with the desire of most patients to stay in their home environment. Despite doctors' and caregivers' awareness of the patient's cognitive status, they are often uncertain about its consequences on activities of daily living (ADL). To provide effective care, they need to know how patients cope with ADL, in particular, the estimation of risks associated with the cognitive decline. The occurrence, performance, and duration of different ADL are important indicators of functional ability. The patient's ability to cope with these activities is traditionally assessed with questionnaires, which has disadvantages (eg, lack of reliability and sensitivity). Several groups have proposed sensor-based systems to recognize and quantify these activities in the patient's home. Combined with Web technology, these systems can inform caregivers about their patients in real-time (e.g., via smartphone). We hypothesize that a non-intrusive system, which does not use body-mounted sensors, video-based imaging, and microphone recordings would be better suited for use in dementia patients. Since it does not require patient's attention and compliance, such a system might be well accepted by patients. We present a passive, Web-based, non-intrusive, assistive technology system that recognizes and classifies ADL. The components of this novel assistive technology system were wireless sensors distributed in every room of the participant's home and a central computer unit (CCU). The environmental data were acquired for 20 days (per participant) and then stored and processed on the CCU. In consultation with medical experts, eight ADL were classified. In this study, 10 healthy participants (6 women

  7. Associations between intrusive thoughts, reality discrimination and hallucination-proneness in healthy young adults.

    PubMed

    Smailes, David; Meins, Elizabeth; Fernyhough, Charles

    2015-01-01

    People who experience intrusive thoughts are at increased risk of developing hallucinatory experiences, as are people who have weak reality discrimination skills. No study has yet examined whether these two factors interact to make a person especially prone to hallucinatory experiences. The present study examined this question in a non-clinical sample. Participants were 160 students, who completed a reality discrimination task, as well as self-report measures of cannabis use, negative affect, intrusive thoughts and auditory hallucination-proneness. The possibility of an interaction between reality discrimination performance and level of intrusive thoughts was assessed using multiple regression. The number of reality discrimination errors and level of intrusive thoughts were independent predictors of hallucination-proneness. The reality discrimination errors × intrusive thoughts interaction term was significant, with participants who made many reality discrimination errors and reported high levels of intrusive thoughts being especially prone to hallucinatory experiences. Hallucinatory experiences are more likely to occur in people who report high levels of intrusive thoughts and have weak reality discrimination skills. If applicable to clinical samples, these findings suggest that improving patients' reality discrimination skills and reducing the number of intrusive thoughts they experience may reduce the frequency of hallucinatory experiences.

  8. Application of different analytical methods for the characterization of non-spherical micro- and nanoparticles.

    PubMed

    Mathaes, Roman; Winter, Gerhard; Engert, Julia; Besheer, Ahmed

    2013-09-10

    -spherical particles over a wide size range, the limitations of the methods are discussed. The use of orthogonal characterization methods can provide a complete picture about the CQA of non-spherical particles over a wide size range. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  10. An Excel Macro to Plot the HFE-Diagram to Identify Sea Water Intrusion Phases.

    PubMed

    Giménez-Forcada, Elena; Sánchez San Román, F Javier

    2015-01-01

    A hydrochemical facies evolution diagram (HFE-D) is a multirectangular diagram, which is a useful tool in the interpretation of sea water intrusion processes. This method note describes a simple method for generating an HFE-D plot using the spreadsheet software package, Microsoft Excel. The code was applied to groundwater from the alluvial coastal plain of Grosseto (Tuscany, Italy), which is characterized by a complex salinization process in which sea water mixes with sulfate or bicarbonate recharge water. © 2014, National GroundWater Association.

  11. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    USGS Publications Warehouse

    duBray, E.A.

    2007-01-01

    Importantly, modal composition, age, and geochemical characteristics of intrusions associated with large mineral deposits along the trends, are indistinguishable from non-mineralized intrusions in northern Nevada and thus do not identify intrusions associated with significant deposits. Moreover, intrusion age and composition show little correlation with mineral-deposit type, abundance, and size. Given the lack of diagnostic characteristics for intrusions associated with deposits, it is uncertain whether age, modal composition, and geochemical data can identify intrusions associated with mineral deposits. These findings suggest that associations between northern Nevada intrusions and mineral deposits reflect superimposition of many geologic factors, none of which was solely responsible for mineral-deposit formation. These factors might include intrusion size, efficiency of fluid and metal extraction from magma, prevailing redox and sulfidation conditions, or derivation of metals and ligands from host rocks and groundwater. The abundance and diversity of mineral deposits in northern Nevada may partly reflect geochemical inheritance, for example, along the mineral trends rather than the influence of petrologically unique magma or associated fluids.

  12. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  13. Maxillary molar intrusion with micro-implant anchorage (MIA).

    PubMed

    Park, Hyo-Sang; Jang, Bong-Kyu; Kyung, Hee-Moon

    2005-11-01

    Intrusion of the maxillary molars is difficult to accomplish using traditional methods of anchorage. To describe methods of maxillary molar intrusion with the aid of micro-implants. Micro-implants provide stable intra-oral anchorage and enable the maxillary molars to be intruded without the usual side effects. Three adult patients are presented showing how micro-implants can be used to intrude the maxillary molars. In the first patient micro-implants were placed in the alveolar process between the second premolar and first molar, in the second patient micro-implants were placed in the palatal alveolar process between the first and second molars, and in the third patient a micro-implant was placed in the palate paramedially. A transpalatal bar was used to prevent bucco- or linguoversion of the molars during intrusion. The maxillary molars can be intruded with intra-oral anchorage derived from microscrew implants.

  14. Laser spectroscopy for totally non-intrusive detection of oxygen in modified atmosphere food packages

    NASA Astrophysics Data System (ADS)

    Cocola, L.; Fedel, M.; Poletto, L.; Tondello, G.

    2015-04-01

    A device for measuring the oxygen concentration inside packages in modified atmosphere working in a completely non-intrusive way has been developed and tested. The device uses tunable diode laser spectroscopy in a geometry similar to a short distance LIDAR: A laser beam is sent through the top film of a food package, and the absorption is measured by detecting the light scattered by the bottom of the container or by a portion of the food herein contained. The device can operate completely in a contactless way from the package, and the distances of absorption both outside and inside the package are measured with a triangulation system. The performances of the device have been tested for various types of containers, and absolute values for the oxygen concentration have been compared with standard albeit destructive measurements.

  15. Analysis of Uncertainty and Variability in Finite Element Computational Models for Biomedical Engineering: Characterization and Propagation

    PubMed Central

    Mangado, Nerea; Piella, Gemma; Noailly, Jérôme; Pons-Prats, Jordi; Ballester, Miguel Ángel González

    2016-01-01

    Computational modeling has become a powerful tool in biomedical engineering thanks to its potential to simulate coupled systems. However, real parameters are usually not accurately known, and variability is inherent in living organisms. To cope with this, probabilistic tools, statistical analysis and stochastic approaches have been used. This article aims to review the analysis of uncertainty and variability in the context of finite element modeling in biomedical engineering. Characterization techniques and propagation methods are presented, as well as examples of their applications in biomedical finite element simulations. Uncertainty propagation methods, both non-intrusive and intrusive, are described. Finally, pros and cons of the different approaches and their use in the scientific community are presented. This leads us to identify future directions for research and methodological development of uncertainty modeling in biomedical engineering. PMID:27872840

  16. Analysis of Uncertainty and Variability in Finite Element Computational Models for Biomedical Engineering: Characterization and Propagation.

    PubMed

    Mangado, Nerea; Piella, Gemma; Noailly, Jérôme; Pons-Prats, Jordi; Ballester, Miguel Ángel González

    2016-01-01

    Computational modeling has become a powerful tool in biomedical engineering thanks to its potential to simulate coupled systems. However, real parameters are usually not accurately known, and variability is inherent in living organisms. To cope with this, probabilistic tools, statistical analysis and stochastic approaches have been used. This article aims to review the analysis of uncertainty and variability in the context of finite element modeling in biomedical engineering. Characterization techniques and propagation methods are presented, as well as examples of their applications in biomedical finite element simulations. Uncertainty propagation methods, both non-intrusive and intrusive, are described. Finally, pros and cons of the different approaches and their use in the scientific community are presented. This leads us to identify future directions for research and methodological development of uncertainty modeling in biomedical engineering.

  17. Stratospheric Intrusion-Influenced Ozone Air Quality Exceedences Investigated in MERRA-2

    NASA Technical Reports Server (NTRS)

    Knowland, K. Emma; Ott, Lesley; Duncan, Bryan; Wargan, Krzysztof

    2017-01-01

    Ozone near the surface is harmful to human health and is a result of the photochemical reaction with both man-made and natural precursor pollutant sources. Therefore, in order to reduce near surface ozone concentrations, communities must reduce anthropogenic pollution sources. However, the injection of stratospheric ozone into the troposphere, known as a stratospheric intrusion, can also lead to concentrations of ground-level ozone exceeding air quality standards. Stratospheric intrusions are dynamical atmospheric features, however, these intrusions have been misrepresented in models and reanalyses until recently, as the features of a stratospheric intrusion are best identified in horizontal resolutions of approximately 50 km or smaller. NASA's Modern-Era Retrospective Analysis for Research and Applications Version-2 (MERRA-2) reanalysis is a publicly-available high-resolution dataset (50 km) with assimilated ozone that characterizes stratospheric ozone on the same spatiotemporal resolution as the meteorology. We show that stratospheric intrusions that impact surface air quality are well represented in the MERRA-2 reanalysis. This is demonstrated through a case study analysis of stratospheric intrusion events which were identified by the United States Environmental Protection Agency (EPA) to impact surface ozone air quality in spring 2012 in Colorado. The stratospheric intrusions are identified in MERRA-2 by the folding of the dynamical tropopause under the jet stream and subsequent isentropic descent of dry, O3-rich stratospheric air towards the surface where ozone air quality exceedences were observed. The MERRA-2 reanalysis can support air quality agencies for more rapid identification of the impact of stratospheric air on ground-level ozone.

  18. Application and evaluation of electromagnetic methods for imaging saltwater intrusion in coastal aquifers: Seaside Groundwater Basin, California

    USGS Publications Warehouse

    Nenna, Vanessa; Herckenrather, Daan; Knight, Rosemary; Odlum, Nick; McPhee, Darcy

    2013-01-01

    Developing effective resource management strategies to limit or prevent saltwater intrusion as a result of increasing demands on coastal groundwater resources requires reliable information about the geologic structure and hydrologic state of an aquifer system. A common strategy for acquiring such information is to drill sentinel wells near the coast to monitor changes in water salinity with time. However, installation and operation of sentinel wells is costly and provides limited spatial coverage. We studied the use of noninvasive electromagnetic (EM) geophysical methods as an alternative to installation of monitoring wells for characterizing coastal aquifers. We tested the feasibility of using EM methods at a field site in northern California to identify the potential for and/or presence of hydraulic communication between an unconfined saline aquifer and a confined freshwater aquifer. One-dimensional soundings were acquired using the time-domain electromagnetic (TDEM) and audiomagnetotelluric (AMT) methods. We compared inverted resistivity models of TDEM and AMT data obtained from several inversion algorithms. We found that multiple interpretations of inverted models can be supported by the same data set, but that there were consistencies between all data sets and inversion algorithms. Results from all collected data sets suggested that EM methods are capable of reliably identifying a saltwater-saturated zone in the unconfined aquifer. Geophysical data indicated that the impermeable clay between aquifers may be more continuous than is supported by current models.

  19. Design of an Evolutionary Approach for Intrusion Detection

    PubMed Central

    2013-01-01

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The proposed approach can generate a pool of noninferior solutions and ensembles thereof having optimized trade-offs values of multiple conflicting objectives. In this paper, a three-phase, approach is proposed to generate solutions to a simple chromosome design in the first phase. In the first phase, a Pareto front of noninferior individual solutions is approximated. In the second phase of the proposed approach, the entire solution set is further refined to determine effective ensemble solutions considering solution interaction. In this phase, another improved Pareto front of ensemble solutions over that of individual solutions is approximated. The ensemble solutions in improved Pareto front reported improved detection results based on benchmark datasets for intrusion detection. In the third phase, a combination method like majority voting method is used to fuse the predictions of individual solutions for determining prediction of ensemble solution. Benchmark datasets, namely, KDD cup 1999 and ISCX 2012 dataset, are used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover individual solutions and ensemble solutions thereof with a good support and a detection rate from benchmark datasets (in comparison with well-known ensemble methods like bagging and boosting). In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting

  20. Beta-blockers may reduce intrusive thoughts in newly diagnosed cancer patients.

    PubMed

    Lindgren, Monica E; Fagundes, Christopher P; Alfano, Catherine M; Povoski, Stephen P; Agnese, Doreen M; Arnold, Mark W; Farrar, William B; Yee, Lisa D; Carson, William E; Schmidt, Carl R; Kiecolt-Glaser, Janice K

    2013-08-01

    A cancer diagnosis provokes significant levels of emotional distress, with intrusive thoughts being the most common manifestation among breast cancer survivors. Cancer-related intrusive thoughts can take the form of emotional memories, flashbacks, nightmares, and intrusive images. Emotional arousal after a severe life stressor prolongs adrenergic activation, which in turn may increase risk for post-traumatic symptomatology. However, antihypertensive beta-blockers block adrenergic activation and are known to reduce traumatic memories and related psychological distress. Thus, the current study examined the association between beta-blocker use and the severity of cancer-related intrusive thoughts and related symptoms following a cancer diagnosis. The 174 breast and 36 female colorectal cancer patients who had recently undergone diagnostic screening or biopsy included 39 beta-blocker users and 171 non-users. Prior to any cancer treatment including surgery, participants completed questionnaires that included the Impact of Events Scale and the Center for Epidemiological Studies Depression Scale. Analyses controlled for age, education, cancer stage, cancer type, days since diagnosis, marital status, depression, and comorbidities. Although the high rates of cancer-related distress in this sample were similar to those of other studies with recently diagnosed patients, beta-blocker users endorsed 32% fewer cancer-related intrusive thoughts than non-users. Recently diagnosed cancer patients using beta-blockers reported less cancer-related psychological distress. These results suggest that beta-blocker use may benefit cancer patients' psychological adjustment following diagnosis, and provide a promising direction for future investigations on the pharmacological benefits of beta-blockers for cancer-related distress. Copyright © 2012 John Wiley & Sons, Ltd.

  1. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  2. Quantitative impact characterization of aeronautical CFRP materials with non-destructive testing methods

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kiefel, Denis, E-mail: Denis.Kiefel@airbus.com, E-mail: Rainer.Stoessel@airbus.com; Stoessel, Rainer, E-mail: Denis.Kiefel@airbus.com, E-mail: Rainer.Stoessel@airbus.com; Grosse, Christian, E-mail: Grosse@tum.de

    2015-03-31

    In recent years, an increasing number of safety-relevant structures are designed and manufactured from carbon fiber reinforced polymers (CFRP) in order to reduce weight of airplanes by taking the advantage of their specific strength into account. Non-destructive testing (NDT) methods for quantitative defect analysis of damages are liquid- or air-coupled ultrasonic testing (UT), phased array ultrasonic techniques, and active thermography (IR). The advantage of these testing methods is the applicability on large areas. However, their quantitative information is often limited on impact localization and size. In addition to these techniques, Airbus Group Innovations operates a micro x-ray computed tomography (μ-XCT)more » system, which was developed for CFRP characterization. It is an open system which allows different kinds of acquisition, reconstruction, and data evaluation. One main advantage of this μ-XCT system is its high resolution with 3-dimensional analysis and visualization opportunities, which enables to gain important quantitative information for composite part design and stress analysis. Within this study, different NDT methods will be compared at CFRP samples with specified artificial impact damages. The results can be used to select the most suitable NDT-method for specific application cases. Furthermore, novel evaluation and visualization methods for impact analyzes are developed and will be presented.« less

  3. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT.

    PubMed

    Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime

    2017-08-26

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.

  4. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT

    PubMed Central

    Carro, Belen; Sanchez-Esguevillas, Antonio

    2017-01-01

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host’s network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery. PMID:28846608

  5. Influences of menstrual cycle position and sex hormone levels on spontaneous intrusive recollections following emotional stimuli.

    PubMed

    Ferree, Nikole K; Kamat, Rujvi; Cahill, Larry

    2011-12-01

    Spontaneous intrusive recollections (SIRs) are known to follow emotional events in clinical and non-clinical populations. Previous work in our lab has found that women report more SIRs than men after exposure to emotional films, and that this effect is driven entirely by women in the luteal phase of the menstrual cycle. To replicate and extend this finding, participants viewed emotional films, provided saliva samples for sex hormone concentration analysis, and estimated SIR frequency following film viewing. Women in the luteal phase reported significantly more SIRs than did women in the follicular phase, and SIR frequency significantly correlated with salivary progesterone levels. The results are consistent with an emerging pattern in the literature suggesting that menstrual cycle position of female participants can potently influence findings in numerous cognitive domains. The potential implications of these results for disorders characterized by intrusions, such as post-traumatic stress disorder, are also discussed. Copyright © 2011 Elsevier Inc. All rights reserved.

  6. Welded tuff porosity characterization using mercury intrusion, nitrogen and ethylene glycol monoethyl ether sorption and epifluorescence microscopy

    USGS Publications Warehouse

    Reddy, M.M.; Claassen, H.C.; Rutherford, D.W.; Chiou, C.T.

    1994-01-01

    Porosity of welded tuff from Snowshoe Mountain, Colorado, was characterized by mercury intrusion porosimetry (MIP), nitrogen sorption porosimetry, ethylene glycol monoethyl ether (EGME) gas phase sorption and epifluorescence optical microscopy. Crushed tuff of two particle-size fractions (1-0.3 mm and less than 0.212 mm), sawed sections of whole rock and crushed tuff that had been reacted with 0.1 N hydrochloric acid were examined. Average MIP pore diameter values were in the range of 0.01-0.02??m. Intrusion volume was greatest for tuff reacted with 0.1 N hydrochloric acid and least for sawed tuff. Cut rock had the smallest porosity (4.72%) and crushed tuff reacted in hydrochloric acid had the largest porosity (6.56%). Mean pore diameters from nitrogen sorption measurements were 0.0075-0.0187 ??m. Nitrogen adsorption pore volumes (from 0.005 to 0.013 cm3/g) and porosity values (from 1.34 to 3.21%) were less than the corresponding values obtained by MIP. More than half of the total tuff pore volume was associated with pore diameters < 0.05??m. Vapor sorption of EGME demonstrated that tuff pores contain a clay-like material. Epifluorescence microscopy indicated that connected porosity is heterogeneously distributed within the tuff matix; mineral grains had little porosity. Tuff porosity may have important consequences for contaminant disposal in this host rock. ?? 1994.

  7. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    NASA Astrophysics Data System (ADS)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  8. Integral Analysis of Field Work and Laboratory Electrical Resistivity Imaging for Saline Water Intrusion Prediction in Groundwater

    NASA Astrophysics Data System (ADS)

    Zawawi, M. H.; Zahar, M. F.; Hashim, M. M. M.; Hazreek, Z. A. M.; Zahari, N. M.; Kamaruddin, M. A.

    2018-04-01

    Saline water intrusion is a serious threat to the groundwater as many part of the world utilize groundwater as their main source of fresh water supply. The usage of high salinity level of water as drinking water can lead to a very serious health hazard towards human. Saline water intrusion is a process by which induced flow of seawater into freshwater aquifer along the coastal area. It might happen due to human action and/or by natural event. The climate change and rise up of sea level may speed up the saline water intrusion process. The conventional method for distinguishing and checking saltwater interference to groundwater along the coast aquifers is to gather and test the groundwater from series of observation wells (borehole) with an end goal to give the important information about the hydrochemistry data to conclude whether the water in the well are safe to consume or not. An integrated approach of field and laboratory electrical resistivity investigation is proposed for indicating the contact region between saline and fresh groundwater. It was found that correlation for both soilbox produced almost identical curvilinear trends for 2% increment of seawater tested using sand sample. This project contributes towards predicting the saline water intrusion to the groundwater by non-destructive test that can replaced the conventional method of groundwater monitoring using series of boreholes in the coastal area

  9. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  10. Optical and non-optical methods for detection and characterization of microparticles and exosomes.

    PubMed

    van der Pol, E; Hoekstra, A G; Sturk, A; Otto, C; van Leeuwen, T G; Nieuwland, R

    2010-12-01

    Microparticles and exosomes are cell-derived microvesicles present in body fluids that play a role in coagulation, inflammation, cellular homeostasis and survival, intercellular communication, and transport. Despite increasing scientific and clinical interest, no standard procedures are available for the isolation, detection and characterization of microparticles and exosomes, because their size is below the reach of conventional detection methods. Our objective is to give an overview of currently available and potentially applicable methods for optical and non-optical determination of the size, concentration, morphology, biochemical composition and cellular origin of microparticles and exosomes. The working principle of all methods is briefly discussed, as well as their applications and limitations based on the underlying physical parameters of the technique. For most methods, the expected size distribution for a given microvesicle population is determined. The explanations of the physical background and the outcomes of our calculations provide insights into the capabilities of each method and make a comparison possible between the discussed methods. In conclusion, several (combinations of) methods can detect clinically relevant properties of microparticles and exosomes. These methods should be further explored and validated by comparing measurement results so that accurate, reliable and fast solutions come within reach. © 2010 International Society on Thrombosis and Haemostasis.

  11. Toddler Inhibited Temperament, Maternal Cortisol Reactivity and Embarrassment, and Intrusive Parenting

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2013-01-01

    The relevance of parenting behavior to toddlers’ development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers’ inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multi-method approach would acknowledge that several levels of processes determine mothers’ experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers’ inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-olds toddlers and their mothers. Toddlers’ inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PMID:23750532

  12. Real-Time Non-Intrusive Assessment of Viewing Distance during Computer Use.

    PubMed

    Argilés, Marc; Cardona, Genís; Pérez-Cabré, Elisabet; Pérez-Magrané, Ramon; Morcego, Bernardo; Gispets, Joan

    2016-12-01

    To develop and test the sensitivity of an ultrasound-based sensor to assess the viewing distance of visual display terminals operators in real-time conditions. A modified ultrasound sensor was attached to a computer display to assess viewing distance in real time. Sensor functionality was tested on a sample of 20 healthy participants while they conducted four 10-minute randomly presented typical computer tasks (a match-three puzzle game, a video documentary, a task requiring participants to complete a series of sentences, and a predefined internet search). The ultrasound sensor offered good measurement repeatability. Game, text completion, and web search tasks were conducted at shorter viewing distances (54.4 cm [95% CI 51.3-57.5 cm], 54.5 cm [95% CI 51.1-58.0 cm], and 54.5 cm [95% CI 51.4-57.7 cm], respectively) than the video task (62.3 cm [95% CI 58.9-65.7 cm]). Statistically significant differences were found between the video task and the other three tasks (all p < 0.05). Range of viewing distances (from 22 to 27 cm) was similar for all tasks (F = 0.996; p = 0.413). Real-time assessment of the viewing distance of computer users with a non-intrusive ultrasonic device disclosed a task-dependent pattern.

  13. Nocturnal insomnia symptoms and stress-induced cognitive intrusions in risk for depression: A 2-year prospective study.

    PubMed

    Kalmbach, David A; Pillai, Vivek; Drake, Christopher L

    2018-01-01

    Nearly half of US adults endorse insomnia symptoms. Sleep problems increase risk for depression during stress, but the mechanisms are unclear. During high stress, individuals having difficulty falling or staying asleep may be vulnerable to cognitive intrusions after stressful events, given that the inability to sleep creates a period of unstructured and socially isolated time in bed. We investigated the unique and combined effects of insomnia symptoms and stress-induced cognitive intrusions on risk for incident depression. 1126 non-depressed US adults with no history of DSM-5 insomnia disorder completed 3 annual web-based surveys on sleep, stress, and depression. We examined whether nocturnal insomnia symptoms and stress-induced cognitive intrusions predicted depression 1y and 2y later. Finally, we compared depression-risk across four groups: non-perseverators with good sleep, non-perseverators with insomnia symptoms, perseverators with good sleep, and perseverators with insomnia symptoms. Insomnia symptoms (β = .10-.13, p < .001) and cognitive intrusions (β = .19-.20, p < .001) predicted depression severity 1y and 2y later. Depression incidence across 2 years was 6.2%. Perseverators with insomnia had the highest rates of depression (13.0%), whereas good sleeping non-perseverators had the lowest rates (3.3%, Relative Risk = 3.94). Perseverators with sleep latency >30 m reported greater depression than good sleeping perseverators (t = 2.09, p < .04). Cognitive intrusions following stress creates a depressogenic mindset, and nocturnal wakefulness may augment the effects of cognitive arousal on depression development. Poor sleepers may be especially vulnerable to cognitive intrusions when having difficulty initiating sleep. As treatable behaviors, nighttime wakefulness and cognitive arousal may be targeted to reduce risk for depression in poor sleepers.

  14. ASSESSMENT OF VAPOR INTRUSION USING INDOOR AND SUB-SLAB AIR SAMPLING

    EPA Science Inventory

    The objective of this investigation was to develop a method for evaluating vapor intrusion using indoor and sub-slab air measurement and at the same time directly assist EPA’s New England Regional Office in evaluating vapor intrusion in 15 homes and one business near the former R...

  15. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  16. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    NASA Astrophysics Data System (ADS)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  17. Testing alternative conceptual models of seawater intrusion in a coastal aquifer using computer simulation, southern California, USA

    USGS Publications Warehouse

    Nishikawa, Tracy

    1997-01-01

    Two alternative conceptual models of the physical processes controlling seawater intrusion in a coastal basin in California, USA, were tested to identify a likely principal pathway for seawater intrusion. The conceptual models were tested by using a two-dimensional, finite-element groundwater flow and transport model. This pathway was identified by the conceptual model that best replicated the historical data. The numerical model was applied in cross section to a submarine canyon that is a main avenue for seawater to enter the aquifer system underlying the study area. Both models are characterized by a heterogeneous, layered, water-bearing aquifer. However, the first model is characterized by flat-lying aquifer layers and by a high value of hydraulic conductivity in the basal aquifer layer, which is thought to be a principal conduit for seawater intrusion. The second model is characterized by offshore folding, which was modeled as a very nearshore outcrop, thereby providing a shorter path for seawater to intrude. General conclusions are that: 1) the aquifer system is best modeled as a flat, heterogeneous, layered system; 2) relatively thin basal layers with relatively high values of hydraulic conductivity are the principal pathways for seawater intrusion; and 3) continuous clay layers of low hydraulic conductivity play an important role in controlling the movement of seawater.

  18. Carbamazepine Treatment of Hyperactivity and Intrusiveness in Dementia.

    PubMed

    Stewart, Jonathan T

    Behavioral problems are seen in most patients with dementia and are often poorly characterized in the literature. We present a 70-year-old man with advanced Alzheimer disease and problematic disinhibited behaviors, including intrusiveness and Witzelsucht (disinhibited humor). These symptoms responded robustly to carbamazepine. Carbamazepine may be a useful adjunct in managing problematic behaviors in dementia, especially when those problems can be framed as behavioral disinhibition.

  19. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE must...

  20. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback- Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the twostage algorithm is assessed in simulations of WSN

  1. Nocturnal insomnia symptoms and stress-induced cognitive intrusions in risk for depression: A 2-year prospective study

    PubMed Central

    Pillai, Vivek; Drake, Christopher L.

    2018-01-01

    Nearly half of US adults endorse insomnia symptoms. Sleep problems increase risk for depression during stress, but the mechanisms are unclear. During high stress, individuals having difficulty falling or staying asleep may be vulnerable to cognitive intrusions after stressful events, given that the inability to sleep creates a period of unstructured and socially isolated time in bed. We investigated the unique and combined effects of insomnia symptoms and stress-induced cognitive intrusions on risk for incident depression. 1126 non-depressed US adults with no history of DSM-5 insomnia disorder completed 3 annual web-based surveys on sleep, stress, and depression. We examined whether nocturnal insomnia symptoms and stress-induced cognitive intrusions predicted depression 1y and 2y later. Finally, we compared depression-risk across four groups: non-perseverators with good sleep, non-perseverators with insomnia symptoms, perseverators with good sleep, and perseverators with insomnia symptoms. Insomnia symptoms (β = .10–.13, p < .001) and cognitive intrusions (β = .19–.20, p < .001) predicted depression severity 1y and 2y later. Depression incidence across 2 years was 6.2%. Perseverators with insomnia had the highest rates of depression (13.0%), whereas good sleeping non-perseverators had the lowest rates (3.3%, Relative Risk = 3.94). Perseverators with sleep latency >30 m reported greater depression than good sleeping perseverators (t = 2.09, p < .04). Cognitive intrusions following stress creates a depressogenic mindset, and nocturnal wakefulness may augment the effects of cognitive arousal on depression development. Poor sleepers may be especially vulnerable to cognitive intrusions when having difficulty initiating sleep. As treatable behaviors, nighttime wakefulness and cognitive arousal may be targeted to reduce risk for depression in poor sleepers. PMID:29438400

  2. [Analysis of intrusion errors in free recall].

    PubMed

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  3. Scanning seismic intrusion detection method and apparatus. [monitoring unwanted subterranean entry and departure

    NASA Technical Reports Server (NTRS)

    Lee, R. D. (Inventor)

    1983-01-01

    An intrusion monitoring system includes an array of seismic sensors, such as geophones, arranged along a perimeter to be monitored for unauthorized intrusion as by surface movement or tunneling. Two wires lead from each sensor to a central monitoring station. The central monitoring station has three modes of operation. In a first mode of operation, the output of all of the seismic sensors is summed into a receiver for amplification and detection. When the amplitude of the summed signals exceeds a certain predetermined threshold value an alarm is sounded. In a second mode of operation, the individual output signals from the sensors are multiplexed into the receiver for sequentially interrogating each of the sensors.

  4. Machine Learning in Intrusion Detection

    DTIC Science & Technology

    2005-07-01

    machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate

  5. Climate variability modulates western US ozone air quality in spring via deep stratospheric intrusions

    PubMed Central

    Lin, Meiyun; Fiore, Arlene M.; Horowitz, Larry W.; Langford, Andrew O.; Oltmans, Samuel J.; Tarasick, David; Rieder, Harald E.

    2015-01-01

    Evidence suggests deep stratospheric intrusions can elevate western US surface ozone to unhealthy levels during spring. These intrusions can be classified as ‘exceptional events', which are not counted towards non-attainment determinations. Understanding the factors driving the year-to-year variability of these intrusions is thus relevant for effective implementation of the US ozone air quality standard. Here we use observations and model simulations to link these events to modes of climate variability. We show more frequent late spring stratospheric intrusions when the polar jet meanders towards the western United States, such as occurs following strong La Niña winters (Niño3.4<−1.0 °C). While El Niño leads to enhancements of upper tropospheric ozone, we find this influence does not reach surface air. Fewer and weaker intrusion events follow in the two springs after the 1991 volcanic eruption of Mt. Pinatubo. The linkage between La Niña and western US stratospheric intrusions can be exploited to provide a few months of lead time during which preparations could be made to deploy targeted measurements aimed at identifying these exceptional events. PMID:25964012

  6. Intrusion detection: systems and models

    NASA Technical Reports Server (NTRS)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  7. Multivariate exploration of non-intrusive load monitoring via spatiotemporal pattern network

    DOE PAGES

    Liu, Chao; Akintayo, Adedotun; Jiang, Zhanhong; ...

    2017-12-18

    Non-intrusive load monitoring (NILM) of electrical demand for the purpose of identifying load components has thus far mostly been studied using univariate data, e.g., using only whole building electricity consumption time series to identify a certain type of end-use such as lighting load. However, using additional variables in the form of multivariate time series data may provide more information in terms of extracting distinguishable features in the context of energy disaggregation. In this work, a novel probabilistic graphical modeling approach, namely the spatiotemporal pattern network (STPN) is proposed for energy disaggregation using multivariate time-series data. The STPN framework is shownmore » to be capable of handling diverse types of multivariate time-series to improve the energy disaggregation performance. The technique outperforms the state of the art factorial hidden Markov models (FHMM) and combinatorial optimization (CO) techniques in multiple real-life test cases. Furthermore, based on two homes' aggregate electric consumption data, a similarity metric is defined for the energy disaggregation of one home using a trained model based on the other home (i.e., out-of-sample case). The proposed similarity metric allows us to enhance scalability via learning supervised models for a few homes and deploying such models to many other similar but unmodeled homes with significantly high disaggregation accuracy.« less

  8. Multivariate exploration of non-intrusive load monitoring via spatiotemporal pattern network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Chao; Akintayo, Adedotun; Jiang, Zhanhong

    Non-intrusive load monitoring (NILM) of electrical demand for the purpose of identifying load components has thus far mostly been studied using univariate data, e.g., using only whole building electricity consumption time series to identify a certain type of end-use such as lighting load. However, using additional variables in the form of multivariate time series data may provide more information in terms of extracting distinguishable features in the context of energy disaggregation. In this work, a novel probabilistic graphical modeling approach, namely the spatiotemporal pattern network (STPN) is proposed for energy disaggregation using multivariate time-series data. The STPN framework is shownmore » to be capable of handling diverse types of multivariate time-series to improve the energy disaggregation performance. The technique outperforms the state of the art factorial hidden Markov models (FHMM) and combinatorial optimization (CO) techniques in multiple real-life test cases. Furthermore, based on two homes' aggregate electric consumption data, a similarity metric is defined for the energy disaggregation of one home using a trained model based on the other home (i.e., out-of-sample case). The proposed similarity metric allows us to enhance scalability via learning supervised models for a few homes and deploying such models to many other similar but unmodeled homes with significantly high disaggregation accuracy.« less

  9. Intrusive Thoughts and Young Children's Knowledge about Thinking following a Natural Disaster

    ERIC Educational Resources Information Center

    Sprung, Manuel; Harris, Paul L.

    2010-01-01

    Background: "Hurricane Katrina" devastated the Mississippi Gulf Coast in August 2005. Intrusive re-experiencing is a common posttraumatic stress symptom. However, young children with limited introspection skills might have difficulties identifying their intrusive thoughts. Method: A sample of 165 5- to 9-year-old children were surveyed about their…

  10. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Non-Intrusive Sensor for In-Situ Measurement of Recession Rate of Ablative and Eroding Materials

    NASA Technical Reports Server (NTRS)

    Papadopoulos, George (Inventor); Tiliakos, Nicholas (Inventor); Thomson, Clint (Inventor); Benel, Gabriel (Inventor)

    2014-01-01

    A non-intrusive sensor for in-situ measurement of recession rate of heat shield ablatives. An ultrasonic wave source is carried in the housing. A microphone is also carried in the housing, for collecting the reflected ultrasonic waves from an interface surface of the ablative material. A time phasing control circuit is also included for time-phasing the ultrasonic wave source so that the waves reflected from the interface surface of the ablative material focus on the microphone, to maximize the acoustic pressure detected by the microphone and to mitigate acoustic velocity variation effects through the material through a de-coupling process that involves a software algorithm. A software circuit for computing the location off of which the ultrasonic waves scattered to focus back at the microphone is also included, so that the recession rate of the heat shield ablative may be monitored in real-time through the scan-focus approach.

  12. Fronts and intrusions in the upper Deep Polar Water of the Eurasian and Makarov basins

    NASA Astrophysics Data System (ADS)

    Kuzmina, Natalia; Rudels, Bert; Zhurbas, Natalia; Lyzhkov, Dmitry

    2013-04-01

    CTD data obtained in the Arctic Basin are analyzed to describe structural features of intrusive layers and fronts encountered in the upper Deep Polar Water. This work is an extension of Arctic intrusions studies by Rudels et al. (1999) and Kuzmina et al. (2011). Numerous examples of fronts and intrusions observed in a deep layer (depth range of 600-1300 m) in the Eurasian and Makarov basins where salinity is increasing, and temperature is decreasing with depth (stable-stable thermohaline stratification), are described. The data are used to estimate hydrological parameters capable of determining different types of fronts and characterizing intrusive layers depending on the front structure. Coherence of intrusive layers is shown to get broken with the change of front structure. An evidence is found that enhanced turbulent mixing above local bottom elevations can prevent from intrusive layering. A linear stability model description of the observed intrusions is developed based on the Merryfield's (2000) assumption that interleaving is caused by differential mixing. Theoretical analysis is focused on prediction of the slopes of unstable modes at baroclinic and thermohaline fronts. Apparent vertical diffusivity due to turbulent mixing at baroclinic and thermohaline fronts is estimated on the basis of comparison of observed intrusion slopes with modeled slopes of the most unstable modes. Apparent lateral diffusivity is estimated too, based on Joyce (1980) approach. These estimates show that intrusive instability of fronts caused by differential mixing can result in sizable values of apparent lateral heat diffusivity in the deep Arctic layer that are quite comparable with those of the upper and intermediate Arctic layers (Walsh, Carmack, 2003; Kuzmina et al., 2011).

  13. Intrusive Rock Database for the Digital Geologic Map of Utah

    USGS Publications Warehouse

    Nutt, C.J.; Ludington, Steve

    2003-01-01

    Digital geologic maps offer the promise of rapid and powerful answers to geologic questions using Geographic Information System software (GIS). Using modern GIS and database methods, a specialized derivative map can be easily prepared. An important limitation can be shortcomings in the information provided in the database associated with the digital map, a database which is often based on the legend of the original map. The purpose of this report is to show how the compilation of additional information can, when prepared as a database that can be used with the digital map, be used to create some types of derivative maps that are not possible with the original digital map and database. This Open-file Report consists of computer files with information about intrusive rocks in Utah that can be linked to the Digital Geologic Map of Utah (Hintze et al., 2000), an explanation of how to link the databases and map, and a list of references for the databases. The digital map, which represents the 1:500,000-scale Geologic Map of Utah (Hintze, 1980), can be obtained from the Utah Geological Survey (Map 179DM). Each polygon in the map has a unique identification number. We selected the polygons identified on the geologic map as intrusive rock, and constructed a database (UT_PLUT.xls) that classifies the polygons into plutonic map units (see tables). These plutonic map units are the key information that is used to relate the compiled information to the polygons on the map. The map includes a few polygons that were coded as intrusive on the state map but are largely volcanic rock; in these cases we note the volcanic rock names (rhyolite and latite) as used in the original sources Some polygons identified on the digital state map as intrusive rock were misidentified; these polygons are noted in a separate table of the database, along with some information about their true character. Fields may be empty because of lack of information from references used or difficulty in finding

  14. Bilingual language intrusions and other speech errors in Alzheimer's disease.

    PubMed

    Gollan, Tamar H; Stasenko, Alena; Li, Chuchu; Salmon, David P

    2017-11-01

    The current study investigated how Alzheimer's disease (AD) affects production of speech errors in reading-aloud. Twelve Spanish-English bilinguals with AD and 19 matched controls read-aloud 8 paragraphs in four conditions (a) English-only, (b) Spanish-only, (c) English-mixed (mostly English with 6 Spanish words), and (d) Spanish-mixed (mostly Spanish with 6 English words). Reading elicited language intrusions (e.g., saying la instead of the), and several types of within-language errors (e.g., saying their instead of the). Patients produced more intrusions (and self-corrected less often) than controls, particularly when reading non-dominant language paragraphs with switches into the dominant language. Patients also produced more within-language errors than controls, but differences between groups for these were not consistently larger with dominant versus non-dominant language targets. These results illustrate the potential utility of speech errors for diagnosis of AD, suggest a variety of linguistic and executive control impairments in AD, and reveal multiple cognitive mechanisms needed to mix languages fluently. The observed pattern of deficits, and unique sensitivity of intrusions to AD in bilinguals, suggests intact ability to select a default language with contextual support, to rapidly translate and switch languages in production of connected speech, but impaired ability to monitor language membership while regulating inhibitory control. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    NASA Astrophysics Data System (ADS)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  16. Poly- Versus Mono-Energetic Dual-Spectrum Non-Intrusive Inspection of Cargo Containers

    NASA Astrophysics Data System (ADS)

    Martz, Harry E.; Glenn, Steven M.; Smith, Jerel A.; Divin, Charles J.; Azevedo, Stephen G.

    2017-07-01

    In this paper, based on an invited talk at SORMA (May 2016), we present an overview of x-ray sources, detectors and system configurations for non-intrusive inspection (NII) of cargo containers. Our emphasis is on dual-energy x-ray NII for detecting high-atomic-number (Z ≥ 72) materials such as tungsten shielding and special nuclear materials (SNM). Standard single-energy (MeV and above) x-rays needed to penetrate and image cargo provide little SNM contrast, whereas dual-energy x-ray NII is demonstrated as a way to improve the selectivity of materials with Z<;72 vs. those with Z ≥ 72. For two possible dual-energy x-ray source technologies - polyenergetic dual-energy (PDE) and quasi-monoenergetic x-ray sources (QMXS) - we investigate their trade-offs and future prospects using experimental and simulated results. The reduced scatter and larger separation of low- and high-energy photons provided by QMXS offers improved high-Z material contrast, but practical considerations such as flux and pulse rate need to be solved before making a deployable system. Straight-ray simulations show factor of four increases in contrast for QMXS over PDE scans of tin (Z=50) and iron (Z=26) relative to a uranium plate (Z=92) behind 20 cm of iron simulated cargo.

  17. Non-intrusive tunable resonant microwave cavity for optical detected magnetic resonance of NV centres in nanodiamonds

    NASA Astrophysics Data System (ADS)

    Le Floch, Jean-Michel; Bradac, Carlo; Volz, Thomas; Tobar, Michael E.; Castelletto, Stefania

    2013-12-01

    Optically detected magnetic resonance (ODMR) in nanodiamond nitrogen-vacancy (NV) centres is usually achieved by applying a microwave field delivered by micron-size wires, strips or antennas directly positioned in very close proximity (~ μm) of the nanodiamond crystals. The microwave field couples evanescently with the ground state spin transition of the NV centre (2.87 GHz at zero magnetic field), which results in a reduction of the centre photoluminescence. We propose an alternative approach based on the construction of a dielectric resonator. We show that such a resonator allows for the efficient detection of NV spins in nanodiamonds without the constraints associated to the laborious positioning of the microwave antenna next to the nanodiamonds, providing therefore improved flexibility. The resonator is based on a tunable Transverse Electric Mode in a dielectric-loaded cavity, and we demonstrate that the resonator can detect single NV centre spins in nanodiamonds using less microwave power than alternative techniques in a non-intrusive manner. This method can achieve higher precision measurement of ODMR of paramagnetic defects spin transition in the micro to millimetre-wave frequency domain. Our approach would permit the tracking of NV centres in biological solutions rather than simply on the surface, which is desirable in light of the recently proposed applications of using nanodiamonds containing NV centres for spin labelling in biological systems with single spin and single particle resolution.

  18. Intrusion Detection in Database Systems

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Sohrabi, Mina; Rafsanjani, Marjan Kuchaki

    Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated.

  19. Saltwater intrusion monitoring in Florida

    USGS Publications Warehouse

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  20. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid

    PubMed Central

    Li, Yuancheng; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can’t satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy. PMID:29485990

  1. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

    PubMed

    Li, Yuancheng; Qiu, Rixuan; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  2. Quasi-horizontal circulation cells in 3D seawater intrusion

    USGS Publications Warehouse

    Abarca, E.; Carrera, J.; Sanchez-Vila, X.; Voss, C.I.

    2007-01-01

    The seawater intrusion process is characterized by the difference in freshwater and seawater density that causes freshwater to float on seawater. Many confined aquifers have a large horizontal extension with respect to thickness. In these cases, while buoyancy acts in the vertical direction, flow is confined between the upper and bottom boundaries and the effect of gravity is controlled by variations of aquifer elevation. Therefore, the effective gravity is controlled by the slope and the shape of the aquifer boundaries. Variability in the topography of the aquifer boundaries is one case where 3D analysis is necessary. In this work, density-dependent flow processes caused by 3D aquifer geometry are studied numerically and specifically, considering a lateral slope of the aquifer boundaries. Sub-horizontal circulation cells are formed in the saltwater entering the aquifer. The penetration of the saltwater can be quantified by a dimensionless buoyancy number that measures the lateral slope of the aquifer relative to freshwater flux. The penetration of the seawater intrusion wedge is controlled more by this slope than by the aquifer thickness and dispersivity. Thus, the slope must be taken into account in order to accurately evaluate seawater intrusion. ?? 2007 Elsevier B.V. All rights reserved.

  3. Forced-folding by laccolith and saucer-shaped sill intrusions on the Earth, planets and icy satellites

    NASA Astrophysics Data System (ADS)

    Michaut, Chloé

    2017-04-01

    Horizontal intrusions probably initially start as cracks, with negligible surface deformation. Once their horizontal extents become large enough compared to their depths, they make room for themselves by lifting up their overlying roofs, creating characteristic surface deformations that can be observed at the surface of planets. We present a model where magma flows below a thin elastic overlying layer characterized by a flexural wavelength Λ and study the dynamics and morphology of such a magmatic intrusion. Our results show that, depending on its size, the intrusion present different shapes and thickness-to-radius relationships. During a first phase, elastic bending of the overlying layer is the main source of driving pressure in the flow; the pressure decreases as the flow radius increases, the intrusion is bell-shaped and its thickness is close to being proportional to its radius. When the intrusion radius becomes larger than 4 times Λ, the flow enters a gravity current regime and progressively develops a pancake shape with a flat top. We study the effect of topography on flow spreading in particular in the case where the flow is constrained by a lithostatic barrier within a depression, such as an impact crater on planets or a caldera on Earth. We show that the resulting shape for the flow depends on the ratio between the flexural wavelength of the layer overlying the intrusion and the depression radius. The model is tested against terrestrial data and is shown to well explain the size and morphology of laccoliths and saucer-shaped sills on Earth. We use our results to detect and characterize shallow solidified magma reservoirs in the crust of terrestrial planets and potential shallow water reservoirs in the ice shell of icy satellites.

  4. Layered intrusions of the Duluth Complex, Minnesota, USA

    USGS Publications Warehouse

    Miller, J.D.; Ripley, E.M.; ,

    1996-01-01

    The Duluth Complex and associated subvolcanic intrusions comprise a large (5000 km2) intrusive complex in northeastern Minnesota that was emplaced into comagmatic volcanics during the development of the 1.1 Ga Midcontinent rift in North America. In addition to anorthositic and felsic intrusions, the Duluth Complex is composed of many individual mafic layered intrusions of tholeiitic affinity. The cumulate stratigraphies and cryptic variations of six of the better exposed and better studied intrusions are described here to demonstrate the variability in their cumulus mineral paragenesis.

  5. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    PubMed Central

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  6. Physical parameters of Fluvisols on flooded and non-flooded terraces

    NASA Astrophysics Data System (ADS)

    Kercheva, Milena; Sokołowska, Zofia; Hajnos, Mieczysław; Skic, Kamil; Shishkov, Toma

    2017-01-01

    The heterogeneity of soil physical properties of Fluvisols, lack of large pristine areas, and different moisture regimes on non-flooded and flooded terraces impede the possibility to find a soil profile which can serve as a baseline for estimating the impact of natural or anthropogenic factors on soil evolution. The aim of this study is to compare the pore size distribution of pristine Fluvisols on flooded and non-flooded terraces using the method of the soil water retention curve, mercury intrusion porosimetry, nitrogen adsorption isotherms, and water vapour sorption. The pore size distribution of humic horizons of pristine Fluvisols on the non-flooded terrace differs from pore size distribution of Fluvisols on the flooded terrace. The peaks of textural and structural pores are higher in the humic horizons under more humid conditions. The structural characteristics of subsoil horizons depend on soil texture and evolution stage. The peaks of textural pores at about 1 mm diminish with lowering of the soil organic content. Structureless horizons are characterized by uni-modal pore size distribution. Although the content of structural pores of the subsoil horizons of Fluvisols on the non-flooded terrace is low, these pores are represented by biopores, as the coefficient of filtration is moderately high. The difference between non-flooded and flooded profiles is well expressed by the available water storage, volume and mean radius of pores, obtained by mercury intrusion porosimetry and water desorption, which are higher in the surface horizons of frequently flooded Fluvisols.

  7. The Experiences and Challenges in Drilling into Semi molten or Molten Intrusive in Menengai Geothermal Field

    NASA Astrophysics Data System (ADS)

    Mortensen, A. K.; Mibei, G. K.

    2017-12-01

    Drilling in Menengai has experienced various challenges related to drilling operations and the resource itself i.e. quality discharge fluids vis a vis gas content. The main reason for these challenges is related to the nature of rocks encountered at depths. Intrusives encountered within Menengai geothermal field have been group into three based on their geological characteristics i.e. S1, S2 and S3.Detailed geology and mineralogical characterization have not been done on these intrusive types. However, based on physical appearances, S1 is considered as a diorite dike, S2 is syenite while S3 is molten rock material. This paper summarizes the experiences in drilling into semi molten or molten intrusive (S3).

  8. Contextualising Water Use in Residential Settings: A Survey of Non-Intrusive Techniques and Approaches

    PubMed Central

    Carboni, Davide; Gluhak, Alex; McCann, Julie A.; Beach, Thomas H.

    2016-01-01

    Water monitoring in households is important to ensure the sustainability of fresh water reserves on our planet. It provides stakeholders with the statistics required to formulate optimal strategies in residential water management. However, this should not be prohibitive and appliance-level water monitoring cannot practically be achieved by deploying sensors on every faucet or water-consuming device of interest due to the higher hardware costs and complexity, not to mention the risk of accidental leakages that can derive from the extra plumbing needed. Machine learning and data mining techniques are promising techniques to analyse monitored data to obtain non-intrusive water usage disaggregation. This is because they can discern water usage from the aggregated data acquired from a single point of observation. This paper provides an overview of water usage disaggregation systems and related techniques adopted for water event classification. The state-of-the art of algorithms and testbeds used for fixture recognition are reviewed and a discussion on the prominent challenges and future research are also included. PMID:27213397

  9. The petrogenesis of late Neoproterozoic mafic dyke-like intrusion in south Sinai, Egypt

    NASA Astrophysics Data System (ADS)

    Azer, M. K.; Abu El-Ela, F. F.; Ren, M.

    2012-08-01

    New field, petrographical and geochemical studies are presented here for the late Neoproterozoic Rimm intrusion (˜15 km long) exposed in the southern Sinai Peninsula, Egypt in the northernmost Arabian-Nubian Shield (ANS). Field relations indicate that the Rimm intrusion is younger than the surrounding metamorphic rocks and calc-alkaline syn-tectonic granodiorite and it was not affected by regional metamorphism. The anorogenic peralkaline granite of Gebel Serbal crosscuts the Rimm intrusion. The Rimm intrusion is made up of several consanguineous rock types with gradational contacts. It is composed chiefly of pyroxene-hornblende gabbro, hornblende gabbro and minor quartz diorite. The chemical composition of the mafic minerals indicated that the studied rocks derived from calc-alkaline mafic magma. Geochemically, the studied rocks are characterized by enrichment in LILE relative to HFSE and LREE relative to HREE [(Ce/Yb)N = 4.50-6.36]. Quartz diorite display slightly concave HREE pattern and slightly negative Eu-anomaly [(Eu/Eu*)n = 0.91] which may be the result of fractionation of amphibole and plagioclase from the source melt, respectively. The Rimm intrusion evolved from mafic mantle magma into different type rocks by fractional crystallization with minor crustal contamination. The initial magma corresponds to pyroxene-hornblende gabbro and the crystallization of hornblende was caused by slight H2O increase in magma after crystallization of near-liquidus clinopyroxene and Ca-rich plagioclase. Amphiboles geobarometer indicate that the gabbroic rocks of the Rimm intrusion crystallized at pressures between 4.8 and 6.4 Kb, while quartz diorite crystallized at 1.3-2.1 Kb. Crystallization temperatures range between 800 and 926 °C for the gabbros and between 667 and 784 °C for the quartz diorite. The Rimm intrusion represents a post-orogenic phase formed during the crustal thinning and extension of the Arabian-Nubian Shield.

  10. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features.

    PubMed

    Amudha, P; Karthik, S; Sivakumari, S

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different.

  11. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    PubMed Central

    Amudha, P.; Karthik, S.; Sivakumari, S.

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  12. IMPROVED RISK CHARACTERIZATION METHODS FOR DEVELOPING AQUATIC LIFE CRITERIA FOR NON-BIOACCUMULATIVE TOXICANTS

    EPA Science Inventory

    This project will use existing and developing information to evaluate and demonstrate procedures for more fully characterizing risks of non-bioaccumulative toxicants to aquatic organisms, and for incorporating these risks into aquatic life criteria. These efforts will address a v...

  13. Evaluating sensitivity of complex electrical methods for monitoring CO2 intrusion into a shallow groundwater system and associated geochemical transformations

    NASA Astrophysics Data System (ADS)

    Dafflon, B.; Wu, Y.; Hubbard, S. S.; Birkholzer, J. T.; Daley, T. M.; Pugh, J. D.; Peterson, J.; Trautz, R. C.

    2011-12-01

    A risk factor of CO2 storage in deep geological formations includes its potential to leak into shallow formations and impact groundwater geochemistry and quality. In particular, CO2 decreases groundwater pH, which can potentially mobilize naturally occurring trace metals and ions commonly absorbed to or contained in sediments. Here, geophysical studies (primarily complex electrical method) are being carried out at both laboratory and field scales to evaluate the sensitivity of geophysical methods for monitoring dissolved CO2 distribution and geochemical transformations that may impact water quality. Our research is performed in association with a field test that is exploring the effects of dissolved CO2 intrusion on groundwater geochemistry. Laboratory experiments using site sediments (silica sand and some fraction of clay minerals) and groundwater were initially conducted under field relevant CO2 partial pressures (pCO2). A significant pH drop was observed with inline sensors with concurrent changes in fluid conductivity caused by CO2 dissolution. Electrical resistivity and electrical phase responses correlated well with the CO2 dissolution process at various pCO2. Specifically, resistivity decreased initially at low pCO2 condition resulting from CO2 dissolution followed by a slight rebound because of the transition of bicarbonate into non-dissociated carbonic acid at lower pH slightly reducing the total concentration of dissociated species. Continuous electrical phase decreases were also observed, which are interpreted to be driven by the decrease of surface charge density (due to the decrease of pH, which approaches the PZC of the sediments). In general, laboratory experiments revealed the sensitivity of electrical signals to CO2 intrusion into groundwater formations and can be used to guide field data interpretation. Cross well complex electrical data are currently being collected periodically throughout a field experiment involving the controlled release of

  14. From intrusive to oscillating thoughts.

    PubMed

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  15. Vapor Intrusion

    EPA Pesticide Factsheets

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  16. The contribution of thought-action fusion and thought suppression in the development of obsession-like intrusions in normal participants.

    PubMed

    Rassin, E

    2001-09-01

    Both thought-action fusion (TAF: i.e., a cognitive bias implying an inflated sense of responsibility for one's own thoughts) and thought suppression have been claimed to contribute to the development of obsession-like intrusions. Therefore, it seems plausible that conjunction of these phenomena results in highly intense intrusions. However, possible interactions between TAF and thought suppression have not yet been investigated experimentally. In the current study, healthy volunteers were exposed to a TAF-like intrusion. They were, then, randomly assigned to a suppression (n=21) or non-suppression condition (n=19). Next, visual analogue scales (VASs) were completed measuring anxiety, feelings of responsibility and guilt, urge to neutralise and so on. Contrary to expectation, several VAS scores were lower for participants in the suppression group than for those in the non-suppression group. Hence, it is concluded that thought suppression may, at least in the short term, alleviate discomfort caused by TAF-like intrusions.

  17. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    NASA Astrophysics Data System (ADS)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  18. Individual differences in experiencing intrusive memories: the role of the ability to resist proactive interference.

    PubMed

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J

    2009-06-01

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N=91) completed a self-report measure of intrusive memories, and carried out experimental tasks intended to measure two different types of inhibition: resistance to proactive interference and response inhibition (i.e., the ability to prevent automatically triggered responses). The results showed a significant relationship between inhibition at the cognitive level (i.e., resistance to proactive interference) and the frequency of intrusive memories (especially in the group of female participants) whereas no such relationship with measures of response inhibition emerged. These findings are consistent with the idea that deficient inhibitory control reflects a vulnerability factor for experiencing intrusive memories. Implications for research investigating risk factors for the development of posttraumatic stress disorder (PTSD) are discussed.

  19. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  20. Isotopic data for Late Cretaceous intrusions and associated altered and mineralized rocks in the Big Belt Mountains, Montana

    USGS Publications Warehouse

    du Bray, Edward A.; Unruh, Daniel M.; Hofstra, Albert H.

    2017-03-07

    The quartz monzodiorite of Mount Edith and the concentrically zoned intrusive suite of Boulder Baldy constitute the principal Late Cretaceous igneous intrusions hosted by Mesoproterozoic sedimentary rocks of the Newland Formation in the Big Belt Mountains, Montana. These calc-alkaline plutonic masses are manifestations of subduction-related magmatism that prevailed along the western edge of North America during the Cretaceous. Radiogenic isotope data for neodymium, strontium, and lead indicate that the petrogenesis of the associated magmas involved a combination of (1) sources that were compositionally heterogeneous at the scale of the geographically restricted intrusive rocks in the Big Belt Mountains and (2) variable contamination by crustal assimilants also having diverse isotopic compositions. Altered and mineralized rocks temporally, spatially, and genetically related to these intrusions manifest at least two isotopically distinct mineralizing events, both of which involve major inputs from spatially associated Late Cretaceous igneous rocks. Alteration and mineralization of rock associated with the intrusive suite of Boulder Baldy requires a component characterized by significantly more radiogenic strontium than that characteristic of the associated igneous rocks. However, the source of such a component was not identified in the Big Belt Mountains. Similarly, altered and mineralized rocks associated with the quartz monzodiorite of Mount Edith include a component characterized by significantly more radiogenic strontium and lead, particularly as defined by 207Pb/204Pb values. The source of this component appears to be fluids that equilibrated with proximal Newland Formation rocks. Oxygen isotope data for rocks of the intrusive suite of Boulder Baldy are similar to those of subduction-related magmatism that include mantle-derived components; oxygen isotope data for altered and mineralized equivalents are slightly lighter.

  1. A system for distributed intrusion detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snapp, S.R.; Brentano, J.; Dias, G.V.

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of ourmore » present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.« less

  2. Volcanic tremor and frequency gliding during dike intrusions at Kı¯lauea—A tale of three eruptions

    NASA Astrophysics Data System (ADS)

    Unglert, K.; Jellinek, A. M.

    2015-02-01

    To characterize syneruptive/intrusive deviations from background volcanic tremor at Kı¯lauea, Hawai`i, we analyze the spatial and temporal properties of broadband tremor during dike intrusions into the East Rift Zone (ERZ) in 2007 and 2011, as well as during explosive eruptive activity at Kı¯lauea's summit in 2008. Background tremor was similar for each event, and the 2008 explosions did not affect its properties. In contrast, the intrusions were accompanied by departures from this background in the form of two phases of seismicity that were separated in space and time. In both 2007 and 2011, Phase I was characterized by a quick succession of discrete events, which were most intense at the onset of intrusion near the presumed locations of the dikes intruding into the ERZ. Phase II, marked by continuous broadband tremor around the summit, followed 10-14 h later. In 2007, Phase II tremor was accompanied by a monotonic downward shift (glide) of spectral peaks between ˜0.6 and 1.5 Hz over at least 15 h. During Phase II in 2011, a gradual upward and subsequent symmetric downward glide between ˜0.6 and 6.6 Hz occurred over 5-10 h, respectively. The spectra during both phases differed from the background and 2008, as well as from each other, indicating different physical mechanisms. Phase I in 2007 and 2011 is probably related to the mechanics of dike intrusion. Phase II tremor may be characteristic for evolving magma-bubble dynamics related to the geometry of the plumbing system and the style of magma flow.

  3. Repeated magmatic intrusions at El Hierro Island following the 2011-2012 submarine eruption

    NASA Astrophysics Data System (ADS)

    Benito-Saz, Maria A.; Parks, Michelle M.; Sigmundsson, Freysteinn; Hooper, Andrew; García-Cañada, Laura

    2017-09-01

    After more than 200 years of quiescence, in July 2011 an intense seismic swarm was detected beneath the center of El Hierro Island (Canary Islands), culminating on 10 October 2011 in a submarine eruption, 2 km off the southern coast. Although the eruption officially ended on 5 March 2012, magmatic activity continued in the area. From June 2012 to March 2014, six earthquake swarms, indicative of magmatic intrusions, were detected underneath the island. We have studied these post-eruption intrusive events using GPS and InSAR techniques to characterize the ground surface deformation produced by each of these intrusions, and to determine the optimal source parameters (geometry, location, depth, volume change). Source inversions provide insight into the depth of the intrusions ( 11-16 km) and the volume change associated with each of them (between 0.02 and 0.13 km3). During this period, > 20 cm of uplift was detected in the central-western part of the island, corresponding to approximately 0.32-0.38 km3 of magma intruded beneath the volcano. We suggest that these intrusions result from deep magma migrating from the mantle, trapped at the mantle/lower crust discontinuity in the form of sill-like bodies. This study, using joint inversion of GPS and InSAR data in a post-eruption period, provides important insight into the characteristics of the magmatic plumbing system of El Hierro, an oceanic intraplate volcanic island.

  4. Assessment of TDEM data sensitivity to changes in geoelectric structure as a result of saltwater intrusion

    NASA Astrophysics Data System (ADS)

    Nenna, V.; Knight, R. J.

    2011-12-01

    Pressure from increasing population as well as agricultural and industrial use of freshwater coastal aquifers makes these groundwater resources increasingly vulnerable to saltwater intrusion. Effective management strategies are required to protect these aquifers from overuse and salination. However, development and implementation of these strategies is often complicated by limited information about the complex hydrogeologic structures, properties and processes that govern groundwater flow and saltwater intrusion. To justify the cost of acquiring additional information, water managers need to demonstrate that the value of the acquired information, in terms of the ability to make a decision, exceeds the cost. Traditional hydrologic measurements from wells can give accurate information on hydrogeologic properties, but they are costly and spatially limited. In this study, we propose the use of time-domain electromagnetic (TDEM) methods as a non-invasive alternative to traditional hydrologic measurements for characterizing saltwater intrusion in an unconfined aquifer in Northern California. The aquifer system in this region consists of the unconfined aquifer and an underlying confined freshwater aquifer, which are separated by a clay layer. At our research site, the water in the unconfined aquifer is saline in places, but the underlying, confined aquifer shows no evidence of saltwater intrusion. Water managers require information about the hydraulic connectivity of these two aquifers, as well as the extent of saltwater intrusion in the unconfined aquifer to mitigate the potential for saltwater intrusion into the confined freshwater aquifer. Prior to October 2007, four monitoring wells were drilled approximately 100 m inland from the coast and spanning roughly 300 m from south to north. Wells were drilled to depths between 280 m and 460 m. During construction, lithology information and drilling samples were collected on 1.5 m intervals. Induction logs were also collected

  5. Assessment of Mitigation Systems on Vapor Intrusion: Temporal Trends, Attenuation Factors, and Contaminant Migration Routes under Mitigated and Non-mitigated Conditions

    EPA Science Inventory

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor ...

  6. A new physical barrier system for seawater intrusion control

    NASA Astrophysics Data System (ADS)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  7. Technical Guide For Addressing Petroleum Vapor Intrusion At Leaking Underground Storage Tank Sites

    EPA Pesticide Factsheets

    This document is intended for use at any site subject to petroleum contamination from underground storage tanks where vapor intrusion may be of potential concern. It is applicable to both residential and non-residential settings.

  8. Water Intrusion Problems in Transit Tunnels

    DOT National Transportation Integrated Search

    1986-05-01

    This report presents the findings of five case studies in which an in-depth analysis was made of tunnel water intrusion problems in transit tunnels. Water intrusion parameters of transit systems in Atlanta, Boston, Buffalo, New York and Washington, D...

  9. Efficacy of Eye Movement Desensitization in the treatment of cognitive intrusions related to a past stressful event.

    PubMed

    Lytle, Richard A; Hazlett-Stevens, Holly; Borkovec, T D

    2002-01-01

    Much of the Eye Movement Desensitization and Reprocessing (EMDR) efficacy research has been widely criticized, limiting scientific understanding of its therapeutic components. The present investigation of Eye Movement Desensitization (EMD) effectiveness included undergraduate students reporting current intrusive cognitions conceming a traumatic event. Forty-five participants received a single treatment session of either: (a) EMD, as described by Shapiro [J. Behav. Ther. Exp. Psychiatry 20 (1989b) 211], (b) an identical procedure which employed eye fixation on a stationary target, or (c) non-directive counseling. Standardized self-report, subjective rating, Daily Diary, and intrusive thought sampling measures were collected before and after treatment. Results indicated that participants in the eye fixation group reported marginally (p < .052) fewer cognitive intrusions than the non-directive group 1 week following treatment. No significant differences between the EMD and non-directive conditions or between the EMD and eye fixation conditions on this measure were found. During the treatment session, both desensitization groups were superior to the non-directive group in reducing reported vividness of the mental image of the original event. However, the non-directive group improved to the level of the two other groups by the following week. Rapid saccadic eye movements were therefore unrelated to immediate treatment effects for this sub-clinical sample, and non-directive treatment largely yielded eventual outcomes equivalent to the two desensitization conditions.

  10. Rapid laccolith intrusion driven by explosive volcanic eruption

    NASA Astrophysics Data System (ADS)

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-11-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ~0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ~20-200 m and overpressures (~1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  11. Rapid laccolith intrusion driven by explosive volcanic eruption.

    PubMed

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  12. Use of behavioral biometrics in intrusion detection and online gaming

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  13. Non-Invasive Methods to Characterize Soil-Plant Interactions at Different Scales

    NASA Astrophysics Data System (ADS)

    Javaux, M.; Kemna, A.; Muench, M.; Oberdoerster, C.; Pohlmeier, A.; Vanderborght, J.; Vereecken, H.

    2006-05-01

    Root water uptake is a dynamic and non-linear process, which interacts with the soil natural variability and boundary conditions to generate heterogeneous spatial distributions of soil water. Soil-root fluxes are spatially variable due to heterogeneous gradients and hydraulic connections between soil and roots. While 1-D effective representation of the root water uptake has been successfully applied to predict transpiration and average water content profiles, finer spatial characterization of the water distribution may be needed when dealing with solute transport. Indeed, root water uptake affects the water velocity field, which has an effect on solute velocity and dispersion. Although this variability originates from small-scale processes, these may still play an important role at larger scales. Therefore, in addition to investigate the variability of the soil hydraulic properties, experimental and numerical tools for characterizing root water uptake (and its effects on soil water distribution) from the pore to the field scales are needed to predict in a proper way the solute transport. Obviously, non-invasive and modeling techniques which are helpful to achieve this objective will evolve with the scale of interest. At the pore scale, soil structure and root-soil interface phenomena have to be investigated to understand the interactions between soil and roots. Magnetic resonance imaging may help to monitor water gradients and water content changes around roots while spectral induced polarization techniques may be used to characterize the structure of the pore space. At the column scale, complete root architecture of small plants and water content depletion around roots can be imaged by magnetic resonance. At that scale, models should explicitly take into account the three-dimensional gradient dependency of the root water uptake, to be able to predict solute transport. At larger scales however, simplified models, which implicitly take into account the heterogeneous

  14. Virtual substrate method for nanomaterials characterization

    PubMed Central

    Da, Bo; Liu, Jiangwei; Yamamoto, Mahito; Ueda, Yoshihiro; Watanabe, Kazuyuki; Cuong, Nguyen Thanh; Li, Songlin; Tsukagoshi, Kazuhito; Yoshikawa, Hideki; Iwai, Hideo; Tanuma, Shigeo; Guo, Hongxuan; Gao, Zhaoshun; Sun, Xia; Ding, Zejun

    2017-01-01

    Characterization techniques available for bulk or thin-film solid-state materials have been extended to substrate-supported nanomaterials, but generally non-quantitatively. This is because the nanomaterial signals are inevitably buried in the signals from the underlying substrate in common reflection-configuration techniques. Here, we propose a virtual substrate method, inspired by the four-point probe technique for resistance measurement as well as the chop-nod method in infrared astronomy, to characterize nanomaterials without the influence of underlying substrate signals from four interrelated measurements. By implementing this method in secondary electron (SE) microscopy, a SE spectrum (white electrons) associated with the reflectivity difference between two different substrates can be tracked and controlled. The SE spectrum is used to quantitatively investigate the covering nanomaterial based on subtle changes in the transmission of the nanomaterial with high efficiency rivalling that of conventional core-level electrons. The virtual substrate method represents a benchmark for surface analysis to provide ‘free-standing' information about supported nanomaterials. PMID:28548114

  15. Petrogenesis of ore-bearing porphyry in non-subduction setting: a case study of the Eocene potassic intrusions in the western Yangtze Block

    NASA Astrophysics Data System (ADS)

    Liu, Zheng; Liao, Shi-Yong; Zhou, Qing; Zhang, Xin

    2018-05-01

    In the western Yangtze Block, abundant Eocene ( 38-34 Ma) potassic adakite-like intrusions and associated porphyry copper deposits are exposed in non-subduction setting, including Machangjing, Beiya, Binchuan, Habo and Tongchang intrusions. All these ore-bearing porphyries share many geochemical characteristics of adakite such as depletion in heavy rare earth elements (HREEs), enrichment in Sr and Ba, absence of negative Eu anomalies, high SiO2, Al2O3, Sr/Y, La/Yb and low Y, Yb contents. They also exhibit affinities of potassic rocks, e.g., alkali-rich, high K2O/Na2O ratios and enrichment in light rare earth elements (LREEs) and large ion lithophile elements (LILEs). Their Sr-Nd isotopic ratios are similar to coeval shoshonitic lamprophyres. Geochemical data indicate that they were probably produced by partial melting of newly underplated potassic rocks sourced from a modified and enriched lithospheric mantle. These underplated rocks have elevated oxygen fugacity, water and copper contents, with high metallogenic potential. We propose that all the studied potassic rocks were emplaced in a post-collisional setting, associated with the local removal of lithospheric mantle.

  16. Young women's experiences of intrusive behavior in 12 countries.

    PubMed

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  17. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  18. An automatically tuning intrusion detection system.

    PubMed

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  19. Negative Intrusive Thoughts and Dissociation as Risk Factors for Self-Harm

    ERIC Educational Resources Information Center

    Batey, Helen; May, Jon; Andrade, Jackie

    2010-01-01

    Relationships between self-harm and vulnerability factors were studied in a general population of 432 participants, of whom 30% reported some experience of self-harm. This group scored higher on dissociation and childhood trauma, had lower self-worth, and reported more negative intrusive thoughts. Among the non-harming group, 10% scored similarly…

  20. Rapid laccolith intrusion driven by explosive volcanic eruption

    PubMed Central

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-01-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ∼20–200 m and overpressures (∼1–10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards. PMID:27876800

  1. Quantitation by Portable Gas Chromatography: Mass Spectrometry of VOCs Associated with Vapor Intrusion

    PubMed Central

    Fair, Justin D.; Bailey, William F.; Felty, Robert A.; Gifford, Amy E.; Shultes, Benjamin; Volles, Leslie H.

    2010-01-01

    Development of a robust reliable technique that permits for the rapid quantitation of volatile organic chemicals is an important first step to remediation associated with vapor intrusion. This paper describes the development of an analytical method that allows for the rapid and precise identification and quantitation of halogenated and nonhalogenated contaminants commonly found within the ppbv level at sites where vapor intrusion is a concern. PMID:20885969

  2. Volumetric Measurement of Root Resorption following Molar Mini-Screw Implant Intrusion Using Cone Beam Computed Tomography

    PubMed Central

    Li, Wen; Chen, Fei; Zhang, Feng; Ding, Wanghui; Ye, Qingsong; Shi, Jiejun; Fu, Baiping

    2013-01-01

    Objective Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. Materials and Methods 1. The volumes of 32 teeth were measured using CBCT and laser scanning to verify the accuracy of CBCT. 2. Twelve overerupted molars from adult patients were investigated in this study. After mini-screw implants were inserted into the buccal and palatal alveolar bones, 150 g of force was applied to the mini-screw implants on each side to intrude the molars. CBCT images of all patients were taken immediately prior to intrusion and after intrusion. The volumes of the roots were calculated using the Mimics software program. The differences between the pre-intrusion and post-intrusion root volumes were statistically evaluated with a paired-samples t-test. In addition, the losses of the roots were statistically compared with each other using one-way analysis of variance at the P<0.05 level. Results No statistically significant volume differences were observed between the physical (laser scanning) and CBCT measurements (P>0.05). The overerupted molars were significantly intruded (P<0.05), and the average intrusion was 3.30±1.60 mm. The differences between the pre-intrusion and post-intrusion root volumes were statistically significant for all of the roots investigated (P<0.05). The roots were sorted by volume loss in descending order as follows: mesiobuccal, palatal, and distobuccal. Statistical significance was achieved among the three roots. The average total resorption for each tooth was 58.39±1.54 mm3. Conclusion Volume measurement using CBCT was able to effectively evaluate root resorption caused by mini-screw intrusion. The highest volume loss was observed

  3. Overview of USEPA's ORD Technical Outreach and Support Activities on Vapor Intrusion Impacts - 03/2008

    EPA Science Inventory

    The science of determining, characterizing and managing vapor intrusion risks is constantly evolving. Much remains to be done in assisting regulators, consultants and other decision-makers to make informed decisions in mitigating the problem and reducing these risks. ORD has been...

  4. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    PubMed Central

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field with scanning electron microscopy coupled to energy dispersive X-ray spectroscopy, chromatographic and spectrophotometric methods, and stable isotope tracing coupled with a mass balance of sulfur compounds. We found that Z. marina detoxified gaseous sediment-derived sulfide through incorporation and that most of the detoxification occurred in underground tissues, where sulfide intrusion was greatest. Elemental sulfur was a major detoxification compound, precipitating on the inner wall of the aerenchyma of underground tissues. Sulfide was metabolized into thiols and entered the plant sulfur metabolism as well as being stored as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments. PMID:26030258

  5. Intrusive Memories of Distressing Information: An fMRI Study

    PubMed Central

    Battaglini, Eva; Liddell, Belinda; Das, Pritha; Malhi, Gin; Felmingham, Kim

    2016-01-01

    Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI) to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42) viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13) demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13). Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC) and dorsolateral prefrontal cortex (dlPFC), inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories. PMID:27685784

  6. The effects of an anchovy (stolephorus insularis) substrate application on the level of fluor intrusion on Sprague Dawley rat teeth (in vivo)

    NASA Astrophysics Data System (ADS)

    Sakinah, N. R.; Gunawan, H. A.; Puspitawati, R.

    2017-08-01

    Fluoride intrusion is one of the efficacy parameters of fluoridation. Anchovy (Stolephorus insularis), which contains a high fluoride concentration in the CaF2compound, can be used as a fluoridative agent which is affordable and easily obtained. The aim of this study is to prove the effectiveness of the application of an anchovy substrate (Stolephorus insularis), either by a feeding method or a topical method, for tooth fluoridation based on the depth of fluoride intrusion on the enamel. An in vivo experimental laboratory method was used. The subjects were 14 Sprague Dawley rats divided into five groups. The groups included a baseline control, a feeding negative control, a topical negative control, an anchovy feeding method, and a topical solution anchovy method. After 15 days of treatment, the teeth were cut transversely with a 0.5 mm thickness then processed to test for fluoride intrusion using fluorescence microscopy. There was increased fluor intrusion on the enamel of the experimental groups compared to the negative control groups (p<0.05).Fluoride intrusion using the topical fluoride method is higher than with the feeding method (p <0.05). Thus, the application of an anchovy substrate, either by chewing or smearing, increases fluoride intrusion on the enamel.

  7. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.

    PubMed

    Ganapathy, S; Yogesh, P; Kannan, A

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  8. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    PubMed Central

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  9. Application of Time-Domain Electromagnetic Method in Investigating Saltwater Intrusion of Santiago Island (Cape Verde)

    NASA Astrophysics Data System (ADS)

    Gonçalves, Rui; Farzamian, Mohammad; Monteiro Santos, Fernando A.; Represas, Patrícia; Mota Gomes, A.; Lobo de Pina, A. F.; Almeida, Eugénio P.

    2017-11-01

    Santiago Island, the biggest and most populated island of the Cape Verde Republic, is characterised by limited surface waters and strong dependence on groundwater sources as the primary source of natural water supply for extensive agricultural activity and human use. However, as a consequence of the scarce precipitation and high evaporation as well as the intense overexploitation of the groundwater resources, the freshwater management is also in a delicate balance with saltwater at coastal areas. The time-domain electromagnetic (TDEM) method is used to locate the extent of saltwater intrusion in four important agricultural regions in Santiago Island; São Domingos, Santa Cruz, São Miguel, and Tarrafal. The application of this method in Santiago Island proves it to be a successful tool in imaging the fresh/saltwater interface location. Depths to the saline zones and extensions of saline water are mapped along eight TDEM profiles.

  10. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability maymore » also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system« less

  11. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is crediblemore » as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required.« less

  12. Assessment of Mitigation Systems on Vapor Intrusion ...

    EPA Pesticide Factsheets

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor environments are often negatively pressurized with respect to outdoor air and soil gas (for example, from exhaust fans or the stack effect), and this pressure difference allows soil gas containing subsurface vapors to flow into indoor air through advection. In addition, concentration differentials cause VOCs and radon to migrate from areas of higher to lower concentrations through diffusion, which is another cause of vapor intrusion. Current practice for evaluating the vapor intrusion pathway involves a multiple line of evidence approach based on direct measurements in groundwater, external soil gas, subslab soil gas, and/or indoor air. No single line of evidence is considered definitive, and direct measurements of vapor intrusion can be costly, especially where significant spatial and temporal variability require repeated measurements at multiple locations to accurately assess the chronic risks of long-term exposure to volatile organic compounds (VOCs) like chloroform, perchloroethylene (PCE), and trichloroethylene (TCE).

  13. A proposed non-intrusive method for finding coefficients of slip and molecular reflectivity in microgravity

    NASA Technical Reports Server (NTRS)

    Noever, D. A.; Rosenberger, F. E.

    1989-01-01

    A proposed experimental program to look at a series of vapor transport properties measured along solid and liquid surfaces is described. The research objectives proposed are: (1) with accuracy otherwise unobtainable on ground, to determine the coefficient of slip measured between gases and the surfaces of liquids and solids; (2) for the first time, to classify and tabulate dominant surface effects found for a variety of solids, particularly those crystalized by vapor transport; and (3) to extend understanding of settling rates predicted for cosmic dust and condensed vapor falling through planetary atmospheres. The method used to obtain these objectives, has aided, to an order of magnitude, understanding of various liquid-gas interfaces such as oil and water. But to date, no similar characterization has proved successful for solids or liquids of uncertain densities. Likewise, no data exist in either ground-based research or as part of a microgravity program that, when collected with the high accuracy expected in low gravity, could definitely settle outstanding questions in kinetic theory, molecular dynamics, and cosmic physics.

  14. Meso to Neoproterozoic layered mafic-ultramafic rocks from the Virorco back-arc intrusion, Argentina

    NASA Astrophysics Data System (ADS)

    Ferracutti, Gabriela; Bjerg, Ernesto; Hauzenberger, Christoph; Mogessie, Aberra; Cacace, Francisco; Asiain, Lucía

    2017-11-01

    The Virorco layered mafic-ultramafic intrusion is part of a belt that extends over 100 km from NE to SW in the Eastern Sierras Pampeanas of San Luis, Argentina. The rocks of this belt carry a Fe-Cu-Ni sulphide mineralization in veins and as disseminated and massive ore. Platinum group minerals are associated with the sulphides. The Virorco intrusion exhibits modal, textural and cryptic layering. New results allow the characterization of six layered units (Modal Layered Unit, Pyroxenitic Macro-Layered Unit, Gabbroic Unit, Banded Unit, Hornblende Norite Unit and Gabbronorite Unit) present in three sectors of the intrusion (Eastern, Central and Western). The units from the Western Sector (Banded Unit, Hornblende Norite Unit and Gabbronorite Unit) and the Modal Layered Unit from the Eastern Sector belong to the Marginal Border Series of the intrusion. Meanwhile, the Central sector units (Pyroxenitic Macro-Layered Unit and Gabbroic Unit) are from the Layered Series. The presence of crescumulate texture (Modal Layered Unit) and colloform banding (Banded Unit) are evidences of "in situ" crystallization due to supercooling of a MgO-rich hydrated mafic magma, where cooling proceeded from the walls towards the interior of the magma chamber. In previous studies the mafic-ultramafic rocks have been considered to be Cambrian to Ordovician. Here we present a Sm-Nd whole rock isochron which shows that the formation age of these intrusions is 1002 ± 150 Ma and that the protolith age of the Pringles Metamorphic Complex metasedimentary rocks is 1289 ± 97 Ma. Our study also indicates that the San Luis mafic-ultramafic layered intrusives most probably formed in a back-arc tectonic setting, from an enriched sub-continental mantle, influenced by a subducting slab and/or crust injection into the Pampia Terrane prior to its collision with the Rio de la Plata Craton.

  15. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    NASA Astrophysics Data System (ADS)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  16. Geochemistry and tectonic implications of the Early Carboniferous Keketuobie intrusion in the West Junggar foldbelt, NW China

    NASA Astrophysics Data System (ADS)

    Deng, Yu-Feng; Yuan, Feng; Zhou, Taofa; Hollings, Pete; Zhang, Dayu

    2018-06-01

    The Keketuobie intrusion is situated in the northern part of the West Junggar foldbelt at the southern margin of the Central Asian Orogeic Belt. The intrusion consists of medium- to coarse-grained gabbro, fine-grained gabbro and diorite. Igneous zircons from the medium- to coarse-grained gabbro yielded a LA-ICP-MS U-Pb age of 320.8 ± 5.7 Ma, indicating that the intrusion was emplaced in the Early Carboniferous. The intrusive contact between the medium- to coarse-grained gabbro and the fine-grained gabbro indicates they formed from distinct magma pulses. Magnetite crystals from the fine-grained gabbro have lower V2O3 but higher TiO2 and Al2O3 contents than those of the medium- to coarse-grained gabbro, suggesting that the fine-grained gabbro crystallized in a relatively higher fO2 and temperature magma than the medium- to coarse-grained gabbro. The Keketuobie intrusive rocks are characterized by enriched large ion lithophile elements and depleted high field strength elements relative to N-MORB with restricted (87Sr/86Sr)t ratios (0.70370-0.70400) and εNd(t) values (+5.85 to +6.97). The petrography and geochemistry are comparable to those of subduction-related volcanic rocks. The trace elements and isotopic compositions of the mafic intrusive rocks suggest that the primary magmas were derived from mixing of metasomatized lithospheric mantle and depleted asthenospheric melts, perhaps triggered by slab break-off. The Keketuobie intrusion is younger than adjacent ophiolite sequences, island arc volcanic rocks and porphyry deposits, but predates the post-collisional A-type granites and bimodal volcanic rocks in the district, suggesting that the Keketuobie intrusion likely formed in a syn-collisional setting.

  17. LANDSAT and radar mapping of intrusive rocks in SE-Brazil

    NASA Technical Reports Server (NTRS)

    Parada, N. D. J. (Principal Investigator); Dossantos, A. R.; Dosanjos, C. E.; Moreira, J. C.; Barbosa, M. P.; Veneziani, P.

    1982-01-01

    The feasibility of intrusive rock mapping was investigated and criteria for regional geological mapping established at the scale of 1:500,00 in polycyclic and polymetamorphic areas using the logic method of photointerpretation of LANDSAT imagery and radar from the RADAMBRASIL project. The spectral behavior of intrusive rocks, was evaluated using the interactive multispectral image analysis system (Image-100). The region of Campos (city) in northern Rio de Janeiro State was selected as the study area and digital imagery processing and pattern recognition techniques were applied. Various maps at the 2:250,000 scale were obtained to evaluate the results of automatic data processing.

  18. Research on intrusion detection based on Kohonen network and support vector machine

    NASA Astrophysics Data System (ADS)

    Shuai, Chunyan; Yang, Hengcheng; Gong, Zeweiyi

    2018-05-01

    In view of the problem of low detection accuracy and the long detection time of support vector machine, which directly applied to the network intrusion detection system. Optimization of SVM parameters can greatly improve the detection accuracy, but it can not be applied to high-speed network because of the long detection time. a method based on Kohonen neural network feature selection is proposed to reduce the optimization time of support vector machine parameters. Firstly, this paper is to calculate the weights of the KDD99 network intrusion data by Kohonen network and select feature by weight. Then, after the feature selection is completed, genetic algorithm (GA) and grid search method are used for parameter optimization to find the appropriate parameters and classify them by support vector machines. By comparing experiments, it is concluded that feature selection can reduce the time of parameter optimization, which has little influence on the accuracy of classification. The experiments suggest that the support vector machine can be used in the network intrusion detection system and reduce the missing rate.

  19. SAMPLING-BASED APPROACH TO INVESTIGATING VAPOR INTRUSION

    EPA Science Inventory

    Vapor intrusion is defined as the migration of volatile organic compounds (VOCs) into occupied buildings from contaminated soil or ground water. EPA recently developed guidance to facilitate assessment of vapor intrusion at sites regulated by RCRA and CERCLA. The EPA guidance e...

  20. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    USGS Publications Warehouse

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  1. Saltwater intrusion in coastal regions of North America

    USGS Publications Warehouse

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  2. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  3. Postemplacement dynamics of basaltic intrusions in the continental crust

    NASA Astrophysics Data System (ADS)

    Roman, A.; Jaupart, C.

    2017-02-01

    Laboratory experiments document the postemplacement behavior of mafic intrusions that spread at a density interface and founder as they become denser than their surroundings due to cooling and crystallization. All else being equal, the larger the intrusion volume, the farther the intrusion can spread and the smaller its aspect ratio is. The final aspect ratio is a function of a single dimensionless number analogous to the Rayleigh number of thermal convection. Once it is denser than its surroundings, the intrusion becomes unstable and may founder in two different regimes. At aspect ratios larger than about 0.4, the "teardrop" regime is such that the intrusion thickens in a central region, developing the shapes of a funnel and a pendant drop. At lower aspect ratios, another regime is observed, with thickening of the intrusion at the leading edge and thinning in a central region. The thick outer ring in turn becomes unstable into a set of teardrops and leads to an irregular horizontal outline. In one variant called the "jellyfish" regime, the thin central region develops a number of downwellings and upwellings in a Rayleigh-Taylor-like pattern. These instabilities may get arrested due to cooling as the intrusion and encasing rocks become too strong to deform. One would then be left with a funnel-shaped residual body or a wide irregular one with thick peripheral lobes and a thinner central region. These different patterns can be recognized in upper crustal mafic intrusions.

  4. High-resolution seismic imaging of the Kevitsa mafic-ultramafic Cu-Ni-PGE hosted intrusion, northern Finland

    NASA Astrophysics Data System (ADS)

    Malehmir, Alireza; Koivisto, Emilia; Wjins, Chris; Tryggvason, Ari; Juhlin, Christopher

    2014-05-01

    Kevitsa, in northern Finland, is a large nickel/copper ore body hosted by a massive mafic-ultramafic intrusion with measured and indicated resources of 240 million tons (cutoff 0.1%) grading 0.30% Ni and 0.41% Cu. Mining started in 2012 with an open pit that will extend down to about 550-600 m depth. The expected mine life is more than 20 years. Numerous boreholes are available in the area, but the majority of them are shallow and do not provide a comprehensive understanding of the dimensions of the intrusion. However, a number of boreholes do penetrate the basal contact of the intrusion. Most of these are also shallow and concentrated at the edge of the intrusion. A better knowledge of the geometry of the intrusion would provide a framework for near-mine and deep exploration in the area, but also a better understanding of the geology. Exact mapping of the basal contact of the intrusion would also provide an exploration target for the contact-type mineralization that is often more massive and richer in Ni-Cu than the disseminated mineralization away from the contact. With the objective of better characterizing the intrusion, a series of 2D profiles were acquired followed by a 3D reflection survey that covered an area of about 3 km by 3 km. Even though the geology is complex and the seismic P-wave velocity ranges between 5 to 8 km/s, conventional processing results show gently- to steeply-dipping reflections from depths of approximately 2 km to as shallow as 100 m. Many of these reflections are interpreted to originate from either fault systems or internal magmatic layering within the Kevitsa main intrusion. Correlations between the 3D surface seismic data and VSP data, based upon time shifts or phase changes along the reflections, support the interpretation that numerous faults are imaged in the volume. Some of these faults cross the planned open-pit mine at depths of about 300-500 m, and it is, therefore, critical to map them for mine planning. The seismic 3D

  5. Simple, Efficient, and Rapid Methods to Determine the Potential for Vapor Intrusion into the Home: Temporal Trends, Vapor Intrusion Forecasting, Sampling Strategies, and Contaminant Migration Routes

    EPA Science Inventory

    Current practice for evaluating the vapor intrusion pathway involves a multiple line of evidence approach based on direct measurements of volatile organic compound (VOC) concentrations in groundwater, external soil gas, subslab soil gas, and/or indoor air. No single line of evide...

  6. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  7. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  8. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  9. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  10. Vapour Intrusion into Buildings - A Literature Review

    EPA Science Inventory

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  11. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients.

    PubMed

    Bapat, Usha; Kedlya, Prashanth G

    2012-09-01

    To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD) patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients' above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life. Elderly, educated

  12. Why seawater intrusion has not yet occurred in the Kaluvelli-Pondicherry basin, Tamil Nadu, India

    NASA Astrophysics Data System (ADS)

    Vincent, Aude; Violette, Sophie

    2017-09-01

    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is greatest when aquifers are overexploited or when recharge is low due to a semi-arid or arid climate. The Kaluvelli-Pondicherry sedimentary basin in Tamil Nadu (India) presents both these characteristics. Groundwater levels in the Vanur aquifer can reach 50 m below sea level at less than 20 km inland. This groundwater depletion is due to an exponential increase in extraction for irrigation over 35 years. No seawater intrusion has yet been detected, but a sulphate-rich mineralization is observed, the result of upward vertical leakage from the underlying Ramanathapuram aquifer. To characterize the mechanisms involved, and to facilitate effective water management, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been applied to a quasi-3D hydrogeological model, NEWSAM. Recharge had been previously quantified through the inter-comparison of hydrological models, based on climatological and surface-flow field measurements. Sensitivity tests on parameters and boundary conditions associated with the sea were performed. The resulting water balances for each aquifer led to hypotheses of (1) an offshore fresh groundwater stock, and (2) a reversal and increase of the upward leakage from the Ramanathapuram aquifer, thus corroborating the hypothesis proposed to explain geochemical results of the previous study, and denying a seawater intrusion. Palaeo-climate review supports the existence of favourable hydro-climatological conditions to replenish an offshore groundwater stock of the Vanur aquifer in the past. The extent of this fresh groundwater stock was calculated using the Kooi and Groen method.

  13. A Survey on Anomaly Based Host Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  14. Seismic Characterization of the June 17, 2007 East Rift Intrusion at Kilauea Volcano

    NASA Astrophysics Data System (ADS)

    Wilson, D. C.; Uribe, J.; Kamibayashi, S.; Nakata, J.; Okubo, P.

    2007-12-01

    An early morning earthquake swarm on Sunday, June 17, 2007 signaled the beginning of a sequence of seismic and deformational activity consistent with an intrusion of magma in the upper East Rift of Kilauea volcano, Hawaii. This culminated in an outbreak of lava from a discontinuous 160 meter long fissure, approximately 6 km west of Pu`u `O`o and 13 km southeast of Kilauea's summit. Here we detail the seismic characteristics and observed deformation accompanying this magmatic intrusion and eruption. Seismic activity began at 0216 Hawaiian Standard Time (HST - UTC minus 10 hours) with 38 events greater than magnitude 2 and over 80 located earthquakes in the first two hours. These earthquakes were centered 1.5-2 km southwest of Mauna Ulu (9 km southeast of Kilauea summit) between 1.5 and 3 km deep. At the same time, tiltmeters at Kilauea's summit began indicating rapid deflation of the summit area. Starting at 0730 HST there was a pronounced eastward shift (by about 4 km) of the center of seismicity to a location just west of Makaopuhi crater. At this time GPS stations began to show extension across the rift in that area. Over the next 7-8 hours, the locus of seismicity continued to migrate eastward with over 70 events located at Makaopuhi crater. Over the next day more than 40 earthquakes occurred with locations ranging from the uppermost east rift to Makaopuhi crater. The next afternoon (June 18) there was another pronounced eastward shift in seismicity with 23 earthquakes, occurring between 1459-1600 HST, centered between Makaopuhi crater and Napau crater. Kilauea summit area tremor levels rose throughout the day on June 17, reaching a peak of 24 times background levels mid-day on the June 18, before beginning a slow decline. Tremor levels along the East Rift showed brief periods of strong activity (4-6 times background levels), and lava was discovered at the surface shortly after one such tremor episode at 0625 HST on June 19. Shortly before noon on the same day

  15. Tip Characterization Method using Multi-feature Characterizer for CD-AFM

    PubMed Central

    Orji, Ndubuisi G.; Itoh, Hiroshi; Wang, Chumei; Dixson, Ronald G.; Walecki, Peter S.; Schmidt, Sebastian W.; Irmer, Bernd

    2016-01-01

    In atomic force microscopy (AFM) metrology, the tip is a key source of uncertainty. Images taken with an AFM show a change in feature width and shape that depends on tip geometry. This geometric dilation is more pronounced when measuring features with high aspect ratios, and makes it difficult to obtain absolute dimensions. In order to accurately measure nanoscale features using an AFM, the tip dimensions should be known with a high degree of precision. We evaluate a new AFM tip characterizer, and apply it to critical dimension AFM (CD-AFM) tips used for high aspect ratio features. The characterizer is made up of comb-shaped lines and spaces, and includes a series of gratings that could be used as an integrated nanoscale length reference. We also demonstrate a simulation method that could be used to specify what range of tip sizes and shapes the characterizer can measure. Our experiments show that for non re-entrant features, the results obtained with this characterizer are consistent to 1 nm with the results obtained by using widely accepted but slower methods that are common practice in CD-AFM metrology. A validation of the integrated length standard using displacement interferometry indicates a uniformity of better than 0.75%, suggesting that the sample could be used as highly accurate and SI traceable lateral scale for the whole evaluation process. PMID:26720439

  16. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    NASA Astrophysics Data System (ADS)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  17. Subsurface and Surface Characterization using an Information Framework Model

    NASA Astrophysics Data System (ADS)

    Samuel-Ojo, Olusola

    Groundwater plays a critical dual role as a reservoir of fresh water for human consumption and as a cause of the most severe problems when dealing with construction works below the water table. This is why it is critical to monitor groundwater recharge, distribution, and discharge on a continuous basis. The conventional method of monitoring groundwater employs a network of sparsely distributed monitoring wells and it is laborious, expensive, and intrusive. The problem of sparse data and undersampling reduces the accuracy of sampled survey data giving rise to poor interpretation. This dissertation addresses this problem by investigating groundwater-deformation response in order to augment the conventional method. A blend of three research methods was employed, namely design science research, geological methods, and geophysical methods, to examine whether persistent scatterer interferometry, a remote sensing technique, might augment conventional groundwater monitoring. Observation data (including phase information for displacement deformation from permanent scatterer interferometric synthetic aperture radar and depth to groundwater data) was obtained from the Water District, Santa Clara Valley, California. An information framework model was built and applied, and then evaluated. Data was preprocessed and decomposed into five components or parts: trend, seasonality, low frequency, high frequency and octave bandwidth. Digital elevation models of observed and predicted hydraulic head were produced, illustrating the piezometric or potentiometric surface. The potentiometric surface characterizes the regional aquifer of the valley showing areal variation of rate of percolation, velocity and permeability, and completely defines flow direction, advising characteristics and design levels. The findings show a geologic forcing phenomenon which explains in part the long-term deformation behavior of the valley, characterized by poroelastic, viscoelastic, elastoplastic and

  18. A new intrusion prevention model using planning knowledge graph

    NASA Astrophysics Data System (ADS)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  19. Children’s recalls from five dietary-reporting validation studies: Intrusions in correctly reported and misreported options in school breakfast reports

    PubMed Central

    Baxter, Suzanne Domel; Hardin, James W.; Royer, Julie A.; Guinn, Caroline H.; Smith, Albert F.

    2008-01-01

    For school breakfast each day, many elementary schools offer a choice between a cold option that includes ready-to-eat (RTE) cereal and a hot option that includes a non-RTE-cereal entrée such as waffles. For breakfast reports, intrusions (reports of uneaten items) in correctly reported and misreported breakfast options were examined using data from five dietary-reporting validation studies. In each study, fourth-grade children were observed eating school breakfast and school lunch and then interviewed to obtain a dietary recall. A breakfast option was correctly reported in 240 breakfast reports for 203 intrusions total, and misreported in 97 breakfast reports for 189 intrusions total. Asymmetry was evident in misreported options; specifically, children observed eating a cold option almost never misreported a hot option, but children observed eating a hot option often misreported a cold option. Proportionately more breakfast reports were intrusion-free when a breakfast option was correctly reported than misreported. Linking of intrusions (i.e., multiple intrusions from the same option in a breakfast report) was especially evident with misreported breakfast options. Methodological aspects of dietary recalls such as target period (prior 24 hours; previous day), interview time (morning; afternoon; evening), and interview format (meal; open) had implications for intrusions and misreported breakfast options. PMID:18501992

  20. Synergy of climate change and local pressures on saltwater intrusion in heterogeneous coastal aquifers

    NASA Astrophysics Data System (ADS)

    Abou Najm, M.; Safi, A.; El-Fadel, M.; Doummar, J.; Alameddine, I.

    2016-12-01

    The relative importance of climate change induced sea level rise on the salinization of a highly urbanized karstified coastal aquifers were compared with non-sustainable pumping. A 3D variable-density groundwater flow and solute transport model was used to predict the displacement of the saltwater-freshwater interface in a pilot aquifer located along the Eastern Mediterranean. The results showed that the influence of sea level rise was marginal when compared with the encroachment of salinity associated with anthropogenic abstraction. Model predictions of salinity mass and volumetric displacement of the interface corresponding to a long-term monthly transient model showed that the saltwater intrusion dynamic is highly sensitive to change in the abstraction rates which were estimated based on combinations of water consumption rates and population growth rates. Salinity encroachment, however, appeared to be more sensitive to water consumption rates in comparison to population growth rates, where a 50% increase in the rate of former led to four times more intrusion as compared to an equivalent increase in population growth rate over 20 years. Coupling both increase in population growth and increased consumption rates had a synergistic effect that aggravated the intrusion beyond the sum of the individual impacts. Adaptation strategies targeting a decrease in groundwater exploitation proved to be effective in retarding the intrusion.

  1. Noble gas systematics of the Skaergaard intrusion

    NASA Astrophysics Data System (ADS)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Ra<1) along the margin of the intrusion indicates that noble gases from the Archean host-rock were incorporated into the cooling magma chamber, probably via magmatic assimilation. Noble gases in olivines from the upper portions of the intrusion have atmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  2. Intrusive images and voluntary memory for affective pictures: contextualization and dual-task interference.

    PubMed

    Krans, Julie; Langner, Oliver; Reinecke, Andrea; Pearson, David G

    2013-12-01

    The present study addressed the role of context information and dual-task interference during the encoding of negative pictures on intrusion development and voluntary recall. Healthy participants were shown negative pictures with or without context information. Pictures were either viewed alone or concurrently with a visuospatial or verbal task. Participants reported their intrusive images of the pictures in a diary. At follow-up, perceptual and contextual memory was tested. Participants in the context group reported more intrusive images and perceptual voluntary memory than participants in the no context group. No effects of the concurrent tasks were found on intrusive image frequency, but perceptual and contextual memory was affected according to the cognitive load of the task. The analogue method cannot be generalized to real-life trauma and the secondary tasks may differ in cognitive load. The findings challenge a dual memory model of PTSD but support an account in which retrieval strategy, rather than encoding processes, accounts for the experience of involuntary versus voluntary recall. Copyright © 2013 Elsevier Ltd. All rights reserved.

  3. New Observations of the Gulf of Aden Intermediate Water Intrusion into the Red Sea.

    NASA Astrophysics Data System (ADS)

    Bower, A.; Abualnaja, Y.

    2012-04-01

    The three-layer exchange flow between the Red Sea and the Indian Ocean during summer is characterized by a thick, northward intrusion of relatively cold, low-salinity and low in dissolved oxygen (< 0.5 ml/l); Gulf of Aden Intermediate Water (GAIW), sandwiched between two thin layers of outflow water. The flux of GAIW into the Red Sea is important in the heat, freshwater and nutrient budgets of the Red Sea, but the structure and pathways of the intrusion are not well-known due to a paucity of hydrographic and direct velocity observations. A research cruise was executed at the eastern side of the Red Sea during September-October 2011 to conduct the first large-scale survey of the intrusion. This mission is part of a series of expeditions in the Red Sea designed to investigate the seasonal Red Sea circulation. Surprisingly, the GAIW intrusion was observed to stretch nearly the entire length of the Red Sea (~1500 km) as a narrow eastern boundary current with subsurface velocity maximum of 0.1-0.3 m/s in the depth range 50-100 m. The intruding layer is weakly stratified compared to the background, possibly an indication of strong vertical mixing as it flows through the strait. Some GAIW was observed to enter deep channels in a coral reef bank (Farasan Banks) located in the southeastern Red Sea, and to enter the Red Sea interior, the latter possibly due to interactions between the boundary current and mesoscale eddies. The pathways and erosion of the GAIW intrusion will likely have major implications for the spatial distribution of biological productivity.

  4. Interactive Modelling of Salinity Intrusion in the Rhine-Meuse Delta

    NASA Astrophysics Data System (ADS)

    Baart, F.; Kranenburg, W.; Luijendijk, A.

    2015-12-01

    In many delta's of the world salinity intrusion imposes limits to fresh water availability. With increasing population and industry, the need for fresh water increases. But also salinity intrusion is expected to increase due to changes in river discharge, sea level and storm characteristics. In the Rhine-Meuse delta salt intrusion is impacted by human activities as well, like deepening of waterways and opening of delta-branches closed earlier. All these developments call for increasing the understanding of the system, but also for means for policy makers, coastal planners and engineers to assess effects of changes and to explore and design measures. In our presentation we present the developments in interactive modelling of salinity intrusion in the Rhine-Meuse delta. In traditional process-based numerical modelling, impacts are investigated by researchers and engineers by following the steps of pre-defining scenario's, running the model and post-processing the results. Interactive modelling lets users adjust simulations while running. Users can for instance change river discharges or bed levels, and can add measures like changes to geometry. The model will take the adjustments into account immediately, and will directly compute the effect. In this way, a tool becomes available with which coastal planners, policy makers and engineers together can develop and evaluate ideas and designs by interacting with the numerical model. When developing interactive numerical engines, one of the challenges is to optimize the exchange of variables as e.g. salt concentration. In our case we exchange variables on a 3D grid every time step. For this, the numerical model adheres to the Basic Model Interface (http://csdms.colorado.edu/wiki), which allows external control and the exchange of variables through pointers while the model is running. In our presentation we further explain our method and show examples of interactive design of salinity intrusion measures in the Rhine

  5. Cup-shaped Intrusions, Morphology and Emplacement Mechanism Investigate Through Analogue Modelling

    NASA Astrophysics Data System (ADS)

    Mathieu, L.; van Wyk de Vries, B.

    2007-12-01

    We investigate the morphology of large-scale shallow-depth magma intrusions and sub-volcanic complexes with analogue models. Intrusions of analogue magma are done in a granular material that can contain a ductile layer. The model surface is flat to model the formation of plutonic intrusions and it is overlain by a cone when modelling late sub-volcanic complexes. For flat-top models, we obtain cup-shaped intrusions fed by dykes. Cup-shaped intrusions are inverted-cone like bodies. They are different from saucer-shaped intrusions as they possess neither a well developed sill-base, nor an outer rim. However, like saucers, cups are shallow depth intrusions that dome the country rocks. They initiate from an advancing dyke and first develop an inverted-cone like morphology. Then, the central thickness increases and thrusts form at the edge of the domed country rocks. At this stage, the intrusions progressively involve toward a lopolith shape. By using analogue magma of various viscosities we have been able to constrain key relationships: higher intrusion viscosity causes deeper initiation and the deeper they initiate, the larger is the intrusion diameter. A natural example of such intrusion might by the circles of volcanoes like the Azufre-Lastaria (Peru) that might be overlain be a large-scale cup-shaped intrusion. When adding a cone at the surface of the model and, sometimes, a thin ductile layer in the substratum, the morphology of cup-shaped intrusions vary. Note that the ductile layer of our models is not thick enough to induce the gravitational spreading of the cone. Generally, cup-shaped intrusions are asymmetric in cross section and elliptical in plan view. Their formation creates extension structures in the cone (croissant-shaped rift, straight rift or normal fault) and thrusts in some sectors below the cone. Both types of structures are bordered by strike-slip faults. Cups and saucers share many similarities, but differ probably in the fact that saucers are

  6. Extruded upper first molar intrusion: Comparison between unilateral and bilateral miniscrew anchorage.

    PubMed

    Sugii, Mari Miura; Barreto, Bruno de Castro Ferreira; Francisco Vieira-Júnior, Waldemir; Simone, Katia Regina Izola; Bacchi, Ataís; Caldas, Ricardo Armini

    2018-01-01

    The aim of his study was to evaluate the stress on tooth and alveolar bone caused by orthodontic intrusion forces in a supraerupted upper molar, by using a three-dimensional Finite Element Method (FEM). A superior maxillary segment was modeled in the software SolidWorks 2010 (SolidWorks Corporation, Waltham, MA, USA) containing: cortical and cancellous bone, supraerupted first molar, periodontal tissue and orthodontic components. A finite element model has simulated intrusion forces of 4N onto a tooth, directed to different mini-screw locations. Three different intrusion mechanics vectors were simulated: anchoring on a buccal mini-implant; anchoring on a palatal mini-implant and the association of both anchorage systems. All analyses were performed considering the minimum principal stress and total deformation. Qualitative analyses exhibited stress distribution by color maps. Quantitative analysis was performed with a specific software for reading and solving numerical equations (ANSYS Workbench 14, Ansys, Canonsburg, Pennsylvania, USA). Intrusion forces applied from both sides (buccal and palatal) resulted in a more homogeneous stress distribution; no high peak of stress was detected and it has allowed a vertical resultant movement. Buccal or palatal single-sided forces resulted in concentrated stress zones with higher values and tooth tipping to respective force side. Unilateral forces promoted higher stress in root apex and higher dental tipping. The bilateral forces promoted better distribution without evidence of dental tipping. Bilateral intrusion technique suggested lower probability of root apex resorption.

  7. Stress Induced in Periodontal Ligament under Orthodontic Loading (Part II): A Comparison of Linear Versus Non-Linear Fem Study.

    PubMed

    Hemanth, M; Deoli, Shilpi; Raghuveer, H P; Rani, M S; Hegde, Chatura; Vedavathi, B

    2015-09-01

    Simulation of periodontal ligament (PDL) using non-linear finite element method (FEM) analysis gives better insight into understanding of the biology of tooth movement. The stresses in the PDL were evaluated for intrusion and lingual root torque using non-linear properties. A three-dimensional (3D) FEM model of the maxillary incisors was generated using Solidworks modeling software. Stresses in the PDL were evaluated for intrusive and lingual root torque movements by 3D FEM using ANSYS software. These stresses were compared with linear and non-linear analyses. For intrusive and lingual root torque movements, distribution of stress over the PDL was within the range of optimal stress value as proposed by Lee, but was exceeding the force system given by Proffit as optimum forces for orthodontic tooth movement with linear properties. When same force load was applied in non-linear analysis, stresses were more compared to linear analysis and were beyond the optimal stress range as proposed by Lee for both intrusive and lingual root torque. To get the same stress as linear analysis, iterations were done using non-linear properties and the force level was reduced. This shows that the force level required for non-linear analysis is lesser than that of linear analysis.

  8. Intrusive Memories in Perpetrators of Violent Crime: Emotions and Cognitions

    ERIC Educational Resources Information Center

    Evans, Ceri; Ehlers, Anke; Mezey, Gillian; Clark, David M.

    2007-01-01

    The authors investigated factors that may determine whether perpetrators of violent crime develop intrusive memories of their offense. Of 105 young offenders who were convicted of killing or seriously harming others, 46% reported distressing intrusive memories, and 6% had posttraumatic stress disorder. Intrusions were associated with lower…

  9. Wind-forced salt intrusion into a tributary estuary

    NASA Astrophysics Data System (ADS)

    Sanford, Lawrence P.; Boicourt, William C.

    1990-08-01

    Moored measurements and hydrographic surveys were carried out during the summers of 1986 and 1987 to examine interaction between the mainstem of the Chesapeake Bay and the Choptank River, an eastern shore tributary estuary. The data show that an important mode of interaction is through wind-forced intrusion of saline, hypoxic water from below the pycnocline of the Bay into the lower river. Intrusions are driven by lateral tilting of the pycnocline in the Bay, when high salinity water is upwelled on the eastern side of the Bay in response to a southward pulse of wind stress. The resulting internal surges propagate up the relict Choptank entrance channel at a speed of about 20 cm/s and spill onto the broad sill inside the mouth of the river. Intrusion-favorable pycnocline tilts in the Bay do not always result in lower layer intrusion into the Choptank, but may be blocked or choked in the entrance channel on occasion. The data suggest that wind-forced intrusion of salt leads to increased gravitational circulation in the Choptank during the summer months, providing a mechanism through which high frequency energy may be directly translated into lower frequency motion.

  10. Ex-situ gas diffusion layer intrusion effect determination of polymer electrolyte membrane fuel cell flow fields

    NASA Astrophysics Data System (ADS)

    Haase, S.; Rauber, M.

    2015-09-01

    In automotive PEM fuel cell systems, one of the most important targets is to reduce the parasitic power of balance of plant components, e.g. the air supply. This can be achieved for example by decreasing air stoichiometry. However, this could lead to bad flow sharing in the fuel cell stack. Therefore the fluid distribution in the flow field has to be evaluated, understood and optimized. This work evaluates the effect of GDL intrusion on the pressure drop via ex-situ determination of GDL intrusion using CFD simulation. The intruded GDL geometries, evaluated by an optical microscope with 200 times enlargement, are transferred to pressure drop behaviors by a numerical CFD model. These results are compared to the results of the differential pressure method of mapping the pressure distribution, described in [43]. The intrusion of the GDL leads to homogeneous flow distribution up to clamping pressures of 2.5 MPa. The inhomogeneous intrusion, induced by cracked fibers that extend into the channel, dominates the flow at higher clamping pressures and leads to the exponential increase in pressure drop in the differential pressure method. For clamping pressures used in typical fuel cell applications, the results of both methods show homogeneous flow through the channels.

  11. Heart rate, startle response, and intrusive trauma memories

    PubMed Central

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  12. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    DTIC Science & Technology

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  13. Non-Adiabatic Molecular Dynamics Methods for Materials Discovery

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Furche, Filipp; Parker, Shane M.; Muuronen, Mikko J.

    2017-04-04

    The flow of radiative energy in light-driven materials such as photosensitizer dyes or photocatalysts is governed by non-adiabatic transitions between electronic states and cannot be described within the Born-Oppenheimer approximation commonly used in electronic structure theory. The non-adiabatic molecular dynamics (NAMD) methods based on Tully surface hopping and time-dependent density functional theory developed in this project have greatly extended the range of molecular materials that can be tackled by NAMD simulations. New algorithms to compute molecular excited state and response properties efficiently were developed. Fundamental limitations of common non-linear response methods were discovered and characterized. Methods for accurate computations ofmore » vibronic spectra of materials such as black absorbers were developed and applied. It was shown that open-shell TDDFT methods capture bond breaking in NAMD simulations, a longstanding challenge for single-reference molecular dynamics simulations. The methods developed in this project were applied to study the photodissociation of acetaldehyde and revealed that non-adiabatic effects are experimentally observable in fragment kinetic energy distributions. Finally, the project enabled the first detailed NAMD simulations of photocatalytic water oxidation by titania nanoclusters, uncovering the mechanism of this fundamentally important reaction for fuel generation and storage.« less

  14. Perceptual processing during trauma, priming and the development of intrusive memories

    PubMed Central

    Sündermann, Oliver; Hauschildt, Marit; Ehlers, Anke

    2013-01-01

    Background Intrusive reexperiencing in posttraumatic stress disorder (PTSD) is commonly triggered by stimuli with perceptual similarity to those present during the trauma. Information processing theories suggest that perceptual processing during the trauma and enhanced perceptual priming contribute to the easy triggering of intrusive memories by these cues. Methods Healthy volunteers (N = 51) watched neutral and trauma picture stories on a computer screen. Neutral objects that were unrelated to the content of the stories briefly appeared in the interval between the pictures. Dissociation and data-driven processing (as indicators of perceptual processing) and state anxiety during the stories were assessed with self-report questionnaires. After filler tasks, participants completed a blurred object identification task to assess priming and a recognition memory task. Intrusive memories were assessed with telephone interviews 2 weeks and 3 months later. Results Neutral objects were more strongly primed if they occurred in the context of trauma stories than if they occurred during neutral stories, although the effect size was only moderate (ηp2=.08) and only significant when trauma stories were presented first. Regardless of story order, enhanced perceptual priming predicted intrusive memories at 2-week follow-up (N = 51), but not at 3 months (n = 40). Data-driven processing, dissociation and anxiety increases during the trauma stories also predicted intrusive memories. Enhanced perceptual priming and data-driven processing were associated with lower verbal intelligence. Limitations It is unclear to what extent these findings generalize to real-life traumatic events and whether they are specific to negative emotional events. Conclusions The results provide some support for the role of perceptual processing and perceptual priming in reexperiencing symptoms. PMID:23207970

  15. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    PubMed

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  16. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.

    2013-11-14

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  17. 3D modeling of a dolerite intrusion from the photogrammetric and geophysical data integration.

    NASA Astrophysics Data System (ADS)

    Duarte, João; Machadinho, Ana; Figueiredo, Fernando; Mira, Maria

    2015-04-01

    The aims of this study is create a methodology based on the integration of data obtained from various available technologies, which allow a credible and complete evaluation of rock masses. In this particular case of a dolerite intrusion, which deployed an exploration of aggregates and belongs to the Jobasaltos - Extracção e Britagem. S.A.. Dolerite intrusion is situated in the volcanic complex of Serra de Todo-o-Mundo, Casais Gaiola, intruded in Jurassic sandstones. The integration of the surface and subsurface mapping, obtained by technology UAVs (Drone) and geophysical surveys (Electromagnetic Method - TEM 48 FAST), allows the construction of 2D and 3D models of the study local. The combination of the 3D point clouds produced from two distinct processes, modeling of photogrammetric and geophysical data, will be the basis for the construction of a single model of set. The rock masses in an integral perspective being visible their development above the surface and subsurface. The presentation of 2D and 3D models will give a perspective of structures, fracturation, lithology and their spatial correlations contributing to a better local knowledge, as well as its potential for the intended purpose. From these local models it will be possible to characterize and quantify the geological structures. These models will have its importance as a tool to assist in the analysis and drafting of regional models. The qualitative improvement in geological/structural modeling, seeks to reduce the value of characterization/cost ratio, in phase of prospecting, improving the investment/benefit ratio. This methodology helps to assess more accurately the economic viability of the projects.

  18. Hydrogeologic conditions and saline-water intrusion, Cape Coral, Florida, 1978-81

    USGS Publications Warehouse

    Fitzpatrick, D.J.

    1986-01-01

    The upper limestone unit of the intermediate aquifer system, locally called the upper Hawthorn aquifer, is the principal source of freshwater for Cape Coral, Florida. The aquifer has been contaminated with saline water by downward intrusion from the surficial aquifer system and by upward intrusion from the Floridan aquifer system. Much of the intrusion has occurred through open wellbores where steel casings are short or where casings have collapsed because of corrosion. Saline-water contamination of the upper limestone unit due to downward intrusion from the surficial aquifer is most severe in the southern and eastern parts of Cape Coral; contamination due to upward intrusion has occurred in many areas throughout Cape Coral. Intrusion is amplified in areas of heavy water withdrawals and large water-level declines. (USGS)

  19. Synthesis and characterization of Al & SiCp nano particles by non-contact ultrasonic assisted method

    NASA Astrophysics Data System (ADS)

    Swain, Pradyut Kumar; Das, Ratnakar; Sahoo, Ashok Kumar; Naik, Bikash; Padhi, Payodhar

    2018-05-01

    The present study deals with proper mixing of SiCp nano particle in the aluminum metal matrix in two stages of processing i.e. primary and secondary. During primary processing, the breaking of agglomeration of nano particles take place and these are mixed with liquid aluminum powder using high frequency(35kHz) mechanical vibration. But, during secondary processing, mixing of nano particles along with subsequent cooling take place using high frequency non contact ultrasonic method. The study also reveals that in the liquid metal nano particle were uniformly dispersed and the segregation of the particles near the grain boundaries is due to pushing of the nano particle during grain growth. The study was performed by taking aluminum as matrix and SiCp as reinforcement with weight fraction of 2% and 3% and SiCp particles sizes of 30nm each. Scanning electron microscopy(SEM) and X-ray diffraction(XRD) were conducted for characterization of nano composite material.

  20. Future Volcanism at Yucca Mountain - Statistical Insights from the Non-Detection of Basalt Intrusions in the Potential Repository

    NASA Astrophysics Data System (ADS)

    Coleman, N.; Abramson, L.

    2004-05-01

    upper-bound probability of 2E-7/yr (95% conf. level) for an igneous intrusion over the next 1E4 yrs. If we assume one undiscovered dike exists, the upper-bound probability would rise to 4E-7/yr. Higher probabilities may be possible if conditions that fostered Plio-Quaternary volcanism became enhanced over time. To the contrary, basalts of the past 11 Ma in Crater Flat have erupted in four episodes that together show a declining trend in erupted magma volume (DOE, TBD13, 2003). Smith et al (GSA Today, 2002) suggest there may be a common magma source for volcanism in Crater Flat and the Lunar Crater volcanic field, and that recurrence rates for YM could be underestimated. Their interpretation is highly speculative given the 130-km (80-mi) distance between these zones. A claim that crustal extension at YM is anomalously large, possibly favoring renewed volcanism (Wernicke et al, Science, 1999), was contradicted by later work (Savage et al, JGR, 2000). Spatial-temporal models that predict future intrusion probabilities of >2E-7/yr may be overly conservative and unrealistic. Along with currently planned site characterization activities, realistic models could be developed by considering the non-detection of basaltic dikes in the potential repository footprint. (The views expressed are the authors' and do not reflect any final judgment or determination by the Advisory Committee on Nuclear Waste or the Nuclear Regulatory Commission regarding the matters addressed or the acceptability of a license application for a geologic repository at Yucca Mt.)

  1. Stuck in the spin cycle: Avoidance and intrusions following breast cancer diagnosis.

    PubMed

    Bauer, Margaret R; Wiley, Joshua F; Weihs, Karen L; Stanton, Annette L

    2017-09-01

    Theories and research regarding cognitive and emotional processing during the experience of profound stressors suggest that the presence of intrusive thoughts and feelings predicts greater use of avoidance and that the use of avoidance paradoxically predicts more intrusions. However, empirical investigations of their purported bidirectional relationship are limited. This study presents a longitudinal investigation of the reciprocal relationship between intrusions and avoidance coping over a 6-month period in the year following breast cancer diagnosis. Breast cancer patients (N = 460) completed measures of cancer-related intrusions and avoidance at study entry, 3 months, and 6 months later (i.e., an average of 2, 5, and 8 months after diagnosis, respectively). Cross-lagged panel analyses revealed that intrusive thoughts, feelings, and images at study entry predicted greater avoidance 3 months later, and avoidance coping at study entry predicted intrusions 3 months later, controlling for the stability of intrusions and avoidance as well as time since diagnosis. Findings were not statistically significant for avoidance predicting intrusions, or vice versa, between the 3-month and the 6-month assessment period, during which they declined. These findings provide empirical support for the theoretical contention that avoidance and intrusive thoughts and emotions reciprocally influence one another following stressful events. Additionally, in the months shortly after breast cancer diagnosis, intrusions and avoidance are positively related. However, the relationships attenuate over time, which could indicate resolved cognitive and emotional processing of the cancer experience. Statement of contribution What is already known on this subject? Following stressful life events, individuals often experience intrusive thoughts and feelings related to the event and they report avoidance of such reminders. Many studies demonstrate that greater intrusions predict more

  2. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  3. Opportunities and Barriers to Address Seawater Intrusion Along California's Coast

    NASA Astrophysics Data System (ADS)

    Langridge, R.

    2016-12-01

    In many California coastal areas reliant on groundwater seawater intrusion is a serious problem. This presentation will discuss how particular groundwater management institutions in the state are addressing seawater intrusion issues, how stakeholders are participating in this process, and how scientific information can contribute to policies that support reducing or halting ongoing intrusion. In 2014, the California Legislature passed the Sustainable Groundwater Management Act (SGMA). The Act established requirements for 127 high and medium priority groundwater basins to form groundwater sustainability agencies (GSAs) and develop plans to sustainably manage their basin. Sustainable is defined in SGMA as avoiding specific unacceptable impacts, including significant and unreasonable seawater intrusion. Special Act Districts, created by an act of the legislature, have the option to be the sole GSA in their service area, and they can provide a window into current and potentially future strategies to address seawater intrusion. Additionally, adjudicated basins are often considered one of the best approaches to achieve efficient groundwater management, and these basins are exempt from SGMA and managed pursuant to a court judgment. The strategies utilized to manage seawater intrusion by three special act districts and five adjudicated basins will be discussed. These basins cover significant areas of central and southern California and all have experienced seawater intrusion. Our research team just completed reports for the State Water Resources Control Board on all the adjudicated and special act districts in the state, and this presentation will draw on our findings to better understand the barriers and opportunities to alleviate seawater intrusion and the information required to develop solutions.

  4. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    NASA Astrophysics Data System (ADS)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  5. Research on artificial neural network intrusion detection photochemistry based on the improved wavelet analysis and transformation

    NASA Astrophysics Data System (ADS)

    Li, Hong; Ding, Xue

    2017-03-01

    This paper combines wavelet analysis and wavelet transform theory with artificial neural network, through the pretreatment on point feature attributes before in intrusion detection, to make them suitable for improvement of wavelet neural network. The whole intrusion classification model gets the better adaptability, self-learning ability, greatly enhances the wavelet neural network for solving the problem of field detection invasion, reduces storage space, contributes to improve the performance of the constructed neural network, and reduces the training time. Finally the results of the KDDCup99 data set simulation experiment shows that, this method reduces the complexity of constructing wavelet neural network, but also ensures the accuracy of the intrusion classification.

  6. Aquifer Characterization from Surface Geo-electrical Method, western coast of Maharashtra, India

    NASA Astrophysics Data System (ADS)

    DAS, A.; Maiti, D. S.

    2017-12-01

    Knowledge of aquifer parameters are necessary for managing groundwater amenity. These parameters are evaluated through pumping tests bring off from bore wells. But it is quite expensive as well as time consuming to carry out pumping tests at various sites and sometimes it is difficult to find bore hole at every required site. Therefore, an alternate method is put forward in which the aquifer parameters are evaluated from surface geophysical method. In this method, vertical electrical sounding (VES) with Schlumberger configuration were accomplished in 85 stations over Sindhudurg district. Sindhudurg district is located in the Konkan region of Maharashtra state, India. The district is located between north latitude 15°37' and 16° 40' and east longitude 73° 19' and 74° 13'. The area is having hard rock and acute groundwater problem. In this configuration, we have taken the maximum current electrode spacing of 200 m for every vertical electrical sounding (VES). Geo-electrical sounding data (true resistivity and thickness) is interpreted through resistivity inversion approach. The required parameters are achieved through resistivity inversion technique from which the aquifer variables (D-Z parameters, mean resistivity, hydraulic conductivity, transmissivity, and coefficient of anisotropy) are calculated by using some empirical formulae. Cross-correlation investigation has been done between these parameters, which eventually used to characterize the aquifer over the study area. At the end, the contour plot for these aquifer parameters has been raised which reveals the detailed distribution of aquifer parameters throughout the study area. From contour plot, high values of longitudinal conductance, hydraulic conductivity and transmissivity are demarcate over Kelus, Vengurle, Mochemar and Shiroda villages. This may be due to intrusion of saline water from Arabian sea. From contour trends, the aquifers are characterized from which the groundwater resources could be

  7. Body, mother, mind: anorexia, femininity and the intrusive object.

    PubMed

    Lawrence, Marilyn

    2002-08-01

    This paper takes as its starting point the preponderance of female to male patients who suffer from anorexia. The author suggests that there may be something specific about certain experiences of femaleness which predispose towards anxieties of intrusion. Two contemporary theories of the aetiology of anorexia are outlined. Both of these suggest that the problem has its origins in intrusion or invasion of different sorts. The author suggests that many women who suffer from anorexia have an intrusive object instated in their minds, which may not necessarily be the result of actual intrusions in external reality. In the final part of the paper, the author examines the intrusiveness of anorexic patients in the transference and suggests that such patients very often harbour profound phantasies of intruding between the parents, with a wish to regain their special place with mother, untroubled by the presence of father. It is further suggested that the psychopathology underlying certain cases of anorexia leads to a failure in symbolisation. This failure in turn complicates the clinical picture, making such patients particularly difficult to think with about their difficulties.

  8. Volumetric measurement of root resorption following molar mini-screw implant intrusion using cone beam computed tomography.

    PubMed

    Li, Wen; Chen, Fei; Zhang, Feng; Ding, Wanghui; Ye, Qingsong; Shi, Jiejun; Fu, Baiping

    2013-01-01

    Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. 1. The volumes of 32 teeth were measured using CBCT and laser scanning to verify the accuracy of CBCT. 2. Twelve overerupted molars from adult patients were investigated in this study. After mini-screw implants were inserted into the buccal and palatal alveolar bones, 150 g of force was applied to the mini-screw implants on each side to intrude the molars. CBCT images of all patients were taken immediately prior to intrusion and after intrusion. The volumes of the roots were calculated using the Mimics software program. The differences between the pre-intrusion and post-intrusion root volumes were statistically evaluated with a paired-samples t-test. In addition, the losses of the roots were statistically compared with each other using one-way analysis of variance at the P<0.05 level. No statistically significant volume differences were observed between the physical (laser scanning) and CBCT measurements (P>0.05). The overerupted molars were significantly intruded (P<0.05), and the average intrusion was 3.30±1.60 mm. The differences between the pre-intrusion and post-intrusion root volumes were statistically significant for all of the roots investigated (P<0.05). The roots were sorted by volume loss in descending order as follows: mesiobuccal, palatal, and distobuccal. Statistical significance was achieved among the three roots. The average total resorption for each tooth was 58.39±1.54 mm(3). Volume measurement using CBCT was able to effectively evaluate root resorption caused by mini-screw intrusion. The highest volume loss was observed in the mesiobuccal root among the three roots of

  9. Open-MRI measures of cam intrusion for hips in an anterior impingement position relate to acetabular contact force.

    PubMed

    Buchan, Lawrence L; Zhang, Honglin; Konan, Sujith; Heaslip, Ingrid; Ratzlaff, Charles R; Wilson, David R

    2016-02-01

    Open MRI in functional positions has potential to directly and non-invasively assess cam femoroacetabular impingement (FAI). Our objective was to investigate whether open MRI can depict intrusion of the cam deformity into the intra-articular joint space, and whether intrusion is associated with elevated acetabular contact force. Cadaver hips (9 cam; 3 controls) were positioned in an anterior impingement posture and imaged using open MRI with multi-planar reformatting. The β-angle (describing clearance between the femoral neck and acetabulum) was measured around the entire circumference of the femoral neck. We defined a binary "MRI cam-intrusion sign" (positive if β < 0°). We then instrumented each hip with a piezoresistive sensor and conducted six repeated positioning trials, measuring acetabular contact force (F). We defined a binary "contact-force sign" (positive if F > 20N). Cam hips were more likely than controls to have both a positive MRI cam-intrusion sign (p = 0.0182, Fisher's exact test) and positive contact-force sign (p = 0.0083), which represents direct experimental evidence for cam intrusion. There was also a relationship between the MRI cam-intrusion sign and contact-force sign (p = 0.033), representing a link between imaging and mechanics. Our findings indicate that open MRI has significant potential for in vivo investigation of the cam FAI mechanism. © 2015 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  10. Use of laboratory geophysical and geotechnical investigation methods to characterize gypsum rich soils

    NASA Astrophysics Data System (ADS)

    Bhamidipati, Raghava A.

    Gypsum rich soils are found in many parts of the world, particularly in arid and semi-arid regions. Most gypsum occurs in the form of evaporites, which are minerals that precipitate out of water due to a high rate of evaporation and a high mineral concentration. Gypsum rich soils make good foundation material under dry conditions but pose major engineering hazards when exposed to water. Gypsum acts as a weak cementing material and has a moderate solubility of about 2.5 g/liter. The dissolution of gypsum causes the soils to undergo unpredictable collapse settlement leading to severe structural damages. The damages incur heavy financial losses every year. The objective of this research was to use geophysical methods such as free-free resonant column testing and electrical resistivity testing to characterize gypsum rich soils based on the shear wave velocity and electrical resistivity values. The geophysical testing methods could provide quick, non-intrusive and cost-effective methodologies to screen sites known to contain gypsum deposits. Reconstituted specimens of ground gypsum and quartz sand were prepared in the laboratory with varying amounts of gypsum and tested. Additionally geotechnical tests such as direct shear strength tests and consolidation tests were conducted to estimate the shear strength parameters (drained friction angle and cohesion) and the collapse potential of the soils. The effect of gypsum content on the geophysical and geotechnical parameters of soil was of particular interest. It was found that gypsum content had an influence on the shear wave velocity but had minimal effect on electrical resistivity. The collapsibility and friction angle of the soil increased with increase in gypsum. The information derived from the geophysical and geotechnical tests was used to develop statistical design equations and correlations to estimate gypsum content and soil collapse potential.

  11. The architecture of a network level intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.; Maccabe, A.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  12. Assessment of groundwater vulnerability to anthropogenic pollution and seawater intrusion in a small tropical island using index-based methods.

    PubMed

    Kura, Nura Umar; Ramli, Mohammad Firuz; Ibrahim, Shaharin; Sulaiman, Wan Nor Azmin; Aris, Ahmad Zaharin; Tanko, Adamu Idris; Zaudi, Muhammad Amar

    2015-01-01

    In this work, the DRASTIC and GALDIT models were employed to determine the groundwater vulnerability to contamination from anthropogenic activities and seawater intrusion in Kapas Island. In addition, the work also utilized sensitivity analysis to evaluate the influence of each individual parameter used in developing the final models. Based on these effects and variation indices of the said parameters, new effective weights were determined and were used to create modified DRASTIC and GALDIT models. The final DRASTIC model classified the island into five vulnerability classes: no risk (110-140), low (140-160), moderate (160-180), high (180-200), and very high (>200), covering 4, 26, 59, 4, and 7 % of the island, respectively. Likewise, for seawater intrusion, the modified GALDIT model delineates the island into four vulnerability classes: very low (<90), low (90-110), moderate (110-130), and high (>130) covering 39, 33, 18, and 9 % of the island, respectively. Both models show that the areas that are likely to be affected by anthropogenic pollution and seawater intrusion are within the alluvial deposit at the western part of the island. Pearson correlation was used to verify the reliability of the two models in predicting their respective contaminants. The correlation matrix showed a good relationship between DRASTIC model and nitrate (r = 0.58). In a similar development, the correlation also reveals a very strong negative relationship between GALDIT model and seawater contaminant indicator (resistivity Ωm) values (r = -0.86) suggesting that the model predicts more than 86 % of seawater intrusion. In order to facilitate management strategy, suitable areas for artificial recharge were identified through modeling. The result suggested some areas within the alluvial deposit at the western part of the island as suitable for artificial recharge. This work can serve as a guide for a full vulnerability assessment to anthropogenic pollution and seawater intrusion

  13. Characterization and Remediation of Chlorinated Volatile Organic Contaminants in the Vadose Zone: An Overview of Issues and Approaches

    PubMed Central

    Brusseau, Mark L.; Carroll, Kenneth C.; Truex, Michael J.; Becker, David J.

    2014-01-01

    Contamination of vadose-zone systems by chlorinated solvents is widespread, and poses significant potential risk to human health through impacts on groundwater quality and vapor intrusion. Soil vapor extraction (SVE) is the presumptive remedy for such contamination, and has been used successfully for innumerable sites. However, SVE operations typically exhibit reduced mass-removal effectiveness at some point due to the impact of poorly accessible contaminant mass and associated mass-transfer limitations. Assessment of SVE performance and closure is currently based on characterizing contaminant mass discharge associated with the vadose-zone source, and its impact on groundwater or vapor intrusion. These issues are addressed in this overview, with a focus on summarizing recent advances in our understanding of the transport, characterization, and remediation of chlorinated solvents in the vadose zone. The evolution of contaminant distribution over time and the associated impacts on remediation efficiency will be discussed, as will the potential impact of persistent sources on groundwater quality and vapor intrusion. In addition, alternative methods for site characterization and remediation will be addressed. PMID:25383058

  14. Characterization of Extremely Lightweight Intrusion Detection (ELIDe) Power Utilization with Varying Throughput and Payload Sizes

    DTIC Science & Technology

    2015-09-01

    Extremely Lightweight Intrusion Detection (ELIDe) algorithm on an Android -based mobile device. Our results show that the hashing and inner product...approximately 2.5 megabits per second (assuming a normal distribution of packet sizes) with no significant packet loss. 15. SUBJECT TERMS ELIDe, Android , pcap...system (OS). To run ELIDe, the current version was ported for use on Android .4 2.1 Mobile Device After ELIDe was ported to the Android mobile

  15. Impact of exogenous cortisol on the formation of intrusive memories in healthy women.

    PubMed

    Rombold, Felicitas; Wingenfeld, Katja; Renneberg, Babette; Schwarzkopf, Friederike; Hellmann-Regen, Julian; Otte, Christian; Roepke, Stefan

    2016-12-01

    Stress hormones such as cortisol are involved in modulating emotional memory. However, little is known about the influence of cortisol on the formation of intrusive memories after a traumatic event. The aim of this study was to examine whether cortisol levels during encoding and consolidation of an intrusion-inducing trauma film paradigm would influence subsequent intrusion formation. In an experimental, double-blind, placebo-controlled study a trauma film paradigm was used to induce intrusions in 60 healthy women. Participants received a single dose of either 20 mg hydrocortisone or placebo before watching a trauma film. Salivary cortisol and alpha-amylase as well as blood pressure were measured during the experiment. The consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions resulting from the trauma film were assessed throughout the following seven days. Hydrocortisone administration before the trauma film resulted in increased salivary cortisol levels but did not affect the consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions throughout the following week. These results indicate that pharmacologically increased cortisol levels during an experimental trauma film paradigm do not influence consecutive intrusive memories. Current data do not support a prominent role of exogenous cortisol on intrusive memories, at least in healthy young women after a relatively mild trauma equivalent. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. A Simulation-Optimization Model for the Management of Seawater Intrusion

    NASA Astrophysics Data System (ADS)

    Stanko, Z.; Nishikawa, T.

    2012-12-01

    Seawater intrusion is a common problem in coastal aquifers where excessive groundwater pumping can lead to chloride contamination of a freshwater resource. Simulation-optimization techniques have been developed to determine optimal management strategies while mitigating seawater intrusion. The simulation models are often density-independent groundwater-flow models that may assume a sharp interface and/or use equivalent freshwater heads. The optimization methods are often linear-programming (LP) based techniques that that require simplifications of the real-world system. However, seawater intrusion is a highly nonlinear, density-dependent flow and transport problem, which requires the use of nonlinear-programming (NLP) or global-optimization (GO) techniques. NLP approaches are difficult because of the need for gradient information; therefore, we have chosen a GO technique for this study. Specifically, we have coupled a multi-objective genetic algorithm (GA) with a density-dependent groundwater-flow and transport model to simulate and identify strategies that optimally manage seawater intrusion. GA is a heuristic approach, often chosen when seeking optimal solutions to highly complex and nonlinear problems where LP or NLP methods cannot be applied. The GA utilized in this study is the Epsilon-Nondominated Sorted Genetic Algorithm II (ɛ-NSGAII), which can approximate a pareto-optimal front between competing objectives. This algorithm has several key features: real and/or binary variable capabilities; an efficient sorting scheme; preservation and diversity of good solutions; dynamic population sizing; constraint handling; parallelizable implementation; and user controlled precision for each objective. The simulation model is SEAWAT, the USGS model that couples MODFLOW with MT3DMS for variable-density flow and transport. ɛ-NSGAII and SEAWAT were efficiently linked together through a C-Fortran interface. The simulation-optimization model was first tested by using a

  17. Performance Assessment of Network Intrusion-Alert Prediction

    DTIC Science & Technology

    2012-09-01

    the threats. In this thesis, we use Snort to generate the intrusion detection alerts. 2. SNORT Snort is an open source network intrusion...standard for IPS. (Snort, 2012) We choose Snort because it is an open source product that is free to download and can be deployed cross-platform...Learning & prediction in relational time series: A survey. 21st Behavior Representation in Modeling & Simulation ( BRIMS ) Conference 2012, 93–100. Tan

  18. Assessment of regional management strategies for controlling seawater intrusion

    USGS Publications Warehouse

    Reichard, E.G.; Johnson, T.A.

    2005-01-01

    Simulation-optimization methods, applied with adequate sensitivity tests, can provide useful quantitative guidance for controlling seawater intrusion. This is demonstrated in an application to the West Coast Basin of coastal Los Angeles that considers two management options for improving hydraulic control of seawater intrusion: increased injection into barrier wells and in lieu delivery of surface water to replace current pumpage. For the base-case optimization analysis, assuming constant groundwater demand, in lieu delivery was determined to be most cost effective. Reduced-cost information from the optimization provided guidance for prioritizing locations for in lieu delivery. Model sensitivity to a suite of hydrologic, economic, and policy factors was tested. Raising the imposed average water-level constraint at the hydraulic-control locations resulted in nonlinear increases in cost. Systematic varying of the relative costs of injection and in lieu water yielded a trade-off curve between relative costs and injection/in lieu amounts. Changing the assumed future scenario to one of increasing pumpage in the adjacent Central Basin caused a small increase in the computed costs of seawater intrusion control. Changing the assumed boundary condition representing interaction with an adjacent basin did not affect the optimization results. Reducing the assumed hydraulic conductivity of the main productive aquifer resulted in a large increase in the model-computed cost. Journal of Water Resources Planning and Management ?? ASCE.

  19. Slab break-off and the formation of Permian mafic-ultramafic intrusions in southern margin of Central Asian Orogenic Belt, Xinjiang, NW China

    NASA Astrophysics Data System (ADS)

    Song, Xie-Yan; Xie, Wei; Deng, Yu-Feng; Crawford, Anthony J.; Zheng, Wen-Qin; Zhou, Guo-Fu; Deng, Gang; Cheng, Song-Lin; Li, Jun

    2011-11-01

    The Baishiquan and Pobei Early Permian mafic-ultramafic intrusions were emplaced into Proterozoic metamorphic rocks in the Central Tianshan and the Beishan Fold Belt, northern Xinjiang, NW China. The Baishiquan intrusion comprises mainly gabbro, and mela-gabbro sills occurring within and along the margins of the gabbro body. In the Pobei intrusion, two distinct gabbroic packages, a lower gabbro and the main gabbro, are intruded and overlain by small cumulate wehrlite bodies. Both intrusions are characterized by enrichments of large ion lithophile elements and Th and U relative to the high field strength elements, and show strong negative Nb and Ta anomalies and positive K and Pb anomalies, leading to higher Th/Yb and Nb/Yb than in mid-ocean ridge basalt and ocean island basalt. These features are comparable with subduction-related mafic rocks and post-collisional magmas. Geological and geochemical considerations indicate that the parental magmas of the two intrusions were derived from decompression melting of ascending asthenosphere and reacted with overlying subduction-modified lithospheric mantle. We believe that these parental magmas were generated by post-collisional extension along the Chinese Tianshan, perhaps triggered by slab break-off or delamination of thickened lithosphere. Relatively lower (143Nd/144Nd)i and higher (87Sr/86Sr)i than other Permian mafic-ultramafic intrusions in the eastern Chinese Tianshan indicate that the parental magmas of these two intrusions experienced significant contamination by old crustal rocks.

  20. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  1. Hindered settling and the formation of layered intrusions

    NASA Astrophysics Data System (ADS)

    Bons, Paul D.; Baur, Albrecht; Elburg, Marlina A.; Lindhuber, Matthias J.; Marks, Michael A. W.; Soesoo, Alvar; van Milligen, Boudewijn P.; Walte, Nicolas P.

    2015-04-01

    Layered intrusions are characterized by (often repetitive) layering on a range of scales. Many explanations for the formation of such layering have been proposed over the past decades. We investigated the formation of "mats" by hindered crystal settling, a model that was first suggested by Lauder (1964). The interaction of sinking and rising crystals leads to the amplification of perturbations in crystal density within a magma chamber, a process similar to the formation of traffic jams in dense traffic (Bons et al., 2015). Once these "crystal traffic jams" form they constitute a barrier for further settling of crystals. Between these barriers, the magma evolves in a semi-closed system in which stratification may develop by gravitational sorting. Barriers, and therefore layers, form sequentially during inward cooling of the magma chamber. Barring later equilibration, mineralogical and geochemical trends within the layers are repetitive, but with variations due to the random process of initial perturbation formation. Layers can form in the transition between two end-member regimes: (1) in a fast cooling and/or viscous magma crystals cannot sink or float a significant distance and minerals are distributed homogeneously throughout the chamber; (2) in a slow cooling and/or low-viscosity magma crystals can quickly settle at the top and bottom of the chamber and crystals concentrations are never high enough to form "traffic jams". As a result, heavy and light minerals get fully separated in the chamber. Between these two end members, crystals can sink and float a significant distance, but not the whole height of the magma chamber before entrapment in "traffic jams". We illustrate the development of layers with numerical models and compare the results with the layered nepheline syenites (kakortokites) of the Ilímaussaq intrusion in SW Greenland. References: Bons, P.D., Baur, A., Elburg, M.A., Lindhuber, M.J., Marks, M.A.W., Soesoo, A., van Milligen, B.P., Walte, N.P. 2015

  2. Characterization of molecularly imprinted polymers using a new polar solvent titration method.

    PubMed

    Song, Di; Zhang, Yagang; Geer, Michael F; Shimizu, Ken D

    2014-07-01

    A new method of characterizing molecularly imprinted polymers (MIPs) was developed and tested, which provides a more accurate means of identifying and measuring the molecular imprinting effect. In the new polar solvent titration method, a series of imprinted and non-imprinted polymers were prepared in solutions containing increasing concentrations of a polar solvent. The polar solvent additives systematically disrupted the templation and monomer aggregation processes in the prepolymerization solutions, and the extent of disruption was captured by the polymerization process. The changes in binding capacity within each series of polymers were measured, providing a quantitative assessment of the templation and monomer aggregation processes in the imprinted and non-imprinted polymers. The new method was tested using three different diphenyl phosphate imprinted polymers made using three different urea functional monomers. Each monomer had varying efficiencies of templation and monomer aggregation. The new MIP characterization method was found to have several advantages. To independently verify the new characterization method, the MIPs were also characterized using traditional binding isotherm analyses. The two methods appeared to give consistent conclusions. First, the polar solvent titration method is less susceptible to false positives in identifying the imprinting effect. Second, the method is able to differentiate and quantify changes in binding capacity, as measured at a fixed guest and polymer concentration, arising from templation or monomer aggregation processes in the prepolymerization solution. Third, the method was also easy to carry out, taking advantage of the ease of preparing MIPs. Copyright © 2014 John Wiley & Sons, Ltd.

  3. Shallow Reflection Method for Water-Filled Void Detection and Characterization

    NASA Astrophysics Data System (ADS)

    Zahari, M. N. H.; Madun, A.; Dahlan, S. H.; Joret, A.; Hazreek, Z. A. M.; Mohammad, A. H.; Izzaty, R. A.

    2018-04-01

    Shallow investigation is crucial in enhancing the characteristics of subsurface void commonly encountered in civil engineering, and one such technique commonly used is seismic-reflection technique. An assessment of the effectiveness of such an approach is critical to determine whether the quality of the works meets the prescribed requirements. Conventional quality testing suffers limitations including: limited coverage (both area and depth) and problems with resolution quality. Traditionally quality assurance measurements use laboratory and in-situ invasive and destructive tests. However geophysical approaches, which are typically non-invasive and non-destructive, offer a method by which improvement of detection can be measured in a cost-effective way. Of this seismic reflection have proved useful to assess void characteristic, this paper evaluates the application of shallow seismic-reflection method in characterizing the water-filled void properties at 0.34 m depth, specifically for detection and characterization of void measurement using 2-dimensional tomography.

  4. Characterizing Non-Uniformity of Performance of Thin-Film Solar Cells

    NASA Technical Reports Server (NTRS)

    Clark, Eric B. (Technical Monitor); Lush, Gregory B.

    2003-01-01

    Thin-film Solar Cells are being actively studied for terrestrial and space applications because of their potential to provide low-cost, lightweight, and flexible electric power system. Currently, thin-film solar cell performance is limited partially by the nonuniformity of performance that they typically exhibit. This nonuniformity of performance necessitates more detailed characterization techniques than the well-known macroscopic measurements such as current-voltage and efficiency. This project seeks to explore methods of characterization that take into account the spatial nonuniformity of thin-film solar cells. In this presentation we show results of electroluminescence images, short-circuit maps, and Kelvin Probe maps. All these mapping characterization and analysis tools show that the non-uniformities can correlated with device performance and efficiency.

  5. BTSC VAPOR INSTRUSION PRIMER "VAPOR INTRUSION CONSIDERATION FOR REDEVELOPMENT"

    EPA Science Inventory

    This primer is designed for brownfields stakeholders concerned about vapor intrusion, including property owners, real estate developers, and contractors performing environmental site investigations. It provides an overview of the vapor intrusion issue and how it can impact the ap...

  6. Identification of saline water intrusion in part of Cauvery deltaic region, Tamil Nadu, Southern India: using GIS and VES methods

    NASA Astrophysics Data System (ADS)

    Gnanachandrasamy, G.; Ramkumar, T.; Venkatramanan, S.; Chung, S. Y.; Vasudevan, S.

    2016-06-01

    We use electrical resistivity data arrayed in a 2715 km2 region with 30 locations to identify the saline water intrusion zone in part of Cauvery deltaic region, offshore Eastern India. From this dataset we are able to derive information on groundwater quality, thickness of aquifer zone, structural and stratigraphic conditions relevant to groundwater conditions, and permeability of aquifer systems. A total of 30 vertical electrode soundings (VES) were carried out by Schlumberger electrode arrangement to indicate complete lithology of this region using curve matching techniques. The electrical soundings exhibited that H and HK type curves were suitable for 16 shallow locations, and QH, KQ, K, KH, QQ, and HA curves were fit for other location. Low resistivity values suggested that saline water intrusion occurred in this region. According to final GIS map, most of the region was severely affected by seawater intrusion due to the use of over-exploitation of groundwater.The deteriorated groundwater resources in this coastal region should raise environmental and health concerns.

  7. Differences in clinical intrusive thoughts between obsessive-compulsive disorder, generalized anxiety disorder, and hypochondria.

    PubMed

    Romero-Sanchiz, Pablo; Nogueira-Arjona, Raquel; Godoy-Ávila, Antonio; Gavino-Lázaro, Aurora; Freeston, Mark H

    2017-11-01

    Differences and similarities between intrusive thoughts typical of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis are relevant for their differential diagnosis, formulation, and psychological treatment. Previous research in non-clinical samples pointed out the relevance of some process variables, such as responsibility, guilt, or neutralization strategies. This research is aimed to investigate the differences and similarities between clinical obsessions, worries, and illness intrusions in some of these process variables. A second aim is to identify models based on these variables that could reliably differentiate between them. Three groups of patients with obsessive-compulsive disorder (n = 35; 60% women, mean age 38.57), generalized anxiety disorder (n = 36; 61.1% women, mean age 41.50), and hypochondriasis (n = 34; 70.6% women, mean age 31.59) were evaluated using the Cognitive Intrusions Questionnaire-Transdiagnostic Version (Romero-Sanchiz, Nogueira-Arjona, Godoy-Ávila, Gavino-Lázaro, & Freeston, ). The results showed that some appraisals (e.g., responsibility or egodystonicity), emotions (e.g., guilt or insecurity), neutralization strategies, and other variables (e.g., verbal content or trigger from body sensation) are relevant for the discrimination between obsessions, worries, and illness intrusions. The results also showed 3 stable models based on these variables for the discrimination between these thoughts. The implication of these results in the diagnosis, formulation, and psychological treatment of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis is discussed. Copyright © 2017 John Wiley & Sons, Ltd.

  8. Moderators and mediators of the relationship between stress and insomnia: stressor chronicity, cognitive intrusion, and coping.

    PubMed

    Pillai, Vivek; Roth, Thomas; Mullins, Heather M; Drake, Christopher L

    2014-07-01

    To assess moderators, such as stressor chronicity, and mediators, including stress response in the form of cognitive intrusion and coping behavior, of the prospective association between naturalistic stress and incident insomnia. Longitudinal. Epidemiological. A community-based sample of good sleepers (n = 2,892) with no lifetime history of insomnia. None. Participants reported the number of stressful events they had encountered at baseline, as well as the perceived severity and chronicity of each event. Similarly, volitional stress responses such as coping, as well as more involuntary responses such as cognitive intrusion were assayed for each stressor. Follow-up assessment 1 y hence revealed an insomnia incidence rate of 9.1%. Stress exposure was a significant predictor of insomnia onset, such that the odds of developing insomnia increased by 19% for every additional stressor. Chronicity significantly moderated this relationship, such that the likelihood of developing insomnia as a result of stress exposure increased as a function of chronicity. Cognitive intrusion significantly mediated the association between stress exposure and insomnia. Finally, three specific coping behaviors also acted as mediators: behavioral disengagement, distraction, and substance use. Most studies characterize the relationship between stress exposure and insomnia as a simple dose-response phenomenon. However, our data suggest that certain stressor characteristics significantly moderate this association. Stress response in the form of cognitive intrusion and specific maladaptive coping behaviors mediate the effects of stress exposure. These findings highlight the need for a multidimensional approach to stress assessment in future research and clinical practice. Pillai V, Roth T, Mullins HM, Drake CL. Moderators and mediators of the relationship between stress and insomnia: stressor chronicity, cognitive intrusion, and coping.

  9. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  10. Characterizing human activity induced impulse and slip-pulse excitations through structural vibration

    NASA Astrophysics Data System (ADS)

    Pan, Shijia; Mirshekari, Mostafa; Fagert, Jonathon; Ramirez, Ceferino Gabriel; Chung, Albert Jin; Hu, Chih Chi; Shen, John Paul; Zhang, Pei; Noh, Hae Young

    2018-02-01

    Many human activities induce excitations on ambient structures with various objects, causing the structures to vibrate. Accurate vibration excitation source detection and characterization enable human activity information inference, hence allowing human activity monitoring for various smart building applications. By utilizing structural vibrations, we can achieve sparse and non-intrusive sensing, unlike pressure- and vision-based methods. Many approaches have been presented on vibration-based source characterization, and they often either focus on one excitation type or have limited performance due to the dispersion and attenuation effects of the structures. In this paper, we present our method to characterize two main types of excitations induced by human activities (impulse and slip-pulse) on multiple structures. By understanding the physical properties of waves and their propagation, the system can achieve accurate excitation tracking on different structures without large-scale labeled training data. Specifically, our algorithm takes properties of surface waves generated by impulse and of body waves generated by slip-pulse into account to handle the dispersion and attenuation effects when different types of excitations happen on various structures. We then evaluate the algorithm through multiple scenarios. Our method achieves up to a six times improvement in impulse localization accuracy and a three times improvement in slip-pulse trajectory length estimation compared to existing methods that do not take wave properties into account.

  11. Network intrusion detection by the coevolutionary immune algorithm of artificial immune systems with clonal selection

    NASA Astrophysics Data System (ADS)

    Salamatova, T.; Zhukov, V.

    2017-02-01

    The paper presents the application of the artificial immune systems apparatus as a heuristic method of network intrusion detection for algorithmic provision of intrusion detection systems. The coevolutionary immune algorithm of artificial immune systems with clonal selection was elaborated. In testing different datasets the empirical results of evaluation of the algorithm effectiveness were achieved. To identify the degree of efficiency the algorithm was compared with analogs. The fundamental rules based of solutions generated by this algorithm are described in the article.

  12. Microbial ecology-based methods to characterize the bacterial communities of non-model insects.

    PubMed

    Prosdocimi, Erica M; Mapelli, Francesca; Gonella, Elena; Borin, Sara; Crotti, Elena

    2015-12-01

    Among the animals of the Kingdom Animalia, insects are unparalleled for their widespread diffusion, diversity and number of occupied ecological niches. In recent years they have raised researcher interest not only because of their importance as human and agricultural pests, disease vectors and as useful breeding species (e.g. honeybee and silkworm), but also because of their suitability as animal models. It is now fully recognized that microorganisms form symbiotic relationships with insects, influencing their survival, fitness, development, mating habits and the immune system and other aspects of the biology and ecology of the insect host. Thus, any research aimed at deepening the knowledge of any given insect species (perhaps species of applied interest or species emerging as novel pests or vectors) must consider the characterization of the associated microbiome. The present review critically examines the microbiology and molecular ecology techniques that can be applied to the taxonomical and functional analysis of the microbiome of non-model insects. Our goal is to provide an overview of current approaches and methods addressing the ecology and functions of microorganisms and microbiomes associated with insects. Our focus is on operational details, aiming to provide a concise guide to currently available advanced techniques, in an effort to extend insect microbiome research beyond simple descriptions of microbial communities. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Interfacial Granular Intrusions

    NASA Astrophysics Data System (ADS)

    Linden, Paul; Zheng, Zhong; Huppert, Herbert; Vriend, Nathalie; Neufeld, Jerome

    2017-11-01

    We study experimentally the intrusion of light granular material into an inviscid fluid of greater density. Despite a rich set of related geophysical and environmental phenomena, such as the spreading of calved ice and volcanic ash and debris flows, there are few previous studies on this topic. We conduct a series of lock-release experiments of light spherical beads into a rectangular tank initially filled with either fresh water or salt water, and record the time evolution of the interface shape and the front location of the current of beads. In particular, we find that the front location obeys a power-law behaviour during an intermediate time period following the release of the lock before the nose of beads reaches a maximum runout distance within a finite time. We investigate the dependence of the scaling exponent and runout distance on the total amount of beads, the initial lock length, and the properties of the liquid that fills the tank in the experiments. Appropriate scaling arguments are provided to collapse the raw experimental data into universal curves, which can be used to describe the front dynamics of light granular intrusions with different size and buoyancy effects and initial aspect ratios.

  14. Imaging high stage river-water intrusion into a contaminated aquifer along a major river corridor using 2D time-lapse surface electrical resistivity tomography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wallin, Erin L.; Johnson, Timothy C.; Greenwood, William J.

    2013-03-29

    The Hanford 300 Area is located adjacent to the Columbia River in south-central Washington State, USA, and was a former site for nuclear fuel processing operations. Waste disposal practices resulted in persistent unsaturated zone and groundwater contamination, the primary contaminant of concern being uranium. Uranium behavior at the site is intimately linked with river stage driven groundwater-river water exchange such that understanding the nature of river water intrusion into the 300 Area is critical for predicting uranium desorption and transport. In this paper we use time-lapse electrical resistivity tomography (ERT) to image the inland intrusion of river during high stagemore » conditions. We demonstrate a modified time-lapse inversion approach, whereby the transient water table elevation is explicitly modeled by removing regularization constraints across the water table boundary. This implementation was critical for producing meaningful imaging results. We inverted approximately 1200 data sets (400 per line over 3 lines) using high performance computing resources to produce a time-lapse sequence of changes in bulk conductivity caused by river water intrusion during the 2011 spring runoff cycle over approximately 125 days. The resulting time series for each mesh element was then analyzed using common time series analysis to reveal the timing and location of river water intrusion beneath each line. The results reveal non-uniform flows characterized by preferred flow zones where river water enters and exits quickly with stage increase and decrease, and low permeability zones with broader bulk conductivity ‘break through’ curves and longer river water residence times. The time-lapse ERT inversion approach removes the deleterious effects of changing water table elevation and enables remote and spatial continuous groundwater-river water exchange monitoring using surface based ERT arrays under conditions where groundwater and river water conductivity are in

  15. Paleozoic mafic-intermediate intrusions (320-287 Ma) in the Kalatongke area, southern Altai, NW China: Products of protracted magmatism in a convergent tectonic setting

    NASA Astrophysics Data System (ADS)

    Qian, Zhuangzhi; Duan, Jun; Li, Chusi; Xu, Gang; Feng, Yanqing; Ren, Meng

    2018-06-01

    Numerous small mafic-intermediate intrusions are present in the Kalatongke area in the southern part of the Paleozoic Altai Orogenic Belt, NW China. Previous studies reveal that most of these intrusions were emplaced at ∼287 Ma, broadly coeval with the eruption of alkaline flood basalts at ⩽282 Ma in the Tarim Craton. The similar ages have led some researchers to believe that the Tarim flood basalts and the Kalatongke mafic-intermediate intrusions are related to the same mantle plume. New and existing geochronological and geochemical data for the mafic-intermediate intrusions in the Kalatongke area together do not support such interpretation. Most of the intrusions in this small area (4.5 × 2 km) were emplaced at ∼287 Ma but our new data reveal that older intrusive rocks with zircon U-Pb ages from 290 ± 1.5 to 320 ± 2 Ma are also present. The temporal and spatial distribution of these intrusions does not show a hotspot track as expected by the mantle plume model. The intrusive rocks have similar Nd-Hf isotope compositions (εNd = 3-9, εHf = 15-19) and are all characterized by light REE enrichments relative to heavy REE, plus pronounced negative Nb-Ta anomalies. The oldest intrusion (∼320 Ma) also shows negative Zr-Hf anomalies, which are common in arc basalts but absent in continental flood basalts. The results of mixing calculations based on Sr-Nd-Hf isotopes and selected trace elements (Th, Nb and Yb) indicate that the parental magmas for these intrusions were all enriched in Th and depleted in Nb prior to crustal contamination, similar to the magmas generated in a convergent tectonic setting from subduction to post-subduction elsewhere in the world. The results from this study remind us that temporal correlation is not a reliable tool to determine the size of a mantle plume.

  16. A location-based multiple point statistics method: modelling the reservoir with non-stationary characteristics

    NASA Astrophysics Data System (ADS)

    Yin, Yanshu; Feng, Wenjie

    2017-12-01

    In this paper, a location-based multiple point statistics method is developed to model a non-stationary reservoir. The proposed method characterizes the relationship between the sedimentary pattern and the deposit location using the relative central position distance function, which alleviates the requirement that the training image and the simulated grids have the same dimension. The weights in every direction of the distance function can be changed to characterize the reservoir heterogeneity in various directions. The local integral replacements of data events, structured random path, distance tolerance and multi-grid strategy are applied to reproduce the sedimentary patterns and obtain a more realistic result. This method is compared with the traditional Snesim method using a synthesized 3-D training image of Poyang Lake and a reservoir model of Shengli Oilfield in China. The results indicate that the new method can reproduce the non-stationary characteristics better than the traditional method and is more suitable for simulation of delta-front deposits. These results show that the new method is a powerful tool for modelling a reservoir with non-stationary characteristics.

  17. Zone of intrusion study.

    DOT National Transportation Integrated Search

    2010-10-15

    The Midwest Roadside Safety Facility (MwRSF) performed an analysis using LS-DYNA simulation to investigate the zone of intrusion (ZOI) of an NCHRP Report No. 350 2000p pickup truck when impacting a 40-in. high F-shape parapet. : The ZOI for the 40-in...

  18. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    ERIC Educational Resources Information Center

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  19. Intrusion Detection: Generics and State-of-the-Art (la Detection de l’intrusion: Modeles generiques et etat de l’art)

    DTIC Science & Technology

    2002-01-01

    by the user for a number of possible pre-defined intrusions. One of these pre-defined intrusions is the command “get /etc/ passwd ”. If this command is...Application-level firewalls: which check communication at the application level. An example is the string get /etc/ passwd in the ftp protocol

  20. The water supply-water environment nexus in salt Intrusion area under the climate change

    NASA Astrophysics Data System (ADS)

    Liu, D.

    2017-12-01

    Water resources are critical problems in in salt Intrusion area for the increasing water supply and water quality deterioration. And the climate change exacerbates these problems. In order to balance the relationship between water supply and water environment requirements, the water supply-water environment nexus should be understood well. Based on the de Saint-Venant system of equations and the convection diffusion equation, which can be used to reflect the laws of water quality, the water supply- water environment nexus equation has be determined. And the nexus is dynamic with the climate change factors. The methods of determined the nexus have then been applied to a case study of the water supply-water environment nexus for the Pearl River Delta in China. The results indicate that the water supply-water environment nexus is trade off each other and are mainly affected by the fresh water flow from the upstream, salt water intrusion will reduce the resilience of the water supply system in this area. Our methods provides a useful framework to quantify the nexus according to the mechanisms of the water quantity and water quality, which will useful freshwater allocation and management in this saltwater intrusion area.

  1. Stochastic Optimization for an Analytical Model of Saltwater Intrusion in Coastal Aquifers

    PubMed Central

    Stratis, Paris N.; Karatzas, George P.; Papadopoulou, Elena P.; Zakynthinaki, Maria S.; Saridakis, Yiannis G.

    2016-01-01

    The present study implements a stochastic optimization technique to optimally manage freshwater pumping from coastal aquifers. Our simulations utilize the well-known sharp interface model for saltwater intrusion in coastal aquifers together with its known analytical solution. The objective is to maximize the total volume of freshwater pumped by the wells from the aquifer while, at the same time, protecting the aquifer from saltwater intrusion. In the direction of dealing with this problem in real time, the ALOPEX stochastic optimization method is used, to optimize the pumping rates of the wells, coupled with a penalty-based strategy that keeps the saltwater front at a safe distance from the wells. Several numerical optimization results, that simulate a known real aquifer case, are presented. The results explore the computational performance of the chosen stochastic optimization method as well as its abilities to manage freshwater pumping in real aquifer environments. PMID:27689362

  2. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    PubMed Central

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  3. Detection of ethene and other hydrocarbons in gas turbine engine exhaust using non-intrusive FTIR spectroscopy

    NASA Astrophysics Data System (ADS)

    Arrigone, Giovanni M.; Welch, Michael A.; Hilton, Moira; Miller, Michael N.; Wilson, Christopher W.

    2003-04-01

    obtained by traversing the probe across a horizontal plane through the centerline could be compared with non-intrusive measurements made by scanning vertically. Adjustments have been made to account for the 20 cm downstream offset in measurement planes of the probe and the spectrometer behind the nozzle exit.

  4. Non-Linear Structural Dynamics Characterization using a Scanning Laser Vibrometer

    NASA Technical Reports Server (NTRS)

    Pai, P. F.; Lee, S.-Y.

    2003-01-01

    This paper presents the use of a scanning laser vibrometer and a signal decomposition method to characterize non-linear dynamics of highly flexible structures. A Polytec PI PSV-200 scanning laser vibrometer is used to measure transverse velocities of points on a structure subjected to a harmonic excitation. Velocity profiles at different times are constructed using the measured velocities, and then each velocity profile is decomposed using the first four linear mode shapes and a least-squares curve-fitting method. From the variations of the obtained modal \\ielocities with time we search for possible non-linear phenomena. A cantilevered titanium alloy beam subjected to harmonic base-excitations around the second. third, and fourth natural frequencies are examined in detail. Influences of the fixture mass. gravity. mass centers of mode shapes. and non-linearities are evaluated. Geometrically exact equations governing the planar, harmonic large-amplitude vibrations of beams are solved for operational deflection shapes using the multiple shooting method. Experimental results show the existence of 1:3 and 1:2:3 external and internal resonances. energy transfer from high-frequency modes to the first mode. and amplitude- and phase- modulation among several modes. Moreover, the existence of non-linear normal modes is found to be questionable.

  5. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion.

    PubMed

    Wilson, Jordan L; Samaranayake, V A; Limmer, Matt A; Burken, Joel G

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman's correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with minimal

  6. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion

    USGS Publications Warehouse

    Wilson, Jordan L.; Samaranayake, V.A.; Limmer, Matthew A.; Burken, Joel G.

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman’s correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with

  7. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion

    PubMed Central

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman’s correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with

  8. Scanning Seismic Intrusion Detector

    NASA Technical Reports Server (NTRS)

    Lee, R. D.

    1982-01-01

    Scanning seismic intrusion detector employs array of automatically or manually scanned sensors to determine approximate location of intruder. Automatic-scanning feature enables one operator to tend system of many sensors. Typical sensors used with new system are moving-coil seismic pickups. Detector finds uses in industrial security systems.

  9. 40 CFR 197.26 - What are the circumstances of the human intrusion?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... human intrusion? 197.26 Section 197.26 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... YUCCA MOUNTAIN, NEVADA Public Health and Environmental Standards for Disposal Human-Intrusion Standard § 197.26 What are the circumstances of the human intrusion? For the purposes of the analysis of human...

  10. Geoelectrical and hydrochemical study for the assessment of seawater intrusion evolution in coastal aquifers of Oualidia, Morocco

    NASA Astrophysics Data System (ADS)

    Fadili, Ahmed; Najib, Saliha; Mehdi, Khalid; Riss, Joëlle; Malaurent, Philippe; Makan, Abdelhadi

    2017-11-01

    This study aims to assess the evolution of seawater intrusion between 1992 and 2011 periods in the coastal aquifers of Oualidia. To achieve this objective, the combination of geoelectrical and hydrochemical methods was adopted. Apparent resistivity maps, using 74 Vertical Electrical Sounding (VES) performed on 1992, allowed to distinguish two different zones. The conductive one, with apparent resistivity ranging between 4 and 86 Ω·m, is limited to 1 km with respect to the ocean. Meanwhile, the resistant one is much farther from the coastline. Besides, results of Electrical Resistivity Tomography (ERT) profiles performed during 2011 are in good agreement with those obtained by apparent resistivity maps. The ERT profiles show a conductive level characterized by low resistivity below 30 Ω·m assigned to seawater intrusion effect. Moreover, hydrochemical analysis, performed on 19 wells during three different periods, on June, December 2010 and May 2011, indicates that the most affected part with marine waters was at that time localized in the first kilometer from the ocean, with high amounts of Na+ and Cl- ions. Beyond this fringe, mineralization becomes very weak. Overall, the comparison of old VES with recent ERT coupled with hydrochemical results suggest no important evolution of the salt wedge since 1992.

  11. Observed assertive and intrusive maternal feeding behaviors increase child adiposity123

    PubMed Central

    Ozbeki, Tina N; Appugliese, Danielle P; Kaciroti, Niko; Corwyn, Robert F; Bradley, Robert H

    2012-01-01

    Background: Few studies have examined observed maternal feeding behaviors and their potential association with child adiposity. The association between maternal prompting to eat and child adiposity has been inconsistent. Objectives: This study sought to identify factors associated with maternal feeding behaviors and to test the hypothesis that more maternal prompts to eat, more assertive prompts, and more intrusiveness are associated with greater child adiposity. Design: Children (n = 1218) and their mothers were videotaped eating a standardized snack at ages 15, 24, and 36 mo. Maternal prompts to eat, the percentage of prompts that were assertive, and intrusiveness were coded. Adjusted regression analyses evaluated predictors of prompts, the percentage of assertive prompts, and intrusiveness and the relation of each of these factors with child adiposity (weight-for-length z score at 15 mo and BMI z score at 24 and 36 mo) after control for the child's race-ethnicity and sex, family income-to-needs ratio, and maternal education, weight status, and depressive symptoms. Results: At 36 mo, mothers gave an average of 9.3 prompts; 61% of prompts were assertive, and 48% of mothers were intrusive. Lower maternal education and minority race-ethnicity were associated with a greater percentage of assertive prompts and intrusiveness. A greater percentage of assertive prompts and intrusiveness, but not total prompts, was associated with higher child adiposity. Conclusions: Assertive prompting and an intrusive style had small but significant associations with greater child adiposity. Future work should focus on maternal motivations for assertive and intrusive feeding styles and mechanisms through which these feeding styles might increase child adiposity. PMID:22277552

  12. Simulating the influence of groundwater table fluctuation on vapor intrusion

    NASA Astrophysics Data System (ADS)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  13. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  14. Moderators and Mediators of the Relationship Between Stress and Insomnia: Stressor Chronicity, Cognitive Intrusion, and Coping

    PubMed Central

    Pillai, Vivek; Roth, Thomas; Mullins, Heather M.; Drake, Christopher L.

    2014-01-01

    Study Objectives: To assess moderators, such as stressor chronicity, and mediators, including stress response in the form of cognitive intrusion and coping behavior, of the prospective association between naturalistic stress and incident insomnia. Design: Longitudinal. Setting: Epidemiological. Participants: A community-based sample of good sleepers (n = 2,892) with no lifetime history of insomnia. Interventions: None. Measurements and Results: Participants reported the number of stressful events they had encountered at baseline, as well as the perceived severity and chronicity of each event. Similarly, volitional stress responses such as coping, as well as more involuntary responses such as cognitive intrusion were assayed for each stressor. Follow-up assessment 1 y hence revealed an insomnia incidence rate of 9.1%. Stress exposure was a significant predictor of insomnia onset, such that the odds of developing insomnia increased by 19% for every additional stressor. Chronicity significantly moderated this relationship, such that the likelihood of developing insomnia as a result of stress exposure increased as a function of chronicity. Cognitive intrusion significantly mediated the association between stress exposure and insomnia. Finally, three specific coping behaviors also acted as mediators: behavioral disengagement, distraction, and substance use. Conclusions: Most studies characterize the relationship between stress exposure and insomnia as a simple dose-response phenomenon. However, our data suggest that certain stressor characteristics significantly moderate this association. Stress response in the form of cognitive intrusion and specific maladaptive coping behaviors mediate the effects of stress exposure. These findings highlight the need for a multidimensional approach to stress assessment in future research and clinical practice. Citation: Pillai V, Roth T, Mullins HM, Drake CL. Moderators and mediators of the relationship between stress and insomnia

  15. METHOD AND LOCATION OF GROUND WATER SAMPLING: IMPACT ON ATTENUATION FACTORS FOR ASSESSING IMPACT ON VAPOR INTRUSION

    EPA Science Inventory

    The Draft EPA Subsurface Vapor Intrusion Guidance Document was established to "address the incremental increases in exposures and risks from subsurface contaminants that my be intruding into indoor air". The document utilizes attenuation factors based on indoor air/soil gas or i...

  16. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  17. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  18. Integrating asthma hazard characterization methods for consumer products.

    PubMed

    Maier, A; Vincent, M J; Gadagbui, B; Patterson, J; Beckett, W; Dalton, P; Kimber, I; Selgrade, M J K

    2014-10-01

    Despite extensive study, definitive conclusions regarding the relationship between asthma and consumer products remain elusive. Uncertainties reflect the multi-faceted nature of asthma (i.e., contributions of immunologic and non-immunologic mechanisms). Many substances used in consumer products are associated with occupational asthma or asthma-like syndromes. However, risk assessment methods do not adequately predict the potential for consumer product exposures to trigger asthma and related syndromes under lower-level end-user conditions. A decision tree system is required to characterize asthma and respiratory-related hazards associated with consumer products. A system can be built to incorporate the best features of existing guidance, frameworks, and models using a weight-of-evidence (WoE) approach. With this goal in mind, we have evaluated chemical hazard characterization methods for asthma and asthma-like responses. Despite the wealth of information available, current hazard characterization methods do not definitively identify whether a particular ingredient will cause or exacerbate asthma, asthma-like responses, or sensitization of the respiratory tract at lower levels associated with consumer product use. Effective use of hierarchical lines of evidence relies on consideration of the relevance and potency of assays, organization of assays by mode of action, and better assay validation. It is anticipated that the analysis of existing methods will support the development of a refined WoE approach. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.

  19. Distributed intrusion detection system based on grid security model

    NASA Astrophysics Data System (ADS)

    Su, Jie; Liu, Yahui

    2008-03-01

    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  20. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  1. Damage assessment using advanced non-intrusive inspection methods: integration of space, UAV, GPR, and field spectroscopy

    NASA Astrophysics Data System (ADS)

    Themistocleous, Kyriacos; Neocleous, Kyriacos; Pilakoutas, Kypros; Hadjimitsis, Diofantos G.

    2014-08-01

    The predominant approach for conducting road condition surveys and analyses is still largely based on extensive field observations. However, visual assessment alone cannot identify the actual extent and severity of damage. New non-invasive and cost-effective non-destructive (NDT) remote sensing technologies can be used to monitor road pavements across their life cycle, including remotely sensed aerial and satellite visual and thermal image (AI) data, Unmanned Aerial Vehicles (UAVs), Spectroscopy and Ground Penetrating Radar (GRP). These non-contact techniques can be used to obtain surface and sub-surface information about damage in road pavements, including the crack depth, and in-depth structural failure. Thus, a smart and cost-effective methodology is required that integrates several of these non-destructive/ no-contact techniques for the damage assessment and monitoring at different levels. This paper presents an overview of how an integration of the above technologies can be used to conduct detailed road condition surveys. The proposed approach can also be used to predict the future needs for road maintenance; this information is proven to be valuable to a strategic decision making tools that optimizes maintenance based on resources and environmental issues.

  2. The importance of context: evidence that contextual representations increase intrusive memories.

    PubMed

    Pearson, David G; Ross, Fiona D C; Webster, Victoria L

    2012-03-01

    Intrusive memories appear to enter consciousness via involuntary rather than deliberate recollection. Some clinical accounts of PTSD seek to explain this phenomenon by making a clear distinction between the encoding of sensory-based and contextual representations. Contextual representations have been claimed to actively reduce intrusions by anchoring encoded perceptual data for an event in memory. The current analogue trauma study examined this hypothesis by manipulating contextual information independently from encoded sensory-perceptual information. Participants' viewed images selected from the International Affective Picture System that depicted scenes of violence and bodily injury. Images were viewed either under neutral conditions or paired with contextual information. Two experiments revealed a significant increase in memory intrusions for images paired with contextual information in comparison to the same images viewed under neutral conditions. In contrast to the observed increase in intrusion frequency there was no effect of contextual representations on voluntary memory for the images. The vividness and emotionality of memory intrusions were also unaffected. The analogue trauma paradigm may fail to replicate the effect of extreme stress on encoding postulated to occur during PTSD. These findings question the assertion that intrusive memories develop from a lack of integration between sensory-based and contextual representations in memory. Instead it is argued contextual representations play a causal role in increasing the frequency of intrusions by increasing the sensitivity of memory to involuntary retrieval by associated internal and external cues. Copyright © 2011 Elsevier Ltd. All rights reserved.

  3. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    NASA Astrophysics Data System (ADS)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  4. Non-Destructive Characterization of UO2+x Nuclear Fuels

    DOE PAGES

    Pokharel, Reeju; Brown, Donald W.; Clausen, Bjørn; ...

    2017-10-27

    This article describes the effect of fabrication conditions on as-sintered microstructures of various stoichiometric ratios of uranium dioxide, UO 2+x, with the aim of enhancing the understanding of fabrication process and developing and validating a predictive microstructurebased model for fuel performance. We demonstrate the ability of novel, non-destructive methods such as near-field high-energy X-ray diffraction microscopy (nf-HEDM) and micro-computed tomography (μ-CT) to probe bulk samples of high-Z materials by non-destructively characterizing three samples: UO 2.00, UO 2.11, and UO 2.16, which were sintered at 1450°C for 4 hours. The measured 3D microstructures revealed that grain size and porosity were influencedmore » by deviation from stoichiometry.« less

  5. Experimental saltwater intrusion in coastal aquifers using automated image analysis: Applications to homogeneous aquifers

    NASA Astrophysics Data System (ADS)

    Robinson, G.; Ahmed, Ashraf A.; Hamill, G. A.

    2016-07-01

    This paper presents the applications of a novel methodology to quantify saltwater intrusion parameters in laboratory-scale experiments. The methodology uses an automated image analysis procedure, minimising manual inputs and the subsequent systematic errors that can be introduced. This allowed the quantification of the width of the mixing zone which is difficult to measure in experimental methods that are based on visual observations. Glass beads of different grain sizes were tested for both steady-state and transient conditions. The transient results showed good correlation between experimental and numerical intrusion rates. The experimental intrusion rates revealed that the saltwater wedge reached a steady state condition sooner while receding than advancing. The hydrodynamics of the experimental mixing zone exhibited similar traits; a greater increase in the width of the mixing zone was observed in the receding saltwater wedge, which indicates faster fluid velocities and higher dispersion. The angle of intrusion analysis revealed the formation of a volume of diluted saltwater at the toe position when the saltwater wedge is prompted to recede. In addition, results of different physical repeats of the experiment produced an average coefficient of variation less than 0.18 of the measured toe length and width of the mixing zone.

  6. Pore Structure Characterization of Sodium Hydroxide Activated Slag Using Mercury Intrusion Porosimetry, Nitrogen Adsorption, and Image Analysis.

    PubMed

    Zuo, Yibing; Ye, Guang

    2018-06-19

    The pore structure of alkali-activated slag has a significant influence on its performance. However, the literature shows insufficient studies regarding the suitability of different techniques for characterizing the pore structure and the influences of Na₂O and curing age on pore structure development. In pursuit of a better understanding, the pore structure of sodium hydroxide activated slag paste was characterized by multiple techniques, e.g., mercury intrusion porosimetry (MIP), nitrogen (N₂) adsorption, and scanning electron microscopy (SEM) image analysis. The sodium hydroxide activated slag pastes were prepared with three different contents of Na₂O (Na₂O/slag = 4, 6, and 8%) and cured for different times up to 360 days. The microstructure observation reveals that outer C⁻(N⁻)A⁻S⁻H and inner C⁻(N⁻)A⁻S⁻H grow successively around the reacting slag grains, along with crystalline reaction products which are formed in the empty coarse pore space. The increase of Na₂O content and curing age lead to a finer pore structure. The MIP measurements show that the total porosity drops about 70% within the first day, and that one peak at most, corresponding to gel pores, was identified in the differential curves of all the investigated samples from 1 to 360 days. On the contrary, only one peak, corresponding to capillary pores, was identified by SEM-image analysis. The differential curves derived from N₂ adsorption generally reveal two peaks, and the trend that the pore diameters of those two peaks vary with curing age depends on the content of Na₂O. Compared to Portland cement, sodium hydroxide activated slag has a higher pore space filling capacity ( χ , V products / V slag-reacted ), while the capacity decreases with increasing Na₂O content and curing age.

  7. Work zone intrusion alarm effectiveness.

    DOT National Transportation Integrated Search

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  8. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes.

    PubMed

    Passarelli, L; Rivalta, E; Shuler, A

    2014-01-28

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process.

  9. Tell me more: Can a memory test reduce analogue traumatic intrusions?

    PubMed

    Krans, Julie; Näring, Gérard; Holmes, Emily A; Becker, Eni S

    2009-05-01

    Information processing theories of post-traumatic stress disorder (PTSD) state that intrusive images emerge due to a lack of integration of perceptual trauma representations in autobiographical memory. To test this hypothesis experimentally, participants were shown an aversive film to elicit intrusive images. After viewing, they received a recognition test for just one part of the film. The test contained neutrally formulated items to rehearse information from the film. Participants reported intrusive images for the film in an intrusion diary during one week after viewing. In line with expectations, the number of intrusive images decreased only for the part of the film for which the recognition test was given. Furthermore, deliberate cued-recall memory after one week was selectively enhanced for the film part that was in the recognition test a week before. The findings provide new evidence supporting information processing models of PTSD and have potential implications for early interventions after trauma.

  10. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    PubMed Central

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  11. Contrasting catastrophic eruptions predicted by different intrusion and collapse scenarios.

    PubMed

    Rincón, M; Márquez, A; Herrera, R; Alonso-Torres, A; Granja-Bruña, J L; van Wyk de Vries, B

    2018-04-18

    Catastrophic volcanic eruptions triggered by landslide collapses can jet upwards or blast sideways. Magma intrusion is related to both landslide-triggered eruptive scenarios (lateral or vertical), but it is not clear how such different responses are produced, nor if any precursor can be used for forecasting them. We approach this problem with physical analogue modelling enhanced with X-ray Multiple Detector Computed Tomography scanning, used to track evolution of internal intrusion, and its related faulting and surface deformation. We find that intrusions produce three different volcano deformation patterns, one of them involving asymmetric intrusion and deformation, with the early development of a listric slump fault producing pronounced slippage of one sector. This previously undescribed early deep potential slip surface provides a unified explanation for the two different eruptive scenarios (lateral vs. vertical). Lateral blast only occurs in flank collapse when the intrusion has risen into the sliding block. Otherwise, vertical rather than lateral expansion of magma is promoted by summit dilatation and flank buttressing. The distinctive surface deformation evolution detected opens the possibility to forecast the possible eruptive scenarios: laterally directed blast should only be expected when surface deformation begins to develop oblique to the first major fault.

  12. Tetris and Word games lead to fewer intrusive memories when applied several days after analogue trauma.

    PubMed

    Hagenaars, Muriel A; Holmes, Emily A; Klaassen, Fayette; Elzinga, Bernet

    2017-01-01

    Background : Intrusive trauma memories are a key symptom of posttraumatic stress disorder (PTSD), so disrupting their recurrence is highly important. Intrusion development was hindered by visuospatial interventions administered up to 24 hours after analogue trauma. It is unknown whether interventions can be applied later, and whether modality or working-memory load are crucial factors. Objectives : This study tested: (1) whether a visuospatial task would lead to fewer intrusions compared to a reactivation-only group when applied after memory reactivation four days after analogue trauma exposure (extended replication), (2) whether both tasks (i.e. one aimed to be visuospatial, one more verbal) would lead to fewer intrusions than the reactivation-only group (intervention effect), and (3) whether supposed task modality (visuospatial or verbal) is a critical component (modality effect). Method : Fifty-four participants were randomly assigned to reactivation+Tetris (visuospatial), reactivation+Word games (verbal), or reactivation-only (no task). They watched an aversive film (day 0) and recorded intrusive memories of the film in diary A. On day 4, memory was reactivated, after which participants played Tetris, Word games, or had no task for 10 minutes. They then kept a second diary (B). Informative hypotheses were evaluated using Bayes factors. Results : Reactivation+Tetris and reactivation+Word games resulted in relatively fewer intrusions from the last day of diary A to the first day of diary B than reactivation-only (objective 1 and 2). Thus, both tasks were effective even when applied days after analogue trauma. Reactivation-only was not effective. Reactivation+Word games appeared to result in fewer intrusions than reactivation+Tetris (objective 3; modality effect), but this evidence was weak. Explorative analyses showed that Word games were more difficult than Tetris. Conclusions : Applying a task four days after the trauma film (during memory reconsolidation

  13. Emplacement of the early Miocene Pinto Peak intrusion, Southwest Utah, USA

    NASA Astrophysics Data System (ADS)

    Petronis, Michael S.; O'Driscoll, Brian

    2013-12-01

    In this contribution, we report rock magnetic, petrographic, and anisotropy of magnetic susceptibility (AMS) data from the Pinto Peak intrusion, all of which bear on volcanic construction. Rock magnetic data indicate that the dominant magnetic mineral phase is low-Ti titanomagnetite of multidomain grain size, the composition of which varies spatially across the intrusion. The intrusion is a porphyritic andesite dominated by Ca-rich plagioclase (>60%) as well as biotite, amphibole, olivine, and opaque minerals. Reflected light petrography reveals mostly euhedral-subhedral (titano)magnetite crystals that often form clustered glomerocrysts and stringers of equant crystals, without exhibiting a consistent mineral alignment fabric. Moderate-to-shallow plunging prolate magnetic susceptibility ellipsoids dominate the northern part of the intrusion while steeply dipping/plunging magnetic susceptibility ellipsoids are generally restricted to the southern part of the intrusion. The vent facies rocks yield moderate-to-steep oblate susceptibility ellipsoids. We interpret the flow pattern in the north to reflect subhorizontal flow of magma, filling a tabular sheet-like body associated with propagation of the intrusion to the north. We argue that the southern part of the intrusion represents the ascent site of the magma rising to shallow crustal levels along a steep feeder system. The oblate magnetic fabrics in the vent area plausibly represent flattening against the conduit walls as evidenced by a weak planar flow foliation observed in the vent conduit rocks. On reaching shallow crustal levels, the magma deformed and uplifted the roof rocks leading to gravitational instability. As the slide mass released from the roof, an explosive eruption ensued resulting in the emplacement of the Rocks of Paradise tuff and associated effusive lava flows. Following eruption, magma pressure decreased and the magma drained northward forming the northern intrusive phase.

  14. A Novel Non-Intrusive Method to Resolve the Thermal-Dome-Effect of Pyranometers: Radiometric Calibration and Implications

    NASA Technical Reports Server (NTRS)

    Ji, Qiang; Tsay, Si-Chee; Lau, K. M.; Hansell, R. A.; Butler, J. J.; Cooper, J. W.

    2011-01-01

    Traditionally the calibration equation for pyranometers assumes that the measured solar irradiance is solely proportional to the thermopile's output voltage; therefore only a single calibration factor is derived. This causes additional measurement uncertainties because it does not capture sufficient information to correctly account for a pyranometer's thermal effect. In our updated calibration equation, temperatures from the pyranometer's dome and case are incorporated to describe the instrument's thermal behavior, and a new set of calibration constants are determined, thereby reducing measurement uncertainties. In this paper, we demonstrate why a pyranometer's uncertainty using the traditional calibration equation is always larger than a-few-percent, but with the new approach can become much less than 1% after the thermal issue is resolved. The highlighted calibration results are based on NIST-traceable light sources under controlled laboratory conditions. The significance of the new approach lends itself to not only avoiding the uncertainty caused by a pyranometer's thermal effect but also the opportunity to better isolate and characterize other instrumental artifacts, such as angular response and non-linearity of the thermopile, to further reduce additional uncertainties. We also discuss some of the implications, including an example of how the thermal issue can potentially impact climate studies by evaluating aerosol's direct-radiative effect using field measurements with and without considering the pyranometer's thermal effect. The results of radiative transfer model simulation show that a pyranometer's thermal effect on solar irradiance measurements at the surface can be translated into a significant alteration of the calculated distribution of solar energy inside the column atmosphere.

  15. Efficient cooling of rocky planets by intrusive magmatism

    NASA Astrophysics Data System (ADS)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  16. Sulfide intrusion in the tropical seagrasses Thalassia testudinum and Syringodium filiforme

    NASA Astrophysics Data System (ADS)

    Holmer, Marianne; Pedersen, Ole; Krause-Jensen, Dorte; Olesen, Birgit; Hedegård Petersen, Malene; Schopmeyer, Stephanie; Koch, Marguerite; Lomstein, Bente Aa.; Jensen, Henning S.

    2009-11-01

    Sulfur and oxygen dynamics in the seagrasses Thalassia testudinum and Syringodium filiforme and their sediments were studied in the US Virgin Islands (USVI) in order to explore sulfide intrusion into tropical seagrasses. Four study sites were selected based on the iron concentration in sediments and on proximity to anthropogenic nutrient sources. Meadow characteristics (shoot density, above- and below-ground biomass, nutrient content) were sampled along with sediment biogeochemistry. Sulfide intrusion was high in T. testudinum, as up to 96% of total sulfur in the plant was derived from sediment-derived sulfides. The sulfide intrusion was negatively correlated to the turnover of sulfides in the sediments regulated by both plant parameters and sediment sulfur pools. Sediment iron content played an indirect role by affecting sulfide turnover rates. Leaf production was negatively correlated with sulfide intrusion suggesting that active growth reduced sulfide intrusion. Sulfide intrusion was lower in S. filiforme (up to 44%) compared to T. testudinum consistent with a higher internal nighttime oxygen concentrations found for S. filiforme. When S. filiforme can take advantage of its ability to maintain high internal oxygen concentrations, as was the case on the USVI, it could increase its success in colonizing unvegetated disturbed sediments with potentially high sulfide concentrations.

  17. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    PubMed Central

    Chapman, Helen R.; Kirby-Turner, Nick

    2018-01-01

    Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised) evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists. PMID:29719519

  18. Inducing and modulating intrusive emotional memories: a review of the trauma film paradigm.

    PubMed

    Holmes, Emily A; Bourne, Corin

    2008-03-01

    Highly affect-laden memory intrusions are a feature of several psychological disorders with intrusive images of trauma especially associated with post-traumatic stress disorder (PTSD). The trauma film paradigm provides a prospective experimental tool for investigating analogue peri-traumatic cognitive mechanisms underlying intrusion development. We review several historical papers and some more recent key studies that have used the trauma film paradigm. A heuristic diagram is presented, designed to simplify predictions about analogue peri-traumatic processing and intrusion development, which can also be related to the processing elements of recent cognitive models of PTSD. Results show intrusions can be induced in the laboratory and their frequency amplified/attenuated in line with predictions. Successful manipulations include competing task type (visuospatial vs. verbal) and use of a cognitive coping strategy. Studies show that spontaneous peri-traumatic dissociation also affects intrusion frequency although attempts to manipulate dissociation have failed. It is hoped that further use of this paradigm may lead to prophylactic training for at risk groups and an improved understanding of intrusions across psychopathologies.

  19. Deep intrusions, lateral magma transport and related uplift at ocean island volcanoes

    NASA Astrophysics Data System (ADS)

    Klügel, Andreas; Longpré, Marc-Antoine; García-Cañada, Laura; Stix, John

    2015-12-01

    Oceanic intraplate volcanoes grow by accumulation of erupted material as well as by coeval or discrete magmatic intrusions. Dykes and other intrusive bodies within volcanic edifices are comparatively well studied, but intrusive processes deep beneath the volcanoes remain elusive. Although there is geological evidence for deep magmatic intrusions contributing to volcano growth through uplift, this has rarely been demonstrated by real-time monitoring. Here we use geophysical and petrological data from El Hierro, Canary Islands, to show that intrusions from the mantle and subhorizontal transport of magma within the oceanic crust result in rapid endogenous island growth. Seismicity and ground deformation associated with a submarine eruption in 2011-2012 reveal deep subhorizontal intrusive sheets (sills), which have caused island-scale uplift of tens of centimetres. The pre-eruptive intrusions migrated 15-20 km laterally within the lower oceanic crust, opening pathways that were subsequently used by the erupted magmas to ascend from the mantle to the surface. During six post-eruptive episodes between 2012 and 2014, further sill intrusions into the lower crust and upper mantle have caused magma to migrate up to 20 km laterally, resulting in magma accumulation exceeding that of the pre-eruptive phase. A comparison of geobarometric data for the 2011-2012 El Hierro eruption with data for other Atlantic intraplate volcanoes shows similar bimodal pressure distributions, suggesting that eruptive phases are commonly accompanied by deep intrusions of sills and lateral magma transport. These processes add significant material to the oceanic crust, cause uplift, and are thus fundamentally important for the growth and evolution of volcanic islands. We suggest that the development of such a magma accumulation zone in the lower oceanic crust begins early during volcano evolution, and is a consequence of increasing size and complexity of the mantle reservoir system, and potentially

  20. State of the Practice of Intrusion Detection Technologies

    DTIC Science & Technology

    2000-01-01

    security incident response teams ) - the role of IDS in threat management, such as defining alarm severity, monitoring, alerting, and policy-based...attacks in an effort to sneak under the radar of security specialists and intrusion detection software, a U.S. Navy network security team said today...to get the smoking gun," said Stephen Northcutt, head of the Shadow intrusion detection team at the Naval Surface Warfare Center. "To know what’s

  1. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks

    PubMed Central

    Yan, Jing; Li, Xiaolei; Luo, Xiaoyuan; Guan, Xinping

    2017-01-01

    Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs consist of two kinds of nodes, i.e., sensor nodes (SNs), which cannot move autonomously, and actuator nodes (ANs), which can move autonomously according to the performance requirement. With the cooperation of SNs and ANs, the intruder detection probability is defined. Then, a virtual lattice-based monitor (VLM) algorithm is proposed to detect the intruder. In order to reduce the redundancy of communication links and improve detection probability, an optimal and coordinative lattice-based monitor patrolling (OCLMP) algorithm is further provided for UWSNs, wherein an equal price search strategy is given for ANs to find the shortest patrolling path. Under VLM and OCLMP algorithms, the detection probabilities are calculated, while the topology connectivity can be guaranteed. Finally, simulation results are presented to show that the proposed method in this paper can improve the detection accuracy and save the energy consumption compared with the conventional methods. PMID:28531127

  2. Spot size characterization of focused non-Gaussian X-ray laser beams.

    PubMed

    Chalupský, J; Krzywinski, J; Juha, L; Hájková, V; Cihelka, J; Burian, T; Vysín, L; Gaudin, J; Gleeson, A; Jurek, M; Khorsand, A R; Klinger, D; Wabnitz, H; Sobierajski, R; Störmer, M; Tiedtke, K; Toleikis, S

    2010-12-20

    We present a new technique for the characterization of non-Gaussian laser beams which cannot be described by an analytical formula. As a generalization of the beam spot area we apply and refine the definition of so called effective area (A(eff)) [1] in order to avoid using the full-width at half maximum (FWHM) parameter which is inappropriate for non-Gaussian beams. Furthermore, we demonstrate a practical utilization of our technique for a femtosecond soft X-ray free-electron laser. The ablative imprints in poly(methyl methacrylate) - PMMA and amorphous carbon (a-C) are used to characterize the spatial beam profile and to determine the effective area. Two procedures of the effective area determination are presented in this work. An F-scan method, newly developed in this paper, appears to be a good candidate for the spatial beam diagnostics applicable to lasers of various kinds.

  3. Magnetic fabric constraints of the emplacement of igneous intrusions

    NASA Astrophysics Data System (ADS)

    Maes, Stephanie M.

    Fabric analysis is critical to evaluating the history, kinematics, and dynamics of geological deformation. This is particularly true of igneous intrusions, where the development of fabric is used to constrain magmatic flow and emplacement mechanisms. Fabric analysis was applied to three mafic intrusions, with different tectonic and petrogenetic histories, to study emplacement and magma flow: the Insizwa sill (Mesozoic Karoo Large Igneous Province, South Africa), Sonju Lake intrusion (Proterozoic Midcontinent Rift, Minnesota, USA), and Palisades sill (Mesozoic rift basin, New Jersey, USA). Multiple fabric analysis techniques were used to define the fabric in each intrusive body. Using digital image analysis techniques on multiple thin sections, the three-dimensional shape-preferred orientation (SPO) of populations of mineral phases were calculated. Low-field anisotropy of magnetic susceptibility (AMS) measurements were used as a proxy for the mineral fabric of the ferromagnetic phases (e.g., magnetite). In addition, a new technique---high-field AMS---was used to isolate the paramagnetic component of the fabric (e.g., silicate fabric). Each fabric analysis technique was then compared to observable field fabrics as a framework for interpretation. In the Insizwa sill, magnetic properties were used to corroborate vertical petrologic zonation and distinguish sub-units within lithologically defined units. Abrupt variation in magnetic properties provides evidence supporting the formation of the Insizwa sill by separate magma intrusions. Low-field AMS fabrics in the Sonju Lake intrusion exhibit consistent SW-plunging lineations and SW-dipping foliations. These fabric orientations provide evidence that the cumulate layers in the intrusion were deposited in a dynamic environment, and indicate magma flowed from southwest to northeast, parallel to the pre-existing rift structures. In the Palisades sill, the magnetite SPO and low-field AMS lineation have developed orthogonal to

  4. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island.

    NASA Astrophysics Data System (ADS)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen

    2017-04-01

    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  5. Impact of chemical lateral boundary conditions in a regional air quality forecast model on surface ozone predictions during stratospheric intrusions

    NASA Astrophysics Data System (ADS)

    Pendlebury, Diane; Gravel, Sylvie; Moran, Michael D.; Lupu, Alexandru

    2018-02-01

    A regional air quality forecast model, GEM-MACH, is used to examine the conditions under which a limited-area air quality model can accurately forecast near-surface ozone concentrations during stratospheric intrusions. Periods in 2010 and 2014 with known stratospheric intrusions over North America were modelled using four different ozone lateral boundary conditions obtained from a seasonal climatology, a dynamically-interpolated monthly climatology, global air quality forecasts, and global air quality reanalyses. It is shown that the mean bias and correlation in surface ozone over the course of a season can be improved by using time-varying ozone lateral boundary conditions, particularly through the correct assignment of stratospheric vs. tropospheric ozone along the western lateral boundary (for North America). Part of the improvement in surface ozone forecasts results from improvements in the characterization of near-surface ozone along the lateral boundaries that then directly impact surface locations near the boundaries. However, there is an additional benefit from the correct characterization of the location of the tropopause along the western lateral boundary such that the model can correctly simulate stratospheric intrusions and their associated exchange of ozone from stratosphere to troposphere. Over a three-month period in spring 2010, the mean bias was seen to improve by as much as 5 ppbv and the correlation by 0.1 depending on location, and on the form of the chemical lateral boundary condition.

  6. Hybrid feature selection for supporting lightweight intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  7. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  8. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    USGS Publications Warehouse

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  9. Influence of Age, Thought Content, and Anxiety on Suppression of Intrusive Thoughts

    PubMed Central

    Beadel, Jessica R.; Green, Jennifer S.; Hosseinbor, Shahrzad; Teachman, Bethany A.

    2013-01-01

    Understanding differences in responses following attempts to suppress versus simply monitor intrusive thoughts is important given the established relationship between intrusive thinking and numerous forms of psychopathology. Moreover, these differences may vary as a function of age. Because of the links between aging and both enhancement in emotion regulation skills and decline in inhibition skills, older and younger adults were expected to differ in their responses (e.g., experience of negative affect and thought recurrence) to attempts at suppressing intrusive thoughts. This study examined whether efforts to suppress thought content that varied in valence and age-relevance differentially affected older (N = 40, aged 66–92) and younger (N = 42, aged 16–25) adults’ ability to inhibit intrusive thought recurrence and their resulting negative affect. Interestingly, older adults experienced less recurrence for most thoughts than younger adults. Also, for several dependent variables (negative affect and perceived difficulty suppressing intrusive thoughts), older adults showed less decline in their magnitude of response across thinking periods (i.e., from suppression to monitoring) than did younger adults. These age effects were not generally moderated by level of trait anxiety, though higher anxiety did predict intrusive thought responding in expected directions, such as greater negative affect. These findings point to independent influences of age and anxiety, and suggest a complex mix of risk and protective factors for older adults’ responses to intrusive thoughts. PMID:23395408

  10. Petrogenesis of the Ni-Cu-PGE sulfide-bearing Tamarack Intrusive Complex, Midcontinent Rift System, Minnesota

    NASA Astrophysics Data System (ADS)

    Taranovic, Valentina; Ripley, Edward M.; Li, Chusi; Rossell, Dean

    2015-01-01

    The Tamarack Intrusive Complex (TIC, 1105.6 ± 1.2 Ma) in NE Minnesota, was emplaced during the early stages of the development of the Midcontinent Rift System (MRS, "Early Stage": 1110-1106 Ma). Country rocks of the TIC are those of the Paleoproterozoic Thomson Formation, part of the Animikie Group including sulfide-bearing metasedimentary black shale. The magmatic system is composed of at least two principal mafic-ultramafic intrusive sequences: the sulfide-barren Bowl Intrusion in the south and the "dike" area intrusions in the north which host Ni-Cu-Platinum Group Elements (PGE) mineralization with up to 2.33% Ni, 1.24% Cu, 0.34 g/t Pt, 0.23 g/t Pd and 0.18 g/t Au. Two distinct intrusive units in the "dike" area are the CGO (coarse-grained olivine-bearing) Intrusion, a sub-vertical dike-like body, and the overlying sub-horizontal FGO (fine-grained olivine-bearing) Intrusion. Both intrusions comprise peridotite, feldspathic peridotite, feldspathic pyroxenite, melatroctolite and melagabbro. Massive sulfides are volumetrically minor and mainly occur as lenses emplaced into the country rocks associated with both intrusions. Semi-massive (net-textured) sulfides are distributed at the core of the CGO Intrusion, surrounded by a halo of the disseminated sulfides. Disseminated sulfides also occur in lenses along the base of the FGO Intrusion. Olivine compositions in the CGO Intrusion are between Fo89 and Fo82 and in the FGO Intrusion from Fo84 to Fo82. TIC intrusions have more primitive olivine compositions than that of olivine in the sheet-like intrusions in the Duluth Complex (below Fo70), as well as olivine from the smaller, conduit-related, Eagle and East Eagle Intrusions in Northern Michigan (Fo86 to Fo75). The FeO/MgO ratios of the CGO and FGO Intrusion parental magmas, inferred from olivine compositions, are similar to those of picritic basalts erupted during the early stages of the MRS formation. Trace element ratios differ slightly from other intrusions in the

  11. Final OSWER Vapor Intrusion Guidance

    EPA Science Inventory

    EPA is preparing to finalize its guidance on assessing and addressing vapor intrusion, which is defined as migration of volatile constituents from contaminated media in the subsurface (soil or groundwater) into the indoor environment. In November 2002, EPA issued draft guidance o...

  12. Implementing and testing a fiber-optic polarization-based intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hajj, Rasha El; MacDonald, Gregory; Verma, Pramode; Huck, Robert

    2015-09-01

    We describe a layer-1-based intrusion detection system for fiber-optic-based networks. Layer-1-based intrusion detection represents a significant elevation in security as it prohibits an adversary from obtaining information in the first place (no cryptanalysis is possible). We describe the experimental setup of the intrusion detection system, which is based on monitoring the behavior of certain attributes of light both in unperturbed and perturbed optical fiber links. The system was tested with optical fiber links of various lengths and types, under different environmental conditions, and under changes in fiber geometry similar to what is experienced during tapping activity. Comparison of the results for perturbed and unperturbed links has shown that the state of polarization is more sensitive to intrusion activity than the degree of polarization or power of the received light. The testing was conducted in a simulated telecommunication network environment that included both underground and aerial links. The links were monitored for intrusion activity. Attempts to tap the link were easily detected with no apparent degradation in the visual quality of the real-time surveillance video.

  13. Detection of Dry Intrusion on Water Vapor Images Over Central Europe - June 2010 TO September 2011

    NASA Astrophysics Data System (ADS)

    Novotny, J.; Dejmal, K.; Hudec, F.; Kolar, P.

    2016-06-01

    The knowledge of evaluation of the intensity of cyclogenesis which could be connected with the weather having a significant impact on Earth's surface is quite useful. If, as one of the basic assumptions, the existence of connection between dry intrusions, dry bands, tropopause height and warm dark areas distribution on water vapor images (WV images) is considered, it is possible to set up a method of detecting dry intrusions on searching and tracking areas with higher brightness temperature compared with the surrounding environment. This paper covers the period between June 2010 and September 2011 over Central Europe. The ISIS method (Instrument de Suivi dans I'Imagerie satellitaire), originally developed for detection of cold cloud tops, was used as an initial ideological point. Subsequently, this method was modified by Michel and Bouttier for usage on WV images. Some of the applied criteria and parameters were chosen with reference to the results published by Michel and Bouttier as well as by Novotny. The procedure can be divided into two steps: detection of warm areas and their tracking. Cases of detection of areas not evidently connected with dry intrusions can be solved by filtering off based on the connection between detected warm areas to the cyclonic side of jet streams and significant lowering of the tropopause.

  14. Physical and numerical modeling of seawater intrusion in coastal aquifers

    NASA Astrophysics Data System (ADS)

    Crestani, Elena; Camporese, Matteo; Salandin, Paolo

    2016-04-01

    Seawater intrusion in coastal aquifers is a worldwide problem caused, among others factors, by aquifer overexploitation, rising sea levels, and climate changes. To limit the deterioration of both surface water and groundwater quality caused by saline intrusion, in recent years many research studies have been developed to identify possible countermeasures, mainly consisting of underground barriers. In this context, physical models are fundamental to study the saltwater intrusion, since they provide benchmarks for numerical model calibrations and for the evaluation of the effectiveness of general solutions to contain the salt wedge. This work presents a laboratory experiment where seawater intrusion was reproduced in a specifically designed sand-box. The physical model, built at the University of Padova, represents the terminal part of a coastal aquifer and consists of a flume 500 cm long, 30 cm wide and 60 cm high, filled for an height of 49 cm with glass beads characterized by a d50 of 0.6 mm and a uniformity coefficient d60/d10 ≈ 1.5. The resulting porous media is homogeneous, with porosity of about 0.37 and hydraulic conductivity of about 1.3×10-3 m/s. Upstream from the sand-box, a tank filled by freshwater provides the recharge to the aquifer. The downstream tank simulates the sea and red food dye is added to the saltwater to easily visualize the salt wedge. The volume of the downstream tank is about five times the upstream one, and, due to the small filtration discharge, salt concentration variations (i.e., water density variations) due to the incoming freshwater flow are negligible. The hydraulic gradient during the tests is constant, due to the fixed water level in the two tanks. Water levels and discharged flow rate are continuously monitored. The experiment presented here had a duration of 36 h. For the first 24 h, the saltwater wedge was let to evolve until quasi stationary condition was obtained. In the last 12 h, water withdrawal was carried out at a

  15. Identifying and forecasting deep stratospheric ozone intrusions over the western United States from space

    NASA Astrophysics Data System (ADS)

    Lin, M.; Fiore, A. M.; Horowitz, L. W.; Cooper, O. R.; Langford, A. O.; Pan, L.; Liu, X.; Reddy, P. J.

    2012-12-01

    Recent studies have shown that deep stratospheric ozone intrusions can episodically enhance ground-level ozone above the health-based standard over the western U.S. in spring. Advanced warning of incoming intrusions could be used by state agencies to inform the public about poor air quality days. Here we explore the potential for using total ozone retrievals (version 5.2, level 3) at twice daily near global coverage from the AIRS instrument aboard the NASA Aqua satellite to identify stratospheric intrusions and forecast the eventual surface destination of transported stratospheric ozone. The method involves the correlation of AIRS daily total ozone columns at each 1ox1o grid box ~1-3 days prior to stratospheric enhancements to daily maximum 8-hour average ozone at a selected surface site using datasets from April to June in 2003-2011. The surface stratospheric enhancements are estimated by the GFDL AM3 chemistry-climate model which includes full stratospheric and tropospheric chemistry and is nudged to reanalysis winds. Our earlier work shows that the model presents deep stratospheric intrusions over the Western U.S. consistently with observations from AIRS, surface networks, daily ozone sondes, and aircraft lidar available in spring of 2010 during the NOAA CalNex field campaign. For the 15 surface sites in the U.S. Mountain West considered, a correlation coefficient of 0.4-0.7 emerges with AIRS ozone columns over 30o-50oN latitudes and 125o-105oW longitudes - variability in the AIRS column within this spatial domain indicates incoming intrusions. For each "surface receptor site", the spatial domain can narrow to an area ~5ox5o northwest of the individual site, with the strong correlation (0.5-0.7) occurring when the AIRS data is lagged by 1 day from the AM3 stratospheric enhancements in surface air. The spatial pattern of correlations is consistent with our process-oriented understanding developed from case studies of extreme intrusions. Surface observations

  16. Pre-stressor cognitive control is related to intrusive cognition of a stressful film.

    PubMed

    Wessel, Ineke; Overwijk, Sippie; Verwoerd, Johan; de Vrieze, Nienke

    2008-04-01

    It has been suggested that relatively weak cognitive control existing prior to a stressful event may be associated with intrusive memories of that stressor afterwards. We explored this in two analog studies employing unselected participants who saw an emotional film fragment and completed behavioral (i.e., color-naming interference [CNI]) and self-report indices of intrusions. Prior to film presentation, several cognitive control tests were administered. Study 1 showed that better updating/monitoring was linked to less CNI from negative film-related words. However, better updating/monitoring was associated with more diary reports of intrusive memories. Study 2 showed that a better resistance to pro-active interference (PI) predicted less self-reported film-related intrusive cognition after 24h. However, after this delay, both self-reported intrusions and CNI were not related to updating/monitoring. Taken together, the results suggest that a specific pre-existing cognitive control function (i.e., resistance to PI) may be involved in the regulation of post-stressor intrusive memory phenomena.

  17. Layered intrusion formation by top down thermal migration zone refining (Invited)

    NASA Astrophysics Data System (ADS)

    Lundstrom, C.

    2009-12-01

    The formation of layered mafic intrusions by crystallization from cooling magmas represents the textbook example of igneous differentiation, often attributed to fractional crystallization through gravitational settling. Yet in detail, such interpretations have significant problems such that it remains unclear how these important features form. Put in the Earth perspective that no km scale blob of >50% melt has ever been imaged geophysically and that geochronological studies repeatedly indicate age inconsistencies with “big tank” magma chambers, it may be questioned if km scale magma chambers have ever existed. I will present the case for forming layered intrusions by a top down process whereby arriving basaltic magma reaches a permeability barrier, begins to underplate and forms the intrusion incrementally by sill injection with the body growing downward at ~1 mm/yr rate or less. A temperature gradient zone occurs in the overlying previously emplaced sills, leading to chemical components migrating by diffusion. As long as the rate of diffusion can keep up with rate of sill addition, the body will differentiate along a path similar to a liquid line of descent. In this talk, I will integrate data from 3 areas: 1) laboratory experiments examining the behavior of partially molten silicates in a temperature gradient (thermal migration); 2) numerical modeling of the moving temperature gradient zone process using IRIDIUM (Boudreau, 2003); 3) measurements of Fe isotope ratios and geochronology from the Sonju Lake Intrusion in the Duluth Complex. This model provides the ability to form km scale intrusions by a seismically invisible means, can explain million year offsets in chronology, and has implications for reef development and PGE concentration. Most importantly, this model of top down layered intrusion formation, following a similar recent proposal for granitoid formation (Lundstrom, 2009), represents a testable hypothesis: because temperature gradient driven

  18. Predicting The Intrusion Layer From Deep Ocean Oil Spills

    NASA Astrophysics Data System (ADS)

    Wang, Dayang; Chow, Aaron; Adams, E. Eric

    2015-11-01

    Oil spills from deep ocean blowout events motivate our study of multiphase plumes in a water column. Key to understanding the long-term fate of these plumes is the ability to predict the depth and persistence of intrusion layers. While intrusion layers from multiphase plumes have been studied under stagnant conditions, their behavior in the presence of crossflow, especially in mild crossflow, remains poorly understood. The classical classification of plume behavior identifies two regimes: crossflow-dominant and stratification-dominant--but it does not account for the interplay between the two effects, leaving the transition region unexplored. We conduct laboratory tank experiments to investigate the behavior of intrusion layers under the simultaneous action of crossflow and stratification. Our experiments use an inverted frame of reference, using glass beads with a range of sizes to simulate oil droplets. We find that crossflow creates enhanced mixing, which in turn leads to a shallower intrusion layer of the released fluid (correspondingly, a deeper layer in the case of a deep ocean blowout). We develop a mathematical formulation that extends previous models to account for crossflow effects, and use field observations to validate the analytical and experimental findings.

  19. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  20. Indoor Air Vapor Intrusion Mitigation Approaches

    EPA Pesticide Factsheets

    The National Risk Management Research Laboratory has developed a technology transfer document regarding management and treatment of vapor intrusion into building structures. This document describes the range of mitigation technologies available.

  1. Imaging Saltwater Intrusion Along the Coast of Monterey Bay Using Long-Offset Electrical Resistivity Tomography

    NASA Astrophysics Data System (ADS)

    Goebel, M.; Knight, R. J.; Pidlisecky, A.

    2016-12-01

    Coastal regions represent a complex dynamic interface where saltwater intrusion moves seawater landward and groundwater discharge moves freshwater seaward. These processes can have a dramatic impact on water quality, affecting both humans and coastal ecosystems. The ability to map the subsurface distribution of fresh and salt water is a critical step in predicting and managing water quality in coastal regions. This is commonly accomplished using wells, which are expensive and provide point information, which may fail to capture the spatial complexity in subsurface conditions. We present an alternate method for acquiring data, long-offset Electrical Resistivity Tomography (ERT), which is non-invasive, cost effective, and can address the problem of poor spatial sampling. This geophysical method can produce continuous profiles of subsurface electrical resistivity to a depth of 300 m, with spatial resolution on the order of tens of meters. Our research focuses on the Monterey Bay region, where sustained groundwater extraction over the past century has led to significant saltwater intrusion. ERT was acquired along 40 kilometers of the coast using the roll along method, allowing for continuous overlap in data acquisition. Electrodes were spaced every 22.2 m, with a total of 81 electrodes along the 1.8 km active cable length. The data show a complex distribution of fresh and salt water, influenced by geology, groundwater pumping, recharge, and land-use. While the inverted ERT resistivity profiles correspond well with existing data sets and geologic interpretations in the region, the spatial complexity revealed through the ERT data goes beyond what is known from traditional data sources alone. This leads us to conclude that this form of data can be extremely useful in informing and calibrating groundwater flow models, making targeted management decisions, and monitoring changes in subsurface salinities over time.

  2. Non-invasive characterization of structure and morphology of silk fibroin biomaterials using non-linear microscopy

    PubMed Central

    Rice, William L.; Firdous, Shamaraz; Gupta, Sharad; Hunter, Martin; Foo, Cheryl Wong Po; Wang, Yongzhong; Kim, Hyeon Joo; Kaplan, David L.; Georgakoudi, Irene

    2009-01-01

    Designing biomaterial scaffolds remains a major challenge in tissue engineering. Key to this challenge is improved understanding of the relationships between the scaffold properties and its degradation kinetics, as well as the cell interactions and the promotion of new matrix deposition. Here we present the use of non-linear spectroscopic imaging as a non-invasive method to characterize not only morphological, but also structural aspects of silkworm silk fibroin-based biomaterials, relying entirely on endogenous optical contrast. We demonstrate that two photon excited fluorescence and second harmonic generation are sensitive to the hydration, overall β sheet content and molecular orientation of the sample. Thus, the functional content and high resolution afforded by these non-invasive approaches offer promise for identifying important connections between biomaterial design and functional engineered tissue development. The strategies described also have broader implications for understanding and tracking the remodeling of degradable biomaterials under dynamic conditions both in vitro and in vivo. PMID:18291520

  3. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    NASA Astrophysics Data System (ADS)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  4. Study project of intrusive rocks: States of Espirito Santo and Rio de Janeiro, south and east of Minas Gerais and southeast of the state of Sao Paulo. [Brazil

    NASA Technical Reports Server (NTRS)

    Dejesusparada, N. (Principal Investigator); Dossantos, A. R.; DOSANJOS; Barbos, M. P.; Veneziani, P.

    1981-01-01

    The feasibility of mapping intrusive rocks in polycyclic and polymetamorphic areas using the logic method for photointerpretation of LANDSAT and radar imagery was investigated. The resolution, scale and spectral characteristics of the imagery were considered. Spectral characteristics of the intrusive rock units mapped using image 100 were investigated. It was determined that identification of acidic and basic intrusive bodies and determination of their relationships with principal structural directions using the logic method was feasible. Tectonic compartments were subdivided into units according to their predominant lithographic types, ignoring stratigraphy. The principal directions of various foliations, faults, megafolds, and fractural systems were defined. Delineation of the boundaries of intrusive bodies mapped using the spectral characteristics of Image 100 imagery ws determined to be more accurate than visual analysis. A 1:500,000 scale map of intrusions in the areas studied was generated.

  5. Effects of shallow basaltic intrusion into pyroclastic deposits, Grants Ridge, New Mexico, USA

    NASA Astrophysics Data System (ADS)

    WoldeGabriel, Giday; Keating, Gordon N.; Valentine, Greg A.

    1999-10-01

    A localized aureole up to 10 m wide developed around a 150-m-wide, 2.6 Ma basaltic plug at Grants Ridge, New Mexico. The plug intruded into nonwelded, pumice-rich compositionally homogenous tuff and volcaniclastic sediments of similar age (3.3 Ma). Color variation (pinkish to orange), strong local contact welding, brecciation, partial melting, and stoping characterize the host rock within the contact zone. Despite the high-temperature basaltic intrusion, there is no indication of extensive fluid-driven convective heat transfer and pervasive hydrothermal circulation and alteration of the country rock. The proportion of volcanic glass, loss on ignition (LOI), fluorine, iron, and some trace and rare earth element contents in the host rocks are somewhat depleted at the contact of the intrusion. Conversely, the degree of devitrification and the potassium content are higher along the contact. Vapor-phase expulsion of elemental species as complexes of fluoride, chloride, hydroxide, sulfide, and carbon dioxide may have been responsible for the minor depletion of the elements during the devitrification of silicic glass at near-solidus temperature related to the basaltic intrusion. The results of finite-difference numerical modeling of the intrusion as a dry, conduction-dominated system agree well with geochemical and mineralogical data. Contact welding of the host rocks apparently occurred at temperatures >700°C under a density-driven lateral load of approximately 1 MPa, corresponding to the observed depth below the former ground surface of ˜100 m. Other physical changes in the first 10 m of host rock, represented by partial devitrification and color changes, apparently occurred at temperatures of 500-600°C, which probably persisted for up to 55 years after the emplacement of the basaltic plug. Devitrification is generally enhanced by the presence of aqueous fluids; however, the abundance of volcanic glass within a short distance (˜10 m) from the plug is consistent with

  6. Probabilistic assessment method of the non-monotonic dose-responses-Part I: Methodological approach.

    PubMed

    Chevillotte, Grégoire; Bernard, Audrey; Varret, Clémence; Ballet, Pascal; Bodin, Laurent; Roudot, Alain-Claude

    2017-08-01

    More and more studies aim to characterize non-monotonic dose response curves (NMDRCs). The greatest difficulty is to assess the statistical plausibility of NMDRCs from previously conducted dose response studies. This difficulty is linked to the fact that these studies present (i) few doses tested, (ii) a low sample size per dose, and (iii) the absence of any raw data. In this study, we propose a new methodological approach to probabilistically characterize NMDRCs. The methodology is composed of three main steps: (i) sampling from summary data to cover all the possibilities that may be presented by the responses measured by dose and to obtain a new raw database, (ii) statistical analysis of each sampled dose-response curve to characterize the slopes and their signs, and (iii) characterization of these dose-response curves according to the variation of the sign in the slope. This method allows characterizing all types of dose-response curves and can be applied both to continuous data and to discrete data. The aim of this study is to present the general principle of this probabilistic method which allows to assess the non-monotonic dose responses curves, and to present some results. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    NASA Astrophysics Data System (ADS)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  8. Median Filtering Methods for Non-volcanic Tremor Detection

    NASA Astrophysics Data System (ADS)

    Damiao, L. G.; Nadeau, R. M.; Dreger, D. S.; Luna, B.; Zhang, H.

    2016-12-01

    Various properties of median filtering over time and space are used to address challenges posed by the Non-volcanic tremor detection problem. As part of a "Big-Data" effort to characterize the spatial and temporal distribution of ambient tremor throughout the Northern San Andreas Fault system, continuous seismic data from multiple seismic networks with contrasting operational characteristics and distributed over a variety of regions are being used. Automated median filtering methods that are flexible enough to work consistently with these data are required. Tremor is characterized by a low-amplitude, long-duration signal-train whose shape is coherent at multiple stations distributed over a large area. There are no consistent phase arrivals or mechanisms in a given tremor's signal and even the durations and shapes among different tremors vary considerably. A myriad of masquerading noise, anthropogenic and natural-event signals must also be discriminated in order to obtain accurate tremor detections. We present here results of the median methods applied to data from four regions of the San Andreas Fault system in northern California (Geysers Geothermal Field, Napa, Bitterwater and Parkfield) to illustrate the ability of the methods to detect tremor under diverse conditions.

  9. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    PubMed

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  10. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  11. Family cohesion and posttraumatic intrusion and avoidance among war veterans: a 20-year longitudinal study.

    PubMed

    Zerach, Gadi; Solomon, Zahava; Horesh, Danny; Ein-Dor, Tsachi

    2013-02-01

    The bi-directional relationships between combat-induced posttraumatic symptoms and family relations are yet to be understood. The present study assesses the longitudinal interrelationship of posttraumatic intrusion and avoidance and family cohesion among 208 Israeli combat veterans from the 1982 Lebanon War. Two groups of veterans were assessed with self-report questionnaires 1, 3 and 20 years after the war: a combat stress reaction (CSR) group and a matched non-CSR control group. Latent Trajectories Modeling showed that veterans of the CSR group reported higher intrusion and avoidance than non-CSR veterans at all three points of time. With time, there was a decline in these symptoms in both groups, but the decline was more salient among the CSR group. The latter also reported lower levels of family cohesion. Furthermore, an incline in family cohesion levels was found in both groups over the years. Most importantly, Autoregressive Cross-Lagged Modeling among CSR and non-CSR veterans revealed that CSR veterans' posttraumatic symptoms in 1983 predicted lower family cohesion in 1985, and lower family cohesion, in turn, predicted posttraumatic symptoms in 2002. The findings suggest that psychological breakdown on the battlefield is a marker for future family cohesion difficulties. Our results lend further support for the bi-directional mutual effects of posttraumatic symptoms and family cohesion over time.

  12. Geoelectric imaging for saline water intrusion in Geopark zone of Ciletuh Bay, Indonesia

    NASA Astrophysics Data System (ADS)

    Ardi, N. D.; Iryanti, M.; Asmoro, C. P.; Yusuf, A.; Sundana, A. N. A.; Safura, H. Y.; Fitri, M.; Anggraeni, M.; Kurniawan, R.; Afrianti, R.; Sumarni

    2018-05-01

    Saline water intrusion in estuary is an urgent ecological encounter across the world. The Ciletuh Bay, located in the southern Sukabumi district, is an area with high cultivated potential becoming one of the most important geology tourism zones in Indonesia. However, salt water intrusion along the creek is a natural spectacle that disturbs the economic growth of the whole region. This research was intended at plotting the subsurface level of saltwater interventions into aquifers at the northern part of Ciletuh creek, Indonesia. The study implemented geoelectric imaging methods. 37 imaging datum were acquired using Wenner array configuration. The saline water were identified across the study area. The result of two dimensional cross-sectional resistivity shows that there is an indication of sea content in our measured soil, i.e. the smallest resistivity value is 0.579 Ωm found at a depth of 12.4 m to 19.8 m at a track length of 35 m to 60 m is categorized in the clayey which shows low groundwater quality. However, when compared with the results of direct observation of groundwater from the wells of residents, the water obtained is brackish water. A water chemistry test is conducted to ascertain the initial results of this method so that a potential sea intrusion potential map can be interpreted more clearly. This can consequently help as an extrapolative model to define depth to saline water at any site within the saline water zone in the study area.

  13. Non-destructive testing for the structures and civil infrastructures characterization

    NASA Astrophysics Data System (ADS)

    Capozzoli, L.; Rizzo, E.

    2012-04-01

    This work evaluates the ability of non-conventional NDT techniques such as GPR, geoelectrical method and conventional ones such as infrared thermography (IRT) and sonic test for the characterization of building structures in laboratory and in-situ. Moreover, the integration of the different techniques were evaluated in order to reduce the degree of uncertainties associated. The presence of electromagnetic, resistivity or thermal anomalies in the behavior may be related to the presence of defects, crack, decay or moisture. The research was conducted in two phases: the first phase was performed in laboratory and the second one mainly in the field work. The laboratory experiments proceeded to calibrate the geophysical techniques GPR and geoelectrical method on building structures. A multi-layer structure was reconstructed in laboratory, in order to simulate a back-bridge: asphalt, reinforced concrete, sand and gravel layers. In the deep sandy layer, PVC, aluminum and steel pipes were introduced. This structure has also been brought to crack in a predetermined area and hidden internal fractures were investigated. GPR has allowed to characterize the panel in a non-invasive mode; radar maps were developed using various algorithms during post-process about 2D maps and 3D models with aerial acquisition of 400 MHz, 900MHz, 1500MHz, 2000MHz. Geoelectrical testing was performed with a network of 25 electrodes spaced at mutual distance of 5 cm. Two different configurations were used dipole-dipole and pole-dipole approaches. In the second phase, we proceeded to the analysis of pre-tensioned concrete in order to detect the possible presence of criticality in the structure. For this purpose by GPR 2GHz antenna, a '70 years precast bridge characterized by a high state of decay was studied; then were also analyzed a pillar and a beam of recent production directly into the processing plant. Moreover, results obtained using GPR were compared with those obtained through the use of

  14. Effect of winds and waves on salt intrusion in the Pearl River estuary

    NASA Astrophysics Data System (ADS)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  15. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    PubMed

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  16. Emerging technologies for the non-invasive characterization of physical-mechanical properties of tablets.

    PubMed

    Dave, Vivek S; Shahin, Hend I; Youngren-Ortiz, Susanne R; Chougule, Mahavir B; Haware, Rahul V

    2017-10-30

    The density, porosity, breaking force, viscoelastic properties, and the presence or absence of any structural defects or irregularities are important physical-mechanical quality attributes of popular solid dosage forms like tablets. The irregularities associated with these attributes may influence the drug product functionality. Thus, an accurate and efficient characterization of these properties is critical for successful development and manufacturing of a robust tablets. These properties are mainly analyzed and monitored with traditional pharmacopeial and non-pharmacopeial methods. Such methods are associated with several challenges such as lack of spatial resolution, efficiency, or sample-sparing attributes. Recent advances in technology, design, instrumentation, and software have led to the emergence of newer techniques for non-invasive characterization of physical-mechanical properties of tablets. These techniques include near infrared spectroscopy, Raman spectroscopy, X-ray microtomography, nuclear magnetic resonance (NMR) imaging, terahertz pulsed imaging, laser-induced breakdown spectroscopy, and various acoustic- and thermal-based techniques. Such state-of-the-art techniques are currently applied at various stages of development and manufacturing of tablets at industrial scale. Each technique has specific advantages or challenges with respect to operational efficiency and cost, compared to traditional analytical methods. Currently, most of these techniques are used as secondary analytical tools to support the traditional methods in characterizing or monitoring tablet quality attributes. Therefore, further development in the instrumentation and software, and studies on the applications are necessary for their adoption in routine analysis and monitoring of tablet physical-mechanical properties. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    PubMed Central

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  18. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    PubMed

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  19. Linking magnetic fabric and cumulate texture in layered mafic-ultramafic intrusions (Invited)

    NASA Astrophysics Data System (ADS)

    O Driscoll, B.; Stevenson, C.; Magee, C.

    2013-12-01

    Research on the magnetic fabrics of igneous rocks, pioneered by Balsley and Buddington[1] and Khan[2], has greatly contributed to our understanding of magma dynamics in lava flows, sheet intrusions and plutons over the past five decades. However, considerably few magnetic fabric studies have focused on layered mafic-ultramafic intrusions, particularly ';lopolithic' intrusions, despite the fact that such rocks may preserve a large range of small-scale kinematic structures potentially related to important magma chamber processes. This may be partly due to the fact that mafic-ultramafic cumulates commonly exhibit visible planar fabrics (mineral lamination), as well as compositional layering, in contrast to the frequent absence of such features in granite bodies or fine-grained mafic lava flows. Indeed, debates in the 1970s and 1980s on the development of layering and mineral fabrics in mafic-ultramafic intrusions, focused around the crystal settling versus in situ crystallisation paradigms, are classic in the subject of igneous petrology. Central to these debates is the notion that a wide range of magma chamber processes occur in layered mafic-ultramafic intrusions that are not frequently considered to occur in their relatively viscous granitic counterparts; in essence, the latter have historically been viewed as much more likely to ';freeze-in' a primary magma flow fabric whilst mafic-ultramafic intrusions are subjected to a more protracted solidification history. This wide array of potential initial sources for layering and mineral fabrics in layered mafic-ultramafic intrusions, together with the possible modification of textures at the postcumulus stage, demands a cautious application of any fabric analysis and presents a problem well-suited to interrogation by the AMS technique. The purpose of this contribution is to provide specific context on the application of AMS to elucidating the formation of cumulates in layered mafic-ultramafic intrusions. Examples of AMS

  20. Fabrication and characterization of cerium-doped barium titanate inverse opal by sol-gel method

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jin Yi; Zhu Yihua; Yang Xiaoling

    Cerium-doped barium titanate inverted opal was synthesized from barium acetate contained cerous acetate and tetrabutyl titanate in the interstitial spaces of a polystyrene (PS) opal. This procedure involves infiltration of precursors into the interstices of the PS opal template followed by hydrolytic polycondensation of the precursors to amorphous barium titanate and removal of the PS opal by calcination. The morphologies of opal and inverse opal were characterized by scanning electron microscope (SEM). The pores were characterized by mercury intrusion porosimetry (MIP). X-ray photoelectron spectroscopy (XPS) investigation showed the doping structure of cerium, barium and titanium. And powder X-ray diffraction allowsmore » one to observe the influence of doping degree on the grain size. The lattice parameters, crystal size and lattice strain were calculated by the Rietveld refinement method. The synthesis of cerium-doped barium titanate inverted opals provides an opportunity to electrically and optically engineer the photonic band structure and the possibility of developing tunable three-dimensional photonic crystal devices. - Graphical abstract: Cerium-doped barium titanate inverted opal was synthesized from barium acetate acid contained cerous acetate and tetrabutyl titanate in the interstitial spaces of a PS opal, which involves infiltration of precursors into the interstices of the PS opal template and removal of the PS opal by calcination.« less

  1. Intrusions and provoked and spontaneous confabulations on memory tests in Korsakoff's syndrome.

    PubMed

    Rensen, Yvonne C M; Oosterman, Joukje M; Walvoort, Serge J W; Eling, Paul A T M; Kessels, Roy P C

    2017-03-01

    Intrusions on verbal memory tests have been used as an index for clinical confabulation. Severe memory impairments in combination with executive dysfunction have been suggested to be the underlying mechanism of confabulation, but to date, this relation is unclear. The aim of this study was (a) to examine the relation between (different types of) intrusions and confabulations in a large sample of confabulating patients with Korsakoff's syndrome (KS) and (b) to investigate whether different measures of executive functioning and memory performance are related to provoked and spontaneous confabulation. The Dutch version of the California Verbal Learning Test (CVLT) and various executive function and memory tests were administered to a group of 51 confabulating patients with KS. Professional caregivers rated the severity of provoked and spontaneous confabulation behavior of the patients using the Nijmegen-Venray Confabulation List-20 (NVCL-20). The total number of intrusions on the CVLT was not related to either provoked or spontaneous confabulation scores. None of the CVLT intrusion scores correlated significantly with any of the confabulation scores, but we did find small-to-medium, positive correlations between unrelated intrusions and both provoked confabulations and spontaneous confabulation. Provoked confabulation behavior was associated with executive dysfunction and poorer memory performances. Spontaneous confabulation was not related to performance on measures of executive function and memory. The total number of intrusions on verbal memory tests and clinical confabulations appear to be different phenomena. Only unrelated intrusions produced on the CVLT might possibly be related to confabulations. The production of provoked, but not spontaneous, confabulation is associated with executive dysfunction and memory deficits.

  2. High throughput integrated thermal characterization with non-contact optical calorimetry

    NASA Astrophysics Data System (ADS)

    Hou, Sichao; Huo, Ruiqing; Su, Ming

    2017-10-01

    Commonly used thermal analysis tools such as calorimeter and thermal conductivity meter are separated instruments and limited by low throughput, where only one sample is examined each time. This work reports an infrared based optical calorimetry with its theoretical foundation, which is able to provide an integrated solution to characterize thermal properties of materials with high throughput. By taking time domain temperature information of spatially distributed samples, this method allows a single device (infrared camera) to determine the thermal properties of both phase change systems (melting temperature and latent heat of fusion) and non-phase change systems (thermal conductivity and heat capacity). This method further allows these thermal properties of multiple samples to be determined rapidly, remotely, and simultaneously. In this proof-of-concept experiment, the thermal properties of a panel of 16 samples including melting temperatures, latent heats of fusion, heat capacities, and thermal conductivities have been determined in 2 min with high accuracy. Given the high thermal, spatial, and temporal resolutions of the advanced infrared camera, this method has the potential to revolutionize the thermal characterization of materials by providing an integrated solution with high throughput, high sensitivity, and short analysis time.

  3. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    PubMed

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  4. Predictive uncertainty analysis of a saltwater intrusion model using null-space Monte Carlo

    USGS Publications Warehouse

    Herckenrath, Daan; Langevin, Christian D.; Doherty, John

    2011-01-01

    Because of the extensive computational burden and perhaps a lack of awareness of existing methods, rigorous uncertainty analyses are rarely conducted for variable-density flow and transport models. For this reason, a recently developed null-space Monte Carlo (NSMC) method for quantifying prediction uncertainty was tested for a synthetic saltwater intrusion model patterned after the Henry problem. Saltwater intrusion caused by a reduction in fresh groundwater discharge was simulated for 1000 randomly generated hydraulic conductivity distributions, representing a mildly heterogeneous aquifer. From these 1000 simulations, the hydraulic conductivity distribution giving rise to the most extreme case of saltwater intrusion was selected and was assumed to represent the "true" system. Head and salinity values from this true model were then extracted and used as observations for subsequent model calibration. Random noise was added to the observations to approximate realistic field conditions. The NSMC method was used to calculate 1000 calibration-constrained parameter fields. If the dimensionality of the solution space was set appropriately, the estimated uncertainty range from the NSMC analysis encompassed the truth. Several variants of the method were implemented to investigate their effect on the efficiency of the NSMC method. Reducing the dimensionality of the null-space for the processing of the random parameter sets did not result in any significant gains in efficiency and compromised the ability of the NSMC method to encompass the true prediction value. The addition of intrapilot point heterogeneity to the NSMC process was also tested. According to a variogram comparison, this provided the same scale of heterogeneity that was used to generate the truth. However, incorporation of intrapilot point variability did not make a noticeable difference to the uncertainty of the prediction. With this higher level of heterogeneity, however, the computational burden of

  5. Perimeter intrusion detection and assessment system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  6. JOHNSON AND ETTINGER (1991) VAPOR INTRUSION MODEL WITH SUB-SLAB CONCENTRATION

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is known as vapor intrusion (VI). Under certain circumstances, people living in homes above contaminated soil or ground water may be exposed to harmful levels of these vapors. Vapor intrusion is a part...

  7. Modeling saltwater intrusion in highly heterogeneous coastal aquifers

    NASA Astrophysics Data System (ADS)

    Safi, Amir; El-Fadel, Mutasem; Doummar, Joanna; Abou Najm, Majdi; Alameddine, Ibrahim

    2016-04-01

    In this study, a 3D variable-density flow and solute transport model SEAWAT was used to examine the impact of macroscopic variation in a soil matrix on widening or narrowing the thickness of the saltwater-freshwater mixing zone. Located along the Eastern Mediterranean (Beirut), the pilot aquifer consists of karstified limestone of Cretaceous age overlain by Upper Tertiary and Quaternary unconsolidated deposits. The model used the advanced pilot-points parameterization coupled with PEST to characterize spatial heterogeneity. Historically simulated water levels were relied upon to reduce potential numerical instabilities induced by insensitive parameters in transient calibration. The latter demonstrated a high degree of heterogeneity in the middle parts of the aquifer and along western coastlines with specification of a high hydraulic conductivity and low storativity in fault networks. The response of the aquifer to seasonal stresses such as climate cycles, pumping rates and recharge rates was manifested as high fluctuations in potentiometric surface due to potential fast flow pathways along faults. The final distribution of saltwater intrusion supports two mechanisms 1) lateral encroachment of recent seawater into the western zone of the aquifer which is of most concern due to high horizontal hydraulic conductivity in the wave direction and 2) upconing in the northwest and southwest of the aquifer due to large vertical hydraulic conductivities that tend to exacerbate the vertical movement of salinity. Acknowledgments This study is part of a program on climate change and seawater intrusion along the Eastern Mediterranean funded by the International Development Research Center (IDRC) of Canada at the American University of Beirut (AUB). Special thanks are extended to Dr. Charlotte Macalister at IDRC for her support and feedback in implementing this program.

  8. Igneous intrusion models for floor fracturing in lunar craters

    NASA Technical Reports Server (NTRS)

    Wichman, R. W.; Schultz, P. H.

    1991-01-01

    Lunar floor-fractured craters are primarily located near the maria and frequently contain ponded mare units and dark mantling deposits. Fracturing is confined to the crater interior, often producing a moat-like feature near the floor edge, and crater depth is commonly reduced by uplift of the crater floor. Although viscous relaxation of crater topography can produce such uplift, the close association of modification with surface volcanism supports a model linking floor fracture to crater-centered igneous intrusions. The consequences of two intrusion models for the lunar interior are quantitatively explored. The first model is based on terrestrial laccoliths and describes a shallow intrusion beneath the crater. The second model is based on cone sheet complexes where surface deformation results from a deeper magma chamber. Both models, their fit to observed crater modifications and possible implications for local volcanism are described.

  9. Reducing depressive intrusions via a computerized cognitive bias modification of appraisals task: developing a cognitive vaccine.

    PubMed

    Lang, Tamara J; Moulds, Michelle L; Holmes, Emily A

    2009-02-01

    A feature of depression is the distressing experience of intrusive, negative memories. The maladaptive appraisals of such intrusions have been associated with symptom persistence. This study aimed to experimentally manipulate appraisals about depressive intrusions via a novel computerized cognitive bias modification (CBM) of appraisals paradigm, and to test the impact on depressive intrusion frequency for a standardized event (a depressive film). Forty-eight participants were randomly assigned to either a session of positive or negative CBM. Participants then watched a depressing film (including scenes of bereavement and bullying) and subsequently monitored the occurrence of depressive intrusions related to the film in a diary for one week. At one-week follow-up, participants completed additional measures of intrusions--the Impact of Event Scale (IES) and an intrusion provocation task. As predicted, compared to the negative condition, participants who underwent positive CBM showed a more positive appraisal bias. Further, one week later, positive CBM participants reported fewer intrusions of the film and had lower IES scores. Our findings demonstrate that it is possible to manipulate maladaptive appraisals about depressive intrusions via a computerized CBM task. Further, this effect transfers to reducing intrusive symptomatology related to a standardized event (a depressive film) over one week, suggesting novel clinical implications.

  10. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    PubMed

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  11. Smart Fluids in Hydrology: Use of Non-Newtonian Fluids for Pore Structure Characterization

    NASA Astrophysics Data System (ADS)

    Abou Najm, M. R.; Atallah, N. M.; Selker, J. S.; Roques, C.; Stewart, R. D.; Rupp, D. E.; Saad, G.; El-Fadel, M.

    2015-12-01

    Classic porous media characterization relies on typical infiltration experiments with Newtonian fluids (i.e., water) to estimate hydraulic conductivity. However, such experiments are generally not able to discern important characteristics such as pore size distribution or pore structure. We show that introducing non-Newtonian fluids provides additional unique flow signatures that can be used for improved pore structure characterization while still representing the functional hydraulic behavior of real porous media. We present a new method for experimentally estimating the pore structure of porous media using a combination of Newtonian and non-Newtonian fluids. The proposed method transforms results of N infiltration experiments using water and N-1 non-Newtonian solutions into a system of equations that yields N representative radii (Ri) and their corresponding percent contribution to flow (wi). This method allows for estimating the soil retention curve using only saturated experiments. Experimental and numerical validation comparing the functional flow behavior of different soils to their modeled flow with N representative radii revealed the ability of the proposed method to represent the water retention and infiltration behavior of real soils. The experimental results showed the ability of such fluids to outsmart Newtonian fluids and infer pore size distribution and unsaturated behavior using simple saturated experiments. Specifically, we demonstrate using synthetic porous media that the use of different non-Newtonian fluids enables the definition of the radii and corresponding percent contribution to flow of multiple representative pores, thus improving the ability of pore-scale models to mimic the functional behavior of real porous media in terms of flow and porosity. The results advance the knowledge towards conceptualizing the complexity of porous media and can potentially impact applications in fields like irrigation efficiencies, vadose zone hydrology, soil

  12. Non-intrusive cooling system

    DOEpatents

    Morrison, Edward F.; Bergman, John W.

    2001-05-22

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  13. Isolation and Characterization of Circulating Tumor Cells in Squamous Cell Carcinoma of the Lung Using a Non-EpCAM-Based Capture Method.

    PubMed

    Bozzetti, Cecilia; Quaini, Federico; Squadrilli, Anna; Tiseo, Marcello; Frati, Caterina; Lagrasta, Costanza; Azzoni, Cinzia; Bottarelli, Lorena; Galetti, Maricla; Alama, Angela; Belletti, Silvana; Gatti, Rita; Passaro, Antonio; Gradilone, Angela; Cavazzoni, Andrea; Alfieri, Roberta; Petronini, Pier Giorgio; Bonelli, Mara; Falco, Angela; Carubbi, Cecilia; Pedrazzi, Giuseppe; Nizzoli, Rita; Naldi, Nadia; Pinto, Carmine; Ardizzoni, Andrea

    2015-01-01

    The exclusion of circulating tumor cells (CTCs) that have lost epithelial antigens during the epithelial-to-mesenchymal transition (EMT) process by using Epithelial Cell Adhesion Molecule (EpCAM) based capture methods is still a matter of debate. In this study, cells obtained after depletion procedure from blood samples of squamous cell lung cancer (SQCLC) patients were identified based on morphology and characterized with the combination of FISH assessment and immunophenotypic profile. Five mL blood samples, collected from 55 advanced SQCLC patients, were analyzed by a non-EpCAM-based capture method. After depletion of leukocytes and erythroid cells, the negative fraction was characterized by both FISH using a fibroblast growth factor receptor 1 (FGFR1) probe and by immunocytochemistry. Thirty healthy donors were also tested. Based on morphology (nuclear dimension ≥10 μm, shape and hypercromatic aspect) suspicious circulating cells clearly distinguishable from contaminant leukocytes were observed in 49/55 (89%) SQCLC patients. Thirty-four of the 44 (77%) samples evaluable for FGFR1 FISH showed ≥ 6 FGFR1 gene copy number on average per cell. Vimentin expression involved 43% (18/42) of pooled circulating SQCLC cells, whereas only 29% (14/48) were EpCAM positive. Confocal microscopy confirmed the localization of FGFR1 probe in suspicious circulating cells. Suspicious circulating elements were also observed in healthy donors and did not show any epithelial associated antigens. A significantly lower number of suspicious circulating cells in healthy donors compared to SQCLC patients was found. Among the heterogeneous cell population isolated by depletion procedure, the coexistence of cells with epithelial and/or mesenchymal phenotype suggests that EMT may participate to transendothelial invasion and migration of tumor cells in advanced SQCLC. The finding of cells with neither EpCAM or EMT phenotype, retrieved after non-EpCAM-based systems, underlines the presence

  14. Granite intrusion in a metamorphic core complex: the example of the Mykonos laccolith (Cyclades, Greece)

    NASA Astrophysics Data System (ADS)

    Denèle, Yoann; Lecomte, Emmanuel; Jolivet, Laurent; Huet, Benjamin; Labrousse, Loïc.; Le Pourhiet, Laetitia; Lacombe, Olivier

    2010-05-01

    Numerical and analogical modelling underlined the importance of a pre-existing anomaly of viscosity-density such as a granite or migmatitic body below the brittle-ductile transition as a primary cause of metamorphic core complex (MCC) developpement. While field studies of MCC show a spatial and temporal link between MCC formation and plutonic activity, thermochronological studies show that there is no link between the intrusion of granites and the velocity of slip on the detachement plane. The Aegean domain is a good natural laboratory for studying the formation of MCC and syn-tectonic granites. In the northern Cyclades, the Mykonos-Delos-Rhenia MCC is characterised by the intrusion of a plurikilometric Late Miocene pluton of I-type granite within a migmatitic gneiss dome. AMS (Anisotropy of magnetic susceptibility) and microstructural studies in the Mykonos granites combined with recent cooling rate data allow us to use the granites as strain marker. The Mykonos granitoïds form a plurikilometric laccolith slightly deeping to the east and presenting an elliptical shape with a N170°E long axis. The laccolith is strongly asymmetrical with an outlying root zone in the SW cropping out on Delos and Rhenia islands and a major body mainly developed to the NE and cropping out on Mykonos Island. The laccolith consists of various petrographic facies presenting straight contacts that demonstrate emplacement by successive pulses of more or less differentiated magmas. The laccolith was developed at the interface between the Cycladic Basement and the Blueschists Unit and within the Blueschist Unit. Two events of deformation have been recorded in the granites. The first event is characterized by submagmatic and high to middle temperature protomylonite microstructures developped during or just after the intrusion. The second event of deformation characterized by low temperature mylonites and cataclasites close to the major detachment fault corresponds to the localization of

  15. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  16. Stress reaction process-based hierarchical recognition algorithm for continuous intrusion events in optical fiber prewarning system

    NASA Astrophysics Data System (ADS)

    Qu, Hongquan; Yuan, Shijiao; Wang, Yanping; Yang, Dan

    2018-04-01

    To improve the recognition performance of optical fiber prewarning system (OFPS), this study proposed a hierarchical recognition algorithm (HRA). Compared with traditional methods, which employ only a complex algorithm that includes multiple extracted features and complex classifiers to increase the recognition rate with a considerable decrease in recognition speed, HRA takes advantage of the continuity of intrusion events, thereby creating a staged recognition flow inspired by stress reaction. HRA is expected to achieve high-level recognition accuracy with less time consumption. First, this work analyzed the continuity of intrusion events and then presented the algorithm based on the mechanism of stress reaction. Finally, it verified the time consumption through theoretical analysis and experiments, and the recognition accuracy was obtained through experiments. Experiment results show that the processing speed of HRA is 3.3 times faster than that of a traditional complicated algorithm and has a similar recognition rate of 98%. The study is of great significance to fast intrusion event recognition in OFPS.

  17. Ore genesis dating: implication of Sm-Nd method using sulfide minerals for mafic-ultramafic layered intrusions of Fennoscandian Shield

    NASA Astrophysics Data System (ADS)

    Serov, Pavel; Bayanova, Tamara; Steshenko, Ekaterina; Ekimova, Nadezhda

    2015-04-01

    The main method of dating the ore process was the Re-Os method of sulfides (Luck, Allegre, 1983; Walker et. al., 1991). However, studies of Re-Os systematics of sulfide minerals do not always give the correct ages and showing the disturbances of the Re-Os systematics. At the same time, Sm-Nd age of sulfides in good agreement with the U-Pb dating on zircon and baddeleyite and suggests that the Sm-Nd system of sulfides is more resistant to secondary alteration processes. Our studies have shown that along with rock-forming, ore minerals (sulfides) can be used to determine the ore genesis time of industrially important geological sites, since exactly with the sulfides the industry Pt-Pd mineralization is closely connected. In to Sm-Nd measurements steadily introduce new minerals-geochronometers (i.e. titanite, burbancite, eudialite etc.). Of these, sulfides of PGE-bearing layered intrusions are quite important in terms of dating the process of ore origin. Studying the REE distribution in the sulfides of MOR hydrothermal sources has shown possible REE presence in the sulfide lattice (Rimskaya-Korsakova et. al., 2003). These are difficult to carry out because the concentrations of Sm and Nd isotopes in sulfides are much lower than those in chondrites (Rimskaya-Korsakova et. al., 2003). In (Kong et. al., 2000) sulfides from two metamorphosed chondrites were studied by instrumental neutron activation analysis (INAA) and ion probe. As shown, the level of REE in the sulfide phase determined by the ion probe is quite similar to that obtained by INAA. Although the concentrations of REE in the enstatite and the Fe, Si, Cr-rich inclusions are comparable to those in sulfide, estimates based on mass balance calculations show that the silicate inclusions would not noticeably contribute to the REE budget in sulfides (Kong et. al., 2000). For the first time in Russian geochemistry laboratories using sulfide and rock-forming minerals and WR in Sm-Nd method have been dated impregnated

  18. Effects of intrusions on grades and contents of gold and other metals in volcanogenic massive sulfide deposits

    USGS Publications Warehouse

    Singer, Donald A.; Berger, Vladimir; Mosier, Dan L.

    2011-01-01

    The reason some VMS deposits contain more gold or other metals than others might be due to the influence of intrusions. A new approach examining this possibility is based on examining the information about many VMS deposits to test statistically if those with associated intrusions have significantly different grades or amounts of metals. A set of 632 VMS deposits with reported grades, tonnages, and information about the observed presence or absence of subvolcanic or plutonic intrusive bodies emplaced at or after VMS mineralization is statistically analyzed.Deposits with syn-mineralization or post-mineralization intrusions nearby have higher tonnages than deposits without reported intrusions, but the differences are not statistically significant. When both kinds of intrusions are reported, VMS deposit sizes are significantly higher than in the deposits without any intrusions. Gold, silver, zinc, lead, and copper average grades are not significantly different in the VMS deposits with nearby intrusions compared to deposits without regardless of relative age of intrusive. Only zinc and copper contents are significantly higher in VMS deposits with both kinds of intrusive reported. These differences in overall metal content are due to significantly larger deposit sizes of VMS deposits where both intrusive kinds are observed and reported, rather than any difference in metal grades.

  19. System and method for generating micro-seismic events and characterizing properties of a medium with non-linear acoustic interactions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vu, Cung Khac; Nihei, Kurt; Johnson, Paul A.

    2015-12-29

    A method and system includes generating a first coded acoustic signal including pulses each having a modulated signal at a central frequency; and a second coded acoustic signal each pulse of which includes a modulated signal a central frequency of which is a fraction d of the central frequency of the modulated signal for the corresponding pulse in the first plurality of pulses. A receiver detects a third signal generated by a non-linear mixing process in the mixing zone and the signal is processed to extract the third signal to obtain an emulated micro-seismic event signal occurring at the mixingmore » zone; and to characterize properties of the medium or creating a 3D image of the properties of the medium, or both, based on the emulated micro-seismic event signal.« less

  20. Evaluating the effects of consolidation on intrusion and retraction using temporary anchorage devices-a FEM study.

    PubMed

    Namburi, Monica; Nagothu, Sleevaraju; Kumar, Chetan S; Chakrapani, N; Hanumantharao, C H; Kumar, Supradeep K

    2017-12-01

    Extraction of premolars and retracting the anterior teeth using mini-implants and anterior retraction hooks became advent now a day. In such treatments, consolidation of arches is not done in regular practice. So, the present study is concentrated on effects of consolidation in two implant and three implant combinations of retraction and intrusion. A three-dimensional FEM model of maxillary teeth and periodontal ligament housed in the alveolar bone with the first premolars extracted is generated with appropriate number of elements and nodes. The models were broadly divided into two groups according to the no. of implants. Mini-implants were placed bilaterally between the second premolar and molar at varying heights (7, 10, 13 mm) in group I, and along with bilateral implants, an additional mid-implant is placed between the central incisors as group II. Brackets with 0.022 slot were placed on the teeth, 19 × 25 SS wire is placed in the brackets, an anterior retraction hook was placed at 9 mm height, and analysis was done to evaluate the stresses and displacement patterns in consolidation and non-consolidation models. The results showed that consolidation of the anterior teeth during intrusion and retraction shows various advantages such as less stresses on the bone, PDL, implant, teeth, and no labial flaring of the anterior teeth and three implant system, i.e., two bilateral implant at 10 mm and a mid-implant at 12 mm between the centrals has shown to be better than other models as bodily movement is observed. Consolidation is better than non consolidation during enmasse retraction and intrusion.

  1. Characterization and Processing of Non-Uniformities in Back-Illuminated CCDs

    NASA Astrophysics Data System (ADS)

    Lemm, Alia D.; Della-Rose, Devin J.; Maddocks, Sally

    2018-01-01

    In astronomical photometry, Charged Coupled Device (CCD) detectors are used to achieve high precision photometry and must be properly calibrated to correct for noise and pixel non-uniformities. Uncalibrated images may contain bias offset, dark current, bias structure and uneven illumination. In addition, standard data reduction is often not sufficient to “normalize” imagery to single-digit millimagnitude (mmag) precision. We are investigating an apparent non-uniformity, or interference pattern, in a back-illuminated sensor, the Alta U-47, attached to a DFM Engineering 41-cm Ritchey-Chrétien f/8 telescope. Based on the amplitude of this effect, we estimate that instrument magnitude peak-to-valley deviations of 50 mmag or more may result. Our initial testing strongly suggests that reflected skylight from high pressure sodium city lights may be the cause of this interference pattern. Our research goals are twofold: to fully characterize this non-uniformity and to determine the best method to remove this interference pattern from our reduced CCD images.

  2. Alerts Visualization and Clustering in Network-based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administratormore » with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.« less

  3. The Effects of Saltwater Intrusion to Flood Mitigation Project

    NASA Astrophysics Data System (ADS)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  4. ON-LINE CALCULATOR: VAPOR INTRUSION MODELING

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is called vapor intrusion (VI). Volatile organic chemicals in contaminated soils or groundwater can emit vapors, which may migrate through subsurface soils and may enter the indoor air of overlying build...

  5. Work Zone Intrusion Report Interface Design

    DOT National Transportation Integrated Search

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  6. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  7. Ultra-long high-sensitivity Φ-OTDR for high spatial resolution intrusion detection of pipelines.

    PubMed

    Peng, Fei; Wu, Han; Jia, Xin-Hong; Rao, Yun-Jiang; Wang, Zi-Nan; Peng, Zheng-Pu

    2014-06-02

    An ultra-long phase-sensitive optical time domain reflectometry (Φ-OTDR) that can achieve high-sensitivity intrusion detection over 131.5km fiber with high spatial resolution of 8m is presented, which is the longest Φ-OTDR reported to date, to the best of our knowledge. It is found that the combination of distributed Raman amplification with heterodyne detection can extend the sensing distance and enhances the sensitivity substantially, leading to the realization of ultra-long Φ-OTDR with high sensitivity and spatial resolution. Furthermore, the feasibility of applying such an ultra-long Φ-OTDR to pipeline security monitoring is demonstrated and the features of intrusion signal can be extracted with improved SNR by using the wavelet detrending/denoising method proposed.

  8. Lower incisor intrusion with intraoral transosseous stainless steel wire anchorage in rabbits.

    PubMed

    Wu, Jian-chao; Huang, Ji-na; Lin, Xin-ping

    2010-06-01

    The purpose of this research was to investigate the potential use of intraoral transosseous stainless steel wires as anchorage for intrusion of the lower incisors using a rabbit model. Placement of intraoral transosseous stainless steel wires around incisors is similar to that of intraoral transosseous wiring of edentulous mandibular fractures. Ten male New Zealand rabbits, 9 +/- 1.5 months of age, average weight 1.8 +/- 0.3 kg, were used in this study. One lower incisor was intruded with a 50 g bilateral force using a coil spring for 10 weeks, while the other incisor served as the control. Clinical measurements of the distances between the occlusal edges of the incisors (EE) were performed weekly with a calliper. In addition to standard descriptive statistical calculations, a paired Student's t-test was used for comparison of the two groups. All surgical sites healed uneventfully after insertion of the wires. Significant differences were found in the change of EE between the experimental and control sides from 4 weeks onwards. Intrusion of the incisor, 4 +/- 0.58 mm, was seen on the test side, while EE on the control side remained unchanged. Within the limits of this animal study, it is concluded that the intraoral transosseous stainless steel wire anchorage system is a cost-effective method for intrusion of lower incisors when the use of other anchorage system is not possible.

  9. Accounting for intrusive thoughts in PTSD: Contributions of cognitive control and deliberate regulation strategies.

    PubMed

    Bomyea, Jessica; Lang, Ariel J

    2016-03-01

    Persistent, trauma-related intrusive thoughts are common in individuals with posttraumatic stress disorder (PTSD). Automatic aspects of cognitive functioning (including executive functioning) and maladaptive deliberate attempts at cognitive regulation have been proposed as individual difference factors that may perpetuate intrusive thoughts. The current study sought to examine the joint contribution of these two factors on intrusive thoughts in PTSD. Forty-two women with PTSD completed an executive functioning assessment followed by a thought suppression task. Intrusive thoughts (frequency and duration), as well as participants' use of specific cognitive regulation strategies (avoidance-based thought regulation strategies; TRS), were measured during the task. Hierarchical linear regression was used to examine the interaction of executive functioning and TRS on intrusive thoughts. Greater use of TRS was associated with greater intrusive thought persistence for those with low executive functioning, but not those with high executive functioning. Data was collected cross-sectionally and the laboratory thought suppression task may not correspond to naturalistic thought regulation. Results are consistent with prior literature suggesting that certain responses deployed by individuals to control intrusive thoughts may be unhelpful, but that a higher level of cognitive capacity may mitigate this effect. Implications of these findings for recent models of cognition in PTSD are discussed. Published by Elsevier B.V.

  10. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  11. Ratio of Major Ions in Groundwater to Determine Saltwater Intrusion in Coastal Areas

    NASA Astrophysics Data System (ADS)

    Sudaryanto; Naily, Wilda

    2018-02-01

    Saltwater or seawater intrusion into groundwater aquifers occurs mostly in big cities and developing coastal cities. Coastal hydrology is associated with complex and highly dynamic environmental characteristics of interactions between groundwater, surface water, and water from the estuary. The rise of sea levels and excessive use of groundwater for clean water source trigger saltwater intrusion. Identification of saltwater intrusion into groundwater can be done by groundwater sampling and major ion analysis. The major ions dissolved in water are Ca, Mg, Na, K, Cl, HCO3, and SO4; the major ion ratios are Cl/Br, Ca/Mg, Ca/ (HCO3 and SO4), and Na/Cl. By knowing whether groundwater quality has been or has not been influenced by saltwater, groundwater zones can be determined in every coastal area. In addition, by analyzing and reviewing some concepts about the intrusion or contamination of saltwater into groundwater, there will be sufficient results for the identification of saltwater intrusion.

  12. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    PubMed

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  13. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms

    PubMed Central

    James, Ella L.; Bonsall, Michael B.; Hoppitt, Laura; Tunbridge, Elizabeth M.; Geddes, John R.; Milton, Amy L.

    2015-01-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind’s eye and cause distress. We investigated whether reconsolidation—the process during which memories become malleable when recalled—can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. PMID:26133572

  14. Magma transport in sheet intrusions of the Alnö carbonatite complex, central Sweden.

    PubMed

    Andersson, Magnus; Almqvist, Bjarne S G; Burchardt, Steffi; Troll, Valentin R; Malehmir, Alireza; Snowball, Ian; Kübler, Lutz

    2016-06-10

    Magma transport through the Earth's crust occurs dominantly via sheet intrusions, such as dykes and cone-sheets, and is fundamental to crustal evolution, volcanic eruptions and geochemical element cycling. However, reliable methods to reconstruct flow direction in solidified sheet intrusions have proved elusive. Anisotropy of magnetic susceptibility (AMS) in magmatic sheets is often interpreted as primary magma flow, but magnetic fabrics can be modified by post-emplacement processes, making interpretation of AMS data ambiguous. Here we present AMS data from cone-sheets in the Alnö carbonatite complex, central Sweden. We discuss six scenarios of syn- and post-emplacement processes that can modify AMS fabrics and offer a conceptual framework for systematic interpretation of magma movements in sheet intrusions. The AMS fabrics in the Alnö cone-sheets are dominantly oblate with magnetic foliations parallel to sheet orientations. These fabrics may result from primary lateral flow or from sheet closure at the terminal stage of magma transport. As the cone-sheets are discontinuous along their strike direction, sheet closure is the most probable process to explain the observed AMS fabrics. We argue that these fabrics may be common to cone-sheets and an integrated geology, petrology and AMS approach can be used to distinguish them from primary flow fabrics.

  15. Volcano-tectonic earthquakes: A new tool for estimating intrusive volumes and forecasting eruptions

    USGS Publications Warehouse

    White, Randall A.; McCausland, Wendy

    2016-01-01

    Notable cases in which distal VT events preceded eruptions at long-dormant volcanoes include: Nevado del Ruiz (1984–1985), Pinatubo (1991), Unzen (1989–1995), Soufriere Hills (1995), Shishaldin (1989–1999), Tacana' (1985–1986), Pacaya (1980–1984), Rabaul (1994), and Cotopaxi (2001). Additional cases are recognized at frequently active volcanoes including Popocateptl (2001–2003) and Mauna Loa (1984). We present four case studies (Pinatubo, Soufriere Hills, Unzen, and Tacana') in which we demonstrate the above mentioned VT characteristics prior to eruptions. Using regional data recorded by NEIC, we recognized in near-real time that a huge distal VT swarm was occurring, deduced that a proportionately huge magmatic intrusion was taking place beneath the long dormant Sulu Range, New Britain Island, Papua New Guinea, that it was likely to lead to eruptive activity, and warned Rabaul Volcano Observatory days before a phreatic eruption occurred. This confirms the value of this technique for eruption forecasting. We also present a counter-example where we deduced that a VT swarm at Volcan Cosiguina, Nicaragua, indicated a small intrusion, insufficient to reach the surface and erupt. Finally, we discuss limitations of the method and propose a mechanism by which this distal VT seismicity is triggered by magmatic intrusion.

  16. Magma transport in sheet intrusions of the Alnö carbonatite complex, central Sweden

    PubMed Central

    Andersson, Magnus; Almqvist, Bjarne S. G.; Burchardt, Steffi; Troll, Valentin R.; Malehmir, Alireza; Snowball, Ian; Kübler, Lutz

    2016-01-01

    Magma transport through the Earth’s crust occurs dominantly via sheet intrusions, such as dykes and cone-sheets, and is fundamental to crustal evolution, volcanic eruptions and geochemical element cycling. However, reliable methods to reconstruct flow direction in solidified sheet intrusions have proved elusive. Anisotropy of magnetic susceptibility (AMS) in magmatic sheets is often interpreted as primary magma flow, but magnetic fabrics can be modified by post-emplacement processes, making interpretation of AMS data ambiguous. Here we present AMS data from cone-sheets in the Alnö carbonatite complex, central Sweden. We discuss six scenarios of syn- and post-emplacement processes that can modify AMS fabrics and offer a conceptual framework for systematic interpretation of magma movements in sheet intrusions. The AMS fabrics in the Alnö cone-sheets are dominantly oblate with magnetic foliations parallel to sheet orientations. These fabrics may result from primary lateral flow or from sheet closure at the terminal stage of magma transport. As the cone-sheets are discontinuous along their strike direction, sheet closure is the most probable process to explain the observed AMS fabrics. We argue that these fabrics may be common to cone-sheets and an integrated geology, petrology and AMS approach can be used to distinguish them from primary flow fabrics. PMID:27282420

  17. A new interpretation of the structure of the Sept Iles Intrusive suite, Canada

    NASA Astrophysics Data System (ADS)

    Higgins, Michael D.

    2005-08-01

    The layered mafic intrusion at Sept Iles, Canada, is one of the largest intrusions in the world. A new interpretation of its structure is proposed, based on a review of its geology and a comparison with the Skaergaard intrusion, Greenland. Several different magmatic components are recognized; hence the name Sept Iles Intrusive suite (SIIS) is proposed. Emplacement of the suite may have been preceded by eruption of flood basalts. The first magmas of the suite rose in the crust to accumulate beneath the density filter afforded by the basalts. The largest component is the Sept Iles Mafic intrusion (SIMI). The Lower series of the SIMI is dominated by leucotroctolites and leucogabbros. Above it lie the Layered series, which is largely comprised of gabbro and troctolite. Both these units are unchanged from earlier interpretations. The anorthosites (s.l.), gabbros and monzogabbros, formerly called the Transitional series, are now considered to be the Upper Border series, developed by floatation of plagioclase. Common autoliths in the Layered series are parts of the hydrothermally altered Upper Border series from towards the interior of the intrusion, which have foundered and settled through the magma. The contamination of the magma that accompanied this event oxidised iron in the magma and led to the precipitation of magnetite around the periphery of the intrusion. The subsequent depletion of Fe 3+ and/or increase in SiO 2, CaO and P 2O 5 may have induced apatite saturation and accumulation to form two layers rich in apatite, near the base and at top of the Layered series. Granitic magma was developed by fractional crystallisation and was emplaced along the roof of the chamber, where it acquired large quantities of xenoliths. These were probably derived from the flood basalts, their evolved members and fragments of mafic dykes chilled by the granitic magma. Accumulations of monzonite pillows in this unit testify to another magmatic event and a floor to the granitic magma

  18. Lithologic mapping of mafic intrusions in East Greenland using Landsat Thematic Mapper data

    NASA Technical Reports Server (NTRS)

    Naslund, H. Richard; Birnie, R. W.; Parr, J. T.

    1989-01-01

    The East Greenland Tertiary Igneous Province contains a variety of intrusive and extrusive rock types. The Skaergaard complex is the most well known of the intrusive centers. Landsat thematic mapping (TM) was used in conjunction with field spectrometer data to map these mafic intrusions. These intrusions are of interest as possible precious metal ore deposits. They are spectrally distinct from the surrounding Precambrian gneisses. However, subpixel contamination by snow, oxide surface coatings, lichen cover and severe topography limit the discrimination of lithologic units within the gabbro. Imagery of the Skaergaard and surrounding vicinity, and image processing and enhancement techniques are presented. Student theses and other publications resulting from this work are also listed.

  19. Metamorphic charnockite in contact aureoles around intrusive enderbite from Natal, South Africa

    NASA Astrophysics Data System (ADS)

    van den Kerkhof, Alfons M.; Grantham, Geoffrey H.

    In the Port Edward area of southern Kwa-Zulu Natal, South Africa, charnockitic aureoles up to 10m in width in the normally garnetiferous Nicholson's Point Granite, are developed adjacent to intrusive contacts with the Port Edward Enderbite and anhydrous pegmatitic veins. Mineralogical differences between the country rock and charnockitic aureole suggest that the dehydration reaction Bt+Qtz-->Opx+Kfs+H2O and the reaction of Grt+Qtz-->Opx+Pl were responsible for the charnockitization. The compositions of fluid inclusions show systematic variation with: (1) the Port Edward Enderbite being dominated by CO2 and N2 fluid inclusions; (2) the non-charnockitized granite by saline aqueous inclusions with 18-23 EqWt% NaCl; (3) the charnockitic aureoles by low-salinity and pure water inclusions (<7 EqWt% NaCl); (4) the pegmatites by aqueous inclusions of various salinity with minor CO2. As a result of the thermal event the homogenization temperatures of the inclusions in charnockite show a much larger range (up to 390°C) compared to the fluid inclusions in granite (mostly <250°C). Contrary to fluid-controlled charnockitization (brines, CO2) which may have taken place along shear zones away from the intrusive body, the present ``proximal'' charnockitized granite formed directly at the contact with enderbite. The inclusions indicate contact metamorphism induced by the intrusion of ``dry'' enderbitic magma into ``wet'' granite resulting in local dehydration. This was confirmed by cathodoluminescence microscopy showing textures indicative for the local reduction of structural water in the charnockite quartz. Two-pyroxene thermometry on the Port Edward Enderbite suggests intrusion at temperatures of 1000-1050°C into country rock with temperature of <700°C. The temperature of aureole formation must have been between 700°C (breakdown of pyrite to form pyrrhotite) and 1000°C. Charnockitization was probably controlled largely by heat related to anhydrous intrusions causing

  20. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    PubMed

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  1. The role of intrusions in the formation of Irish-type mineralisation

    NASA Astrophysics Data System (ADS)

    McCusker, Jim; Reed, Christopher

    2013-08-01

    The Stonepark Prospect is located in County Limerick, south-central Ireland. Multiple zones of Zn-Pb mineralisation have been identified at Stonepark and these are approximately 5 km west of the Pallas Green Prospect. At Stonepark, the sulphide bodies are hosted within the Waulsortian Limestone and closely resemble other Irish-type deposits. The mineralisation is composed of pyrite-marcasite, sphalerite and galena with gangue Fe-dolomite and calcite cements. A key difference at Stonepark is the presence of Chadian-aged volcanic rocks (Knockroe Volcanics) that intrude into and overlie the Waulsortian Limestone. Subsequent hydrothermal brecciation of the Waulsortian Limestone and Knockroe intrusions resulted in the formation of tabular polymict breccia bodies containing mixed carbonate and clasts of intrusive rocks. These have then been overprinted by massive sulphide mineralisation. Further syn-mineralisation brecciation has overprinted the earlier breccias. Drilling has demonstrated a spatial relationship between the volume of intrusive rocks (dykes and polymict breccias) and Zn-Pb mineralisation. This association suggests that the intrusive rocks provided a mechanism for the introduction of the mineralising fluids into the breccia bodies. This is significant as to date no large controlling fault has been identified, as is seen at other Irish-type deposits. Further work is required to understand the alteration process of the intrusive rocks and how this may relate to the mineralising process.

  2. Sill intrusion in volcanic calderas: implications for vent opening probability

    NASA Astrophysics Data System (ADS)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  3. Bayesian aggregation versus majority vote in the characterization of non-specific arm pain based on quantitative needle electromyography

    PubMed Central

    2010-01-01

    Background Methods for the calculation and application of quantitative electromyographic (EMG) statistics for the characterization of EMG data detected from forearm muscles of individuals with and without pain associated with repetitive strain injury are presented. Methods A classification procedure using a multi-stage application of Bayesian inference is presented that characterizes a set of motor unit potentials acquired using needle electromyography. The utility of this technique in characterizing EMG data obtained from both normal individuals and those presenting with symptoms of "non-specific arm pain" is explored and validated. The efficacy of the Bayesian technique is compared with simple voting methods. Results The aggregate Bayesian classifier presented is found to perform with accuracy equivalent to that of majority voting on the test data, with an overall accuracy greater than 0.85. Theoretical foundations of the technique are discussed, and are related to the observations found. Conclusions Aggregation of motor unit potential conditional probability distributions estimated using quantitative electromyographic analysis, may be successfully used to perform electrodiagnostic characterization of "non-specific arm pain." It is expected that these techniques will also be able to be applied to other types of electrodiagnostic data. PMID:20156353

  4. Saltwater Intrusion and its Long-Term Consequences in a Coastal Alluvial Aquifer of Northern Oman

    NASA Astrophysics Data System (ADS)

    Weyhenmeyer, C. E.; Waber, H. N.

    2002-12-01

    The alluvial aquifer of the Eastern Batinah coastal plain supplies water for the most densely populated, cultivated and industrialized areas in the Sultanate of Oman. In recent years, overexploitation of these groundwater resources has resulted in a drastic lowering of the groundwater table and consequent seawater intrusion into the coastal aquifer sections. During recent drilling operations near the coast (~3 km) groundwater samples were taken at depths intervals of 2-5 m. The front of the saline intrusion wedge was encountered at a depth of 70-80 mbs as suggested by sudden changes in groundwater chemistry and isotope values. Groundwater near the saline intrusion front is characterized by lower Na/Cl and higher Ca/Mg ratios compared to ion ratios expected from groundwater mixing calculations between fresh- and saltwater. The observed changes in ion ratios suggest that Na is removed from the groundwater and replaced by Ca from cation exchange surfaces in the aquifer (e.g., clay particles), which is an indication that the saline front is still migrating inland. To date, a deterioration of overall groundwater quality can be recognized as far inland as 15 km and Cl and Na concentrations in these areas are well above the general quality standards for drinking water. Estimates of infiltration rates based on isotope ratios (Sr, O, H) suggest that less than 10% of the total groundwater recharge occurs on the coastal plain itself, with the remaining 90% originating in the adjacent Oman Mountains. Groundwater residence times on the coastal plain are in the order of a few hundred to several thousand years as suggested by a number of radioactive isotopes (3H, 85Kr, 39Ar, 14C). Therefore, these groundwater resources essentially have to be considered non-renewable and there is a pressing requirement for the development of sustainable groundwater management strategies. Attempts to artificially increase infiltration on the coastal plain by the construction of large recharge dams

  5. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida

    NASA Astrophysics Data System (ADS)

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett

    2016-08-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  6. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida.

    PubMed

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett

    2016-08-25

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  7. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida

    PubMed Central

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett

    2016-01-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer. PMID:27557803

  8. Age and intrusive relations of the Lamarck granodiorite and associated mafic plutons, Sierra Nevada, California

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Joye, J.L.; Bachl, C.A.; Miller, J.S.

    The compositionally zoned Late Cretaceous Lamarck granodiorite, west of Bishop, hosts numerous mafic intrusions ranging from hornblende gabbro to mafic granodiorite. Frost and Mahood (1987) suggested from field relations that the Lamarck and the associated mafic plutons were co-intrusive. Contact relations between the Lamarck host and the mafic intrusions are variable (sharp to diffuse) and in places suggest commingling. In order to constrain the intrusive relationships between the Lamarck and its associated mafic plutons, the authors have analyzed feldspars from the Mt. Gilbert pluton and the Lamarck granodiorite to see if feldspar compositions in the Mt. Gilbert overlap those inmore » the Lamarck host and determined U-Pb zircon ages for the Mt. Gilbert and Lake Sabrina plutons to see if they have the same age as the Lamarck granodiorite. Feldspars from the Lamarck granodiorite are normally zoned and range compositionally from An[sub 38--32]; those in the Mt. Gilbert diorite are also normally zoned but range compositionally from An[sub 49--41] and do not overlap the Lamarck host. Four to five zircon fractions from each pluton were handpicked and dated using U-Pb methods. The Mt. Gilbert mafic diorite has a concordant age of 92.5 Ma and the Lake Sabrina diorite has a concordant age of 91.5 Ma. Ages for the two plutons overlap within error, but multiple fractions from each suggest that the Lake Sabrina pluton is slightly younger than the Mt. Gilbert pluton. These data and field relationships indicate: (1) plagioclase phenocrysts in the Mt. Gilbert pluton were not derived from the Lamarck granodiorite despite their textural similarity; but (2) the Lamarck granodiorite and its associated mafic plutons are co-intrusive as supported by the close agreement of the ages with the crystallization age obtained by Stern and others for the Lamarck granodiorite.« less

  9. Seawater intrusion mapping using electrical resistivity tomography and hydrochemical data. An application in the coastal area of eastern Thermaikos Gulf, Greece.

    PubMed

    Kazakis, N; Pavlou, A; Vargemezis, G; Voudouris, K S; Soulios, G; Pliakas, F; Tsokas, G

    2016-02-01

    The aim of this study was to determine the extent and geometrical characteristics of seawater intrusion in the coastal aquifer of the eastern Thermaikos Gulf, Greece. Hydrochemical data and geoelectrical measurements were combined and supplemented to determine the hydrochemical regime of the study site in regard to seawater phenomena. Chemical analysis of groundwater was performed in 126 boreholes and fifteen electrical resistivity tomographies (ERT) were measured, whereas in two sites the ERT measurements were repeated following the wet season. The Cl(-) concentrations recorded reached 2240 mg/L indicating seawater intrusion which was also verified by ionic ratios. The ionic ratios were overlapped and a seawater intrusion map (SWIM) was produced. A significant part of the coastal aquifer (up to 150 km(2)) is influenced by seawater intrusion. The areas with the most intensive salinization are located between Nea Kallikratia-Epanomi and Aggelochori-Peraia. According to the ERTs, in the influenced areas the salinization of the aquifer exceeds 1 km toward the mainland and its depth reaches 200 m. In the area surrounding Thessaloniki airport, the ERTs revealed salinization of the upper aquifer to depths of up to 40 m, whereas the lower aquifer is uninfluenced. This abnormal distribution of seawater intrusion demonstrates the value of geoelectrical methods in the study of seawater intrusion especially in areas with limited available hydrochemical data. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    PubMed

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Intrusion detection using secure signatures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, Trent Darnel; Haile, Jedediah

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of themore » secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.« less

  12. A Citizen's Guide to Vapor Intrusion Mitigation

    EPA Pesticide Factsheets

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  13. Celebrating 50 years of SWIMs (Salt Water Intrusion Meetings)

    NASA Astrophysics Data System (ADS)

    Post, Vincent E. A.; Essink, Gualbert Oude; Szymkiewicz, Adam; Bakker, Mark; Houben, Georg; Custodio, Emilio; Voss, Clifford

    2018-06-01

    The Salt Water Intrusion Meetings, or SWIMs, are a series of meetings that focus on seawater intrusion in coastal aquifers and other salinisation processes. 2018 marks the 50th year of the SWIM and the 25th biennial meeting. The SWIM proceedings record half a century of research progress on site characterisation, geophysical and geochemical techniques, variable-density flow, modelling, and water management. The SWIM is positioning itself to remain a viable platform for discussing the coastal aquifer management challenges of the next 50 years.

  14. Obsessive relational intrusion: incidence, perceived severity, and coping.

    PubMed

    Cupach, W R; Spitzberg, B H

    2000-01-01

    Two studies investigated the phenomenon of obsessive relational intrusion (ORI), defined as repeated and unwanted pursuit and invasion of one's sense of physical or symbolic privacy by another person, either stranger or acquaintance, who desires and/or presumes an intimate relationship. In Study 1, we sought to identify the incidence of a broad range of relationally intrusive behaviors, to identify the coping responses employed by victims of ORI, and to assess the associations between coping responses and ORI behaviors. Study 2 assessed the perceived degree of severity of ORI behaviors. Results revealed that each of 63 ORI behaviors was experienced by 3-78% of respondents in three different samples. Factor analysis revealed four types of ORI behavior: pursuit, violation, threat, and hyper-intimacy. Responses for coping with ORI consisted of interaction, protection, retaliation, and evasion. Virtually all intrusive behaviors were perceived to be annoying. Some types of ORI behaviors were perceived to be relatively more threatening, upsetting and privacy-invading than others. Although sex differences were not observed for the incidence of ORI or coping, women consistently perceived ORI behaviors to be more annoying, upsetting, threatening, and privacy-invading than did men.

  15. AdaBoost-based algorithm for network intrusion detection.

    PubMed

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  16. Using Unix system auditing for detecting network intrusions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators knowmore » what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.« less

  17. Rapid characterization of transgenic and non-transgenic soybean oils by chemometric methods using NIR spectroscopy

    NASA Astrophysics Data System (ADS)

    Luna, Aderval S.; da Silva, Arnaldo P.; Pinho, Jéssica S. A.; Ferré, Joan; Boqué, Ricard

    Near infrared (NIR) spectroscopy and multivariate classification were applied to discriminate soybean oil samples into non-transgenic and transgenic. Principal Component Analysis (PCA) was applied to extract relevant features from the spectral data and to remove the anomalous samples. The best results were obtained when with Support Vectors Machine-Discriminant Analysis (SVM-DA) and Partial Least Squares-Discriminant Analysis (PLS-DA) after mean centering plus multiplicative scatter correction. For SVM-DA the percentage of successful classification was 100% for the training group and 100% and 90% in validation group for non transgenic and transgenic soybean oil samples respectively. For PLS-DA the percentage of successful classification was 95% and 100% in training group for non transgenic and transgenic soybean oil samples respectively and 100% and 80% in validation group for non transgenic and transgenic respectively. The results demonstrate that NIR spectroscopy can provide a rapid, nondestructive and reliable method to distinguish non-transgenic and transgenic soybean oils.

  18. How significant is the slope of the sea-side boundary for modelling seawater intrusion in coastal aquifers?

    NASA Astrophysics Data System (ADS)

    Walther, Marc; Graf, Thomas; Kolditz, Olaf; Liedl, Rudolf; Post, Vincent

    2017-08-01

    Application of numerical models is a common method to assess groundwater resources. The versatility of these models allows consideration of different levels of complexity, but the accuracy of the outcomes hinges upon a proper description of the system behaviour. In seawater intrusion assessment, the implementation of the sea-side boundary condition is of particular importance. We evaluate the influence of the slope of the sea-side boundary on the simulation results of seawater intrusion in a freshwater aquifer by employing a series of slope variations together with a sensitivity analysis by varying additional sensitive parameters (freshwater inflow and longitudinal and transverse dispersivities). Model results reveal a multi-dimensional dependence of the investigated variables with an increasing relevance of the sea-side boundary slope for seawater intrusion (decrease of up to 32%), submarine groundwater discharge zone (reduction of up to 55%), and turnover times (increase of up to 730%) with increasing freshwater inflow or dispersivity values.

  19. Airborne and Ground-Based Optical Characterization of Legacy Underground Nuclear Test Sites

    NASA Astrophysics Data System (ADS)

    Vigil, S.; Craven, J.; Anderson, D.; Dzur, R.; Schultz-Fellenz, E. S.; Sussman, A. J.

    2015-12-01

    Detecting, locating, and characterizing suspected underground nuclear test sites is a U.S. security priority. Currently, global underground nuclear explosion monitoring relies on seismic and infrasound sensor networks to provide rapid initial detection of potential underground nuclear tests. While seismic and infrasound might be able to generally locate potential underground nuclear tests, additional sensing methods might be required to further pinpoint test site locations. Optical remote sensing is a robust approach for site location and characterization due to the ability it provides to search large areas relatively quickly, resolve surface features in fine detail, and perform these tasks non-intrusively. Optical remote sensing provides both cultural and surface geological information about a site, for example, operational infrastructure, surface fractures. Surface geological information, when combined with known or estimated subsurface geologic information, could provide clues concerning test parameters. We have characterized two legacy nuclear test sites on the Nevada National Security Site (NNSS), U20ak and U20az using helicopter-, ground- and unmanned aerial system-based RGB imagery and light detection and ranging (lidar) systems. The multi-faceted information garnered from these different sensing modalities has allowed us to build a knowledge base of how a nuclear test site might look when sensed remotely, and the standoff distances required to resolve important site characteristics.

  20. Geophysical Character and Geochemical Evolution of the Mesoproterozoic Figueira Branca Intrusive Suite, SW Amazon Craton (Brazil)

    NASA Astrophysics Data System (ADS)

    Louro, Vinicius; Cawood, Peter; Mantovani, Marta

    2016-04-01

    The Jauru Terrain hosts the Figueira Branca Intrusive Suite (FBS) in the SW of the Amazon Craton (Brazil). The FBS is a series of 1425 Ma layered mafic intrusions, previously interpreted as anorogenic. The FBS area is located in foreland to the Santa Helena orogen, formed by the subduction of the Rio Alegre Terrain under the Jauru Terrain. Potential field methods (magnetic and gravity), gamma-ray spectrometry, geochemical and isotope data were used to characterize and to model the extent of FBS magmatism, the distribution of faults and shear zones in the area, to evaluate affinities of the magmatic activity, and the relation between the FBS and the Santa Helena orogen. The geophysical methods identified three anomalies corresponding with FBS outcrops. A fourth anomaly with significantly higher amplitude was observed to the north of the three anomalies. From south to north, the anomalies were named Indiavaí, Azteca, Figueira Branca and Jauru. These anomalies were modeled and indicated a northwest-southeast trend, parallel to regional shear zones. The gamma-ray data enabled the collection of 50 samples from the FBS rocks, the Alto Jauru group that hosts the FBS, from nearby intrusive suites, and the Rio Alegre Terrain. The 30 freshest samples were analyzed by X-ray fluorescence for oxides and some trace elements, 20 by ICP-MS for Rare-Earth Elements and 10 for Nd-Sr isotope analyses. The FBS samples were gabbros and gabbro-norites with Nb/Yb-Th/Yb and TiO2/Yb-Nb/Yb ratios indicating varying degrees of crustal interaction. The TiO2/Yb-Nb/Yb data suggested a subduction related component and the ɛNd-ɛSr indicated a juvenile source. Samples from coeval adjacent intermediate magma suites displayed similar characteristics, which suggest derivation from a bimodal source probably related with the subduction of the Rio Alegre Terrain. We interpreted the tectonic setting of the FBS as a result of a roll-back of the subducted slab, which resulted in rejuvenation of the

  1. Integrated geophysical surveys for mapping lati-andesite intrusive bodies, Chino Valley, Arizona

    USGS Publications Warehouse

    El-Kaliouby, Hesham; Sternberg, Ben K.; Hoffmann, John P.; Langenheim, V.E.

    2012-01-01

    Three different geophysical methods (magnetic, transient electromagnetic (TEM) and gravity) were used near Chino Valley, Arizona, USA in order to map a suspected lati-andesite intrusive body (plug) previously located by interpretation of aeromagnetic data. The magnetic and TEM surveys provided the best indication of the location and depth of the plug. The north-south spatial extent of this plug was estimated to be approximately 600 meters. The depth to the top of the plug was found from the TEM survey to be approximately 350 meters near the center of the survey. The location of the plug defined by the ground magnetic data is consistent with that from the TEM data. Gravity data mostly image the basin-basement interface with a small contribution from the plug of about 0.5 mGal. Results from this investigation can be used to help define the irregular subsurface topography caused by several intrusive lati-andesite plugs that could influence groundwater flow in the area.

  2. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability

    PubMed Central

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A.

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals. PMID:25814962

  3. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    PubMed

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  4. The impact of dissociation on perceptual priming and intrusions after listening to auditory narratives.

    PubMed

    Dorahy, Martin J; Peck, Rowan K; Huntjens, Rafaele J C

    2016-01-01

    This study investigates the causal role of dissociation in intrusive memory development and possible underlying aberrant memory processes (e.g., increased perceptual priming). Using an audio-only adaption of the trauma film paradigm, we divided 60 participants into 3 conditions and presented them with different visual tasks-mirror staring, dot staring, or neutral images. The former 2 conditions were hypothesized to induce dissociation. Postaudio, a number of factors were assessed, including state dissociation, perceptual priming and conceptual priming, as well as intrusions over 3 days. Participants in the dissociation conditions displayed an increase in perceptual priming compared to those in the control condition and reported more distressing intrusions. No differences were found in conceptual priming and the overall number of intrusions between conditions. Findings contribute to the growing knowledge on the impact of dissociation and cognitive processing in the etiology of posttraumatic stress disorder intrusions.

  5. Comparison of intrusion effects on maxillary incisors among mini implant anchorage, j-hook headgear and utility arch.

    PubMed

    Jain, Ravindra Kumar; Kumar, Sridhar Prem; Manjula, W S

    2014-07-01

    Intrusion of maxillary incisors is one of the most important and difficult tooth movements to achieve as a part of orthodontic therapy. A variety of techniques were used in the past to intrude the maxillary incisors before the emergence of mini implants in Orthodontics. Mini implants are temporary anchorage devices used to produce various tooth movements. The research was carried out to evaluate and compare the efficiency of producing intrusion of maxillary incisors using mini implants, utility arch and j- hook headgear. The study was conducted on 30 subjects divided into 3 Groups equally. Group 1- mini implant anchorage, Group 2 - j- hooks headgear and Group 3- utility arch were used for intrusion of the maxillary incisors. Conventional lateral cephalograms were taken before treatment and at the end of intrusion. Five cephalometric parameters were used to measure the amount of intrusion attained in each Group. Intra Group comparisons were done using student t-test and inter Group comparisons were done using ANOVA The duration of intrusion was four months in all the three Groups. In Group 1 the mean average intrusion attained was 2.1 mm, the mean average intrusion attained in Group 2 was 0.7 mm, and the mean average intrusion achieved in Group 3 was 1.4 mm with a side effect of 0.75 mm of molar extrusion. Although, both mini implants and utility arch can be used to attain significant amounts of incisor intrusion but using mini implants will produce true intrusion without any other side effects.

  6. Water intrusion in thin-skinned composite honeycomb sandwich structures

    NASA Technical Reports Server (NTRS)

    Jackson, Wade C.; O'Brien, T. Kevin

    1988-01-01

    Thin-skinned composite honeycomb sandwich structures from the trailing edge of the U.S. Army's Apache and Chinook helicopters have been tested to ascertain their susceptibility to water intrusion as well as such intrusions' effects on impact damage and cyclic loading. Minimum-impact and fatigue conditions were determined which would create microcracks sufficiently large to allow the passage of water through the skins; damage sufficient for this to occur was for some skins undetectable under a 40X-magnification optical microscope. Flow rate was a function of moisture content, damage, applied strain, and pressure differences.

  7. Aeromagnetic and radio echo ice-sounding measurements show much greater area of the Dufek intrusion, Antarctica

    USGS Publications Warehouse

    Behrendt, John C.; Drewry, D.J.; Jankowski, E.; Grim, M.S.

    1980-01-01

    A combined aeromagnetic and radio echo ice-sounding survey made in 1978 in Antarctica over the Dufek layered mafic intrusion suggests a minimum area of the intrusion of about 50,000 square kilometers, making it comparable in size with the Bushveld Complex of Africa. Comparisons of the magnetic and subglacial topographic profiles illustrate the usefulness of this combination of methods in studying bedrock geology beneath ice-covered areas. Magnetic anomalies range in peak-to-trough amplitude from about 50 nanoteslas over the lowermost exposed portion of the section in the Dufek Massif to about 3600 nanoteslas over the uppermost part of the section in the Forrestal Range. Theoretical magnetic anomalies, computed from a model based on the subice topography fitted to the highest amplitude observed magnetic anomalies, required normal and reversed magnetizations ranging from 10-3 to 10-2 electromagnetic units per cubic centimeter. This result is interpreted as indicating that the Dufek intrusion cooled through the Curie isotherm during one or more reversals of the earth's magnetic field. Copyright ?? 1980 AAAS.

  8. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  9. An ELISA DYRK1A non-radioactive kinase assay suitable for the characterization of inhibitors

    PubMed Central

    Liu, Yong; Adayev, Tatyana; Hwang, Yu-Wen

    2017-01-01

    The DYRK1A (dual specificity tyrosine phosphorylation-regulated kinase 1A) gene encodes a proline-directed Ser/Thr kinase. Elevated expression and/or altered distribution of the kinase have been implicated in the neurological impairments associated with Down syndrome (DS) and Alzheimer’s disease (AD). Consequently, DYRK1A inhibition has been of significant interest as a potential strategy for therapeutic intervention of DS and AD. Many classes of novel inhibitors have been described in the past decade. Although non-radioactive methods for analyzing DYRK1A inhibition have been developed, methods employing radioactive tracers are still commonly used for quantitative characterization of DYRK1A inhibitors. Here, we present a non-radioactive ELISA assay based on the detection of DYRK1A-phosphorylated dynamin 1a fragment using a phosphorylation site-specific antibody. The assay was verified by the use of two well-characterized DYRK1A inhibitors, epigallocatechin gallate (EGCG) and harmine. The IC 50s for EGCG and harmine determined by the ELISA method were found to be comparable to those previously measured by radioactive tracing methods.  Furthermore, we determined the mode of inhibition for EGCG and harmine by a modification of the ELISA assay. This assay confirms the mode of inhibition of EGCG (non-ATP-competitive) and harmine (ATP-competitive), as previously determined. We conclude that the ELISA platform demonstrated here is a viable alternative to the traditional radioactive tracer assays for analyzing DYRK1A inhibitors. PMID:28163906

  10. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  11. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    NASA Astrophysics Data System (ADS)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  12. Origin of a late Neoproterozoic (605 ± 13 Ma) intrusive carbonate-albitite complex in Southern Sinai, Egypt

    NASA Astrophysics Data System (ADS)

    Azer, Mokhles Kamal; Stern, Robert J.; Kimura, Jun-Ichi

    2010-03-01

    New geochemical, isotopic, and geochronological data and interpretations are presented for late Neoproterozoic intrusive carbonates and related rocks of southern Sinai, Egypt (northernmost Arabian-Nubian Shield). The Tarr carbonates are coarsely crystalline and related to explosive emplacement of hypabyssal and volcanic albitite at 605 ± 13 Ma. The carbonates associated with the albitites are divisible into two types: primary dolomitite and secondary breunneritite (Fe-rich magnesite). The dolomitite was clearly intrusive but differs from classic igneous carbonatites, containing much lower abundances of incompatible elements, such as REE, U, Th, Rb, Nb, Y, P, Sr, Zr, Ba, and total alkalies. The breunneritite is a secondary replacement of dolomitite, probably marking the roots of a vigorous hydrothermal system. Albitites show pristine abundances of major and trace elements and were not subjected to a major metamorphic overprint. They are relatively more fractionated, alkaline and related to within-plate A-type magmas, were emplaced in an extensional or non-compressive tectonic regime in the cupola of high-level A-type granite. Tarr albitites may represent residual magma remaining after near-total crystallization of an A-type granite pluton at depth, forcibly emplaced into the roof above the cooling pluton. The intrusive dolomitite exsolved from highly differentiated albitite melt, in the apical regions of a still-buried alkaline “A-type” granite pluton that was rich in CO2; these volatiles migrated upwards and towards the cooler margins of the magma body. Late NNE-SSW extension allowed a shallow-level cupola to form, into which albitite melts and carbonate fluids migrated, culminating in explosive emplacement of albitite breccia and intrusive carbonate. Isotopic compositions of Tarr dolomitite and albitite indicate these are consanguineous and ultimately of mantle origin. Magmatic volatiles fenitized the wall rock, while submarine hydrothermal activity

  13. Mechanical response of the south flank of kilauea volcano, hawaii, to intrusive events along the rift systems

    USGS Publications Warehouse

    Dvorak, J.J.; Okamura, A.T.; English, T.T.; Koyanagi, R.Y.; Nakata, J.S.; Sako, M.K.; Tanigawa, W.T.; Yamashita, K.M.

    1986-01-01

    Increased earthquake activity and compression of the south flank of Kilauea volcano, Hawaii, have been recognized by previous investigators to accompany rift intrusions. We further detail the temporal and spatial changes in earthquake rates and ground strain along the south flank induced by six major rift intrusions which occurred between December 1971 and January 1981. The seismic response of the south flank to individual rift intrusions is immediate; the increased rate of earthquake activity lasts from 1 to 4 weeks. Horizontal strain measurements indicate that compression of the south flank usually accompanies rift intrusions and eruptions. Emplacement of an intrusion at a depth greater than about 4 km, such as the June 1982 southwest rift intrusion, however, results in a slight extension of the subaerial portion of the south flank. Horizontal strain measurements along the south flank are used to locate the January 1983 east-rift intrusion, which resulted in eruptive activity. The intrusion is modeled as a vertical rectangular sheet with constant displacement perpendicular to the plane of the sheet. This model suggests that the intrusive body that compressed the south flank in January 1983 extended from the surface to about 2.4 km depth, and was aligned along a strike of N66??E. The intrusion is approximately 11 km in length, extended beyond the January 1983 eruptive fissures, which are 8 km in length and is contained within the 14-km-long region of shallow rift earthquakes. ?? 1986.

  14. Contaminant gradients in trees: Directional tree coring reveals boundaries of soil and soil-gas contamination with potential applications in vapor intrusion assessment

    USGS Publications Warehouse

    Wilson, Jordan L.; Samaranayake, V.A.; Limmer, Matthew A.; Schumacher, John G.; Burken, Joel G.

    2017-01-01

    Contaminated sites pose ecological and human-health risks through exposure to contaminated soil and groundwater. Whereas we can readily locate, monitor, and track contaminants in groundwater, it is harder to perform these tasks in the vadose zone. In this study, tree-core samples were collected at a Superfund site to determine if the sample-collection location around a particular tree could reveal the subsurface location, or direction, of soil and soil-gas contaminant plumes. Contaminant-centroid vectors were calculated from tree-core data to reveal contaminant distributions in directional tree samples at a higher resolution, and vectors were correlated with soil-gas characterization collected using conventional methods. Results clearly demonstrated that directional tree coring around tree trunks can indicate gradients in soil and soil-gas contaminant plumes, and the strength of the correlations were directly proportionate to the magnitude of tree-core concentration gradients (spearman’s coefficient of -0.61 and -0.55 in soil and tree-core gradients, respectively). Linear regression indicates agreement between the concentration-centroid vectors is significantly affected by in-planta and soil concentration gradients and when concentration centroids in soil are closer to trees. Given the existing link between soil-gas and vapor intrusion, this study also indicates that directional tree coring might be applicable in vapor intrusion assessment.

  15. Contaminant Gradients in Trees: Directional Tree Coring Reveals Boundaries of Soil and Soil-Gas Contamination with Potential Applications in Vapor Intrusion Assessment.

    PubMed

    Wilson, Jordan L; Samaranayake, V A; Limmer, Matthew A; Schumacher, John G; Burken, Joel G

    2017-12-19

    Contaminated sites pose ecological and human-health risks through exposure to contaminated soil and groundwater. Whereas we can readily locate, monitor, and track contaminants in groundwater, it is harder to perform these tasks in the vadose zone. In this study, tree-core samples were collected at a Superfund site to determine if the sample-collection location around a particular tree could reveal the subsurface location, or direction, of soil and soil-gas contaminant plumes. Contaminant-centroid vectors were calculated from tree-core data to reveal contaminant distributions in directional tree samples at a higher resolution, and vectors were correlated with soil-gas characterization collected using conventional methods. Results clearly demonstrated that directional tree coring around tree trunks can indicate gradients in soil and soil-gas contaminant plumes, and the strength of the correlations were directly proportionate to the magnitude of tree-core concentration gradients (spearman's coefficient of -0.61 and -0.55 in soil and tree-core gradients, respectively). Linear regression indicates agreement between the concentration-centroid vectors is significantly affected by in planta and soil concentration gradients and when concentration centroids in soil are closer to trees. Given the existing link between soil-gas and vapor intrusion, this study also indicates that directional tree coring might be applicable in vapor intrusion assessment.

  16. SCMPSP: Prediction and characterization of photosynthetic proteins based on a scoring card method.

    PubMed

    Vasylenko, Tamara; Liou, Yi-Fan; Chen, Hong-An; Charoenkwan, Phasit; Huang, Hui-Ling; Ho, Shinn-Ying

    2015-01-01

    Photosynthetic proteins (PSPs) greatly differ in their structure and function as they are involved in numerous subprocesses that take place inside an organelle called a chloroplast. Few studies predict PSPs from sequences due to their high variety of sequences and structues. This work aims to predict and characterize PSPs by establishing the datasets of PSP and non-PSP sequences and developing prediction methods. A novel bioinformatics method of predicting and characterizing PSPs based on scoring card method (SCMPSP) was used. First, a dataset consisting of 649 PSPs was established by using a Gene Ontology term GO:0015979 and 649 non-PSPs from the SwissProt database with sequence identity <= 25%.- Several prediction methods are presented based on support vector machine (SVM), decision tree J48, Bayes, BLAST, and SCM. The SVM method using dipeptide features-performed well and yielded - a test accuracy of 72.31%. The SCMPSP method uses the estimated propensity scores of 400 dipeptides - as PSPs and has a test accuracy of 71.54%, which is comparable to that of the SVM method. The derived propensity scores of 20 amino acids were further used to identify informative physicochemical properties for characterizing PSPs. The analytical results reveal the following four characteristics of PSPs: 1) PSPs favour hydrophobic side chain amino acids; 2) PSPs are composed of the amino acids prone to form helices in membrane environments; 3) PSPs have low interaction with water; and 4) PSPs prefer to be composed of the amino acids of electron-reactive side chains. The SCMPSP method not only estimates the propensity of a sequence to be PSPs, it also discovers characteristics that further improve understanding of PSPs. The SCMPSP source code and the datasets used in this study are available at http://iclab.life.nctu.edu.tw/SCMPSP/.

  17. Les intrusions de Wirgane (Haut Atlas occidental, Maroc): témoins d'un magmatisme syn- à tardi-cinématique hercynien? (Intrusions of Wirgane [western High Atlas, Morocco]: evidence for a syn- to late kinematic magmatism of Variscan age?)

    NASA Astrophysics Data System (ADS)

    Eddif, A.; Gasquet, D.; Hoepffner, C.; Ayad, N. Ait

    2000-11-01

    The Wirgane intrusives were emplaced into the Late Neoproterozoic to Palæozoic series of the northeast of the Moroccan western High Atlas. The intrusions exhibit a large compositional range from monzogabbro to granite, and they have suffered, together with the country rocks, part of the Variscan tectonic evolution. In the immediate vicinity of the intrusions, thermal metamorphism developed in the country rocks. According to the mineral chemistry of igneous amphibole compositions of diorites and metamorphic minerals, the depth of intrusives was estimated to be less than 11 km. Strain patterns, mapped in both the plutons and the country rocks, and microtectonic data indicate that the intrusions were emplaced in a dextral transcurrent shearing context during the Variscan Orogen. When compared with other intrusions of the western High Atlas (Tichka, Azegour), the Wirgane intrusives are considered to be related to the late stages of the Variscan Belt of Morocco.

  18. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    PubMed

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency During Early Childhood

    PubMed Central

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2012-01-01

    Longitudinal relations among ego-resiliency, effortful control, and observed intrusive parenting were examined at 18, 30, and 42 months of age (Ns = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted effortful control a year later, over and above earlier levels. Effortful control at 30 months mediated the negative relation between 18-month intrusive parenting and ego-resiliency at 42 months when controlling for stability of the variables. Ego-resiliency did not predict effortful control. The findings suggest that intrusive parenting may have a negative effect on children’s personality resiliency through its effects on the abilities to regulate attention and behavior. PMID:23379965

  20. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    NASA Astrophysics Data System (ADS)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  1. Effective use of surface-water management to control saltwater intrusion

    NASA Astrophysics Data System (ADS)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  2. Detonation failure characterization of non-ideal explosives

    NASA Astrophysics Data System (ADS)

    Janesheski, Robert S.; Groven, Lori J.; Son, Steven

    2012-03-01

    Non-ideal explosives are currently poorly characterized, hence limiting the modeling of them. Current characterization requires large-scale testing to obtain steady detonation wave characterization for analysis due to the relatively thick reaction zones. Use of a microwave interferometer applied to small-scale confined transient experiments is being implemented to allow for time resolved characterization of a failing detonation. The microwave interferometer measures the position of a failing detonation wave in a tube that is initiated with a booster charge. Experiments have been performed with ammonium nitrate and various fuel compositions (diesel fuel and mineral oil). It was observed that the failure dynamics are influenced by factors such as chemical composition and confiner thickness. Future work is planned to calibrate models to these small-scale experiments and eventually validate the models with available large scale experiments. This experiment is shown to be repeatable, shows dependence on reactive properties, and can be performed with little required material.

  3. Forecasting deflation, intrusion and eruption at inflating volcanoes

    NASA Astrophysics Data System (ADS)

    Blake, Stephen; Cortés, Joaquín A.

    2018-01-01

    A principal goal of volcanology is to successfully forecast the start of volcanic eruptions. This paper introduces a general forecasting method, which relies on a stream of monitoring data and a statistical description of a given threshold criterion for an eruption to start. Specifically we investigate the timing of intrusive and eruptive events at inflating volcanoes. The gradual inflation of the ground surface is a well-known phenomenon at many volcanoes and is attributable to pressurised magma accumulating within a shallow chamber. Inflation usually culminates in a rapid deflation event caused by magma escaping from the chamber to produce a shallow intrusion and, in some cases, a volcanic eruption. We show that the ground elevation during 15 inflation periods at Krafla volcano, Iceland, increased with time towards a limiting value by following a decaying exponential with characteristic timescale τ. The available data for Krafla, Kilauea and Mauna Loa volcanoes show that the duration of inflation (t*) is approximately equal to τ. The distribution of t* / τ values follows a log-logistic distribution in which the central 60% of the data lie between 0.99 method provides stronger forecasts than one based on the distribution of repose times alone and is transferable to other types of monitoring data and/or other patterns of pre-eruptive unrest.

  4. Platinum mineralization in the Kapalagulu Intrusion, western Tanzania

    NASA Astrophysics Data System (ADS)

    Wilhelmij, Harry R.; Cabri, Louis J.

    2016-03-01

    Low-grade copper and nickel mineralization was found near the eastern shore of Lake Tanganyika at Kungwe Bay in the early part of the twentieth century. The mineralization occurs in harzburgite at the base of a layered gabbro complex known as the Kapalagulu Intrusion, emplaced between the Paleoproterozoic Ubendian basement and overlying Neoproterozoic Itiaso Group metasediments. Several mining and exploration companies continued the geophysical and drilling exploration for base metals throughout the last century culminating in the discovery of high-grade platinum-group element (PGE) mineralization associated with chromitite and sulfide-bearing harzburgite within the southeastern extension of the Kapalagulu Intrusion (known as the Lubalisi Zone) that is covered by a layer of nickel-rich laterite regolith. The poorly layered southeastern harzburgite forms part of the >1500 m-thick Lower Ultramafic Sequence and resembles a dike-like body that flares upwards into a succession of well-layered gabbroic rocks of the Upper Mafic Sequence. No PGE mineralization has been found in the layered gabbro; all the mineralization is associated with the chromite- and sulfide-rich harzburgite of the Lower Ultramafic Sequence and the laterite regolith overlying the mineralized harzburgite. The Lubalisi Zone harzburgite is underlain by basal dunite and overlain by an interval of layered harzburgite and troctolite and this ultramafic sequence is folded into a syncline that plunges towards the northwest that has been modified by major dolerite-filled faults orientated subparallel to the fold axial surface. Extensive deep drilling in the Lubalisi Zone of the Kapalagulu Intrusion shows that the folded harzburgite can be subdivided into a lower feldspathic harzburgite, a harzburgite containing chromitite seams and intervals of sulfide and chromite mineralization known as the Main Chromite Sulfide Succession (MCSS), an overlying sulfide-rich harzburgite, and an upper feldspathic harzburgite

  5. Mental Imagery and Post-Traumatic Stress Disorder: A Neuroimaging and Experimental Psychopathology Approach to Intrusive Memories of Trauma

    PubMed Central

    Clark, Ian A.; Mackay, Clare E.

    2015-01-01

    This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of post-traumatic stress disorder (PTSD). However, key questions, including those involving etiology, remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma) memory, involuntary recall, negative emotions, attention hijacking, and mental imagery. Each component part is considered in turn, both behaviorally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory, and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them. PMID:26257660

  6. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    PubMed

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p < .01, but was unrelated to physiological responses to trauma reminder images (ps > .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  7. Intrusive [r] and Optimal Epenthetic Consonants

    ERIC Educational Resources Information Center

    Uffmann, Christian

    2007-01-01

    This paper argues against the view of intrusive [r] as a synchronically arbitrary insertion process. Instead, it is seen as a phonologically natural process, which can be modelled within the framework of Optimality Theory (OT). Insertion of [r] in phonologically restricted environments is a consequence of a more general theory of consonant…

  8. Testing the differential effects of acceptance and attention-based psychological interventions on intrusive thoughts and worry.

    PubMed

    Ainsworth, B; Bolderston, H; Garner, M

    2017-04-01

    Worry is a key component of anxiety and may be an effective target for therapeutic intervention. We compared two psychological processes (attention and acceptance) on the frequency of intrusive worrying thoughts in an experimental worry task. 77 participants were randomised across three groups and completed either a 10 min attention or acceptance-based psychological exercise, or progressive muscle relaxation control. We subsequently measured anxiety, and the content and frequency of intrusive thoughts before and after a 'worry induction task'. Groups did not differ in baseline worry, anxiety or thought intrusions. Both attention and acceptance-based groups experienced fewer negative thought intrusions (post-worry) compared to the relaxation control group. The acceptance exercise had the largest effect, preventing 'worry induction'. Increases in negative intrusive thoughts predicted subjective anxiety. We provide evidence that acceptance and attention psychological exercises may reduce anxiety by reducing the negative thought intrusions that characterise worry. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  9. On the physical links between the dynamics of the Izu Islands 2000 dike intrusions and the statistics of the induced seismicity

    NASA Astrophysics Data System (ADS)

    Passarelli, Luigi; Rivalta, Eleonora; Simone, Cesca; Aoki, Yosuke

    2014-05-01

    The emplacement of magma-filled dikes often induce abundant seismicity in the surrounding host rocks. Most of the earthquakes are thought to occur close to the propagating tip (or edges, in 3D) of the dike, where stresses are concentrated. The resulting seismicity often appears as a swarm, controlled mainly by dike-induced stresses and stressing rate and by other factors, such as the background stressing rate, tectonic setting, regional stresses and tectonic history. The spatial distribution and focal mechanisms of the seismicity bear information on the interaction of the dike stress field and the tectonic setting of the area. The seismicity accompanying the intrusion of a dike is usually characterized by weak events, for which it is difficult to calculate the focal mechanisms. Therefore, only for a few well-recorded dike intrusions a catalog of focal mechanisms, allowing to perform a robust statistical analysis, is available. The 2000 dike intrusion at Miyakejima is in this sense an outstanding case, as about 18000 seismic events were recorded in a time span of three months. This seismic swarm was one of the most energetic ever recorded with five M>6 earthquakes. For this swarm a catalog of 1500 focal mechanisms is avalable (NIED, Japan). We perform a clustering analysis of the focal mechanism solutions, in order to infer the most frequent focal mechanism features prior to the intrusion (pre-diking period) and during the co-diking period. As previously suggested, we find that the dike stress field modified substantially the pre-existing seismicity pattern, by shadowing some non-optimally oriented strike-slip structures and increasing seismic rate on optimally oriented strike-slip tectonic structures. Alongside, during the co-diking period a large number of normal and oblique-normal faulting were observed. These events cannot be explained within the tectonics of the intrusion area. We suggest they are directly generated by the intense stress field induced at the

  10. Electro-Optical Sensing Apparatus and Method for Characterizing Free-Space Electromagnetic Radiation

    DOEpatents

    Zhang, Xi-Cheng; Libelo, Louis Francis; Wu, Qi

    1999-09-14

    Apparatus and methods for characterizing free-space electromagnetic energy, and in particular, apparatus/method suitable for real-time two-dimensional far-infrared imaging applications are presented. The sensing technique is based on a non-linear coupling between a low-frequency electric field and a laser beam in an electro-optic crystal. In addition to a practical counter-propagating sensing technique, a co-linear approach is described which provides longer radiated field--optical beam interaction length, thereby making imaging applications practical.

  11. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    NASA Technical Reports Server (NTRS)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  12. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    NASA Astrophysics Data System (ADS)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  13. Non-invasive diagnostics of the maxillary and frontal sinuses based on diode laser gas spectroscopy.

    PubMed

    Lewander, Märta; Lindberg, Sven; Svensson, Tomas; Siemund, Roger; Svanberg, Katarina; Svanberg, Sune

    2012-03-01

    Suspected, but objectively absent, rhinosinusitis constitutes a major cause of visits to the doctor, high health care costs, and the over-prescription of antibiotics, contributing to the serious problem of resistant bacteria. This situation is largely due to a lack of reliable and widely applicable diagnostic methods. A novel method for the diagnosis of rhinosinusitis based on non-intrusive diode laser gas spectroscopy is presented. The technique is based on light absorption by free gas (oxygen and water vapour) inside the sinuses, and has the potential to be a complementary diagnostic tool in primary health care. The method was evaluated on 40 patients with suspected sinus problems, referred to the diagnostic radiology clinic for low-dose computed tomography (CT), which was used as the reference technique. The data obtained with the new laser-based method correlated well with the grading of opacification and ventilation using CT. The sensitivity and specificity were estimated to be 93% and 61%, respectively, for the maxillary sinuses, and 94% and 86%, respectively, for the frontal sinuses. Good reproducibility was shown. The laser-based technique presents real-time clinical data that correlate well to CT findings, while being non-intrusive and avoiding the use of ionizing radiation.

  14. Characterization of Irradiated and Non-Irradiated Rubber from Automotive Scrap Tires

    NASA Astrophysics Data System (ADS)

    Souza, Clécia Moura; Silva, Leonardo G.

    The aim of this work was to characterize the samples of irradiated and non-irradiated rubber from automotive scrap tires. Rubber samples from scrap tires were irradiated at irradiation doses of 200, 400 and 600kGy in an electron beam accelerator. Subsequently, both the irradiated and non-irradiated samples were characterized by thermogravimetry (TG), differential scanning calorimetry (DSC), tensile strength mechanical test, and Fourier transform infrared (FTIR) spectrophotometry.

  15. Petrogenesis of the Dalongkai ultramafic-mafic intrusion and its tectonic implication for the Paleotethyan evolution along the Ailaoshan tectonic zone (SW China)

    NASA Astrophysics Data System (ADS)

    Liu, Huichuan; Wang, Yuejun; Zi, Jian-Wei

    2017-06-01

    Layered ultramafic-mafic intrusions are usually formed in an arc/back-arc or intra-plate tectonic environment, or genetically related to a mantle plume. In this paper, we report on an ultramafic-mafic intrusion, the Dalongkai intrusion in the Ailaoshan tectonic zone (SW China), whose occurrence is closely associated with arc/back-arc magmatic rocks. The Dalongkai intrusion is composed of plagioclase-lherzolite, hornblende-peridotite, lherzolite and wehrlite at the bottom, cumulate plagioclase-pyroxenite at the middle part, changing to fine-grained gabbro towards the upper part of the intrusion, forming layering structure. Zircons from the plagioclase-pyroxenites and gabbros yielded U-Pb ages of 272.1 ± 1.7 Ma and 266.4 ± 5.8 Ma, respectively. The plagioclase-pyroxenites show cumulate textures, and are characterized by high MgO (25.0-28.0 wt.%; mg# = 80.6-82.3), Cr (1606-2089 ppm) and Ni (893-1203 ppm) contents, interpreted as early cumulate phases. By contrast, the gabbros have relatively lower mg# values (56.3-62.7), and Cr (157-218 ppm) and Ni (73-114 ppm) concentrations, and may represent frozen liquids. The plagioclase-pyroxenites and gabbros share similar chondrite-normalized REE patterns and primitive mantle-normalized trace element profiles which are analogous to those of typical back-arc basin basalts. The εNd(t) values for both rock types range from +2.20 to +4.22. These geochemical and isotopic signatures suggest that the Dalongkai ultramafic-mafic rocks originated from a MORB-like mantle source metasomatized by subduction-related, sediment-derived fluids. Our data, together with other geological evidence, indicate that the emplacement of the Dalongkai ultramafic-mafic intrusion most likely occurred in a back-arc extensional setting associated with subduction of the Ailaoshan Paleotethyan branch ocean during the Middle Permian, thus ruling out the previously speculated linkage to the Emeishan mantle plume, or to an intra-continental rift.

  16. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    PubMed

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  17. Multi-User Low Intrusive Occupancy Detection

    PubMed Central

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  18. Derivation of S and Pb in phanerozoic intrusion-related metal deposits from neoproterozoic sedimentary pyrite, Great Basin, United States

    USGS Publications Warehouse

    Vikre, Peter G.; Poulson, S.R.; Koenig, Alan E.

    2011-01-01

    The thick (≤8 km), regionally extensive section of Neoproterozoic siliciclastic strata (terrigenous detrital succession, TDS) in the central and eastern Great Basin contains sedimentary pyrite characterized by mostly high δ34S values (−11.6 to 40.8‰, >70% exceed 10‰; 51 analyses) derived from reduction of seawater sulfate, and by markedly radiogenic Pb isotopes (207Pb/204Pb >19.2; 15 analyses) acquired from clastic detritus eroded from Precambrian cratonal rocks to the east-southeast. In the overlying Paleozoic section, Pb-Zn-Cu-Ag-Au deposits associated with Jurassic, Cretaceous, and Tertiary granitic intrusions (intrusion-related metal deposits) contain galena and other sulfide minerals with S and Pb isotope compositions similar to those of TDS sedimentary pyrite, consistent with derivation of deposit S and Pb from TDS pyrite. Minor element abundances in TDS pyrite (e.g., Pb, Zn, Cu, Ag, and Au) compared to sedimentary and hydrothermal pyrite elsewhere are not noticeably elevated, implying that enrichment in source minerals is not a precondition for intrusion-related metal deposits.Three mechanisms for transferring components of TDS sedimentary pyrite to intrusion-related metal deposits are qualitatively evaluated. One mechanism involves (1) decomposition of TDS pyrite in thermal aureoles of intruding magmas, and (2) aqueous transport and precipitation in thermal or fluid mixing gradients of isotopically heavy S, radiogenic Pb, and possibly other sedimentary pyrite and detrital mineral components, as sulfide minerals in intrusion-related metal deposits. A second mechanism invokes mixing and S isotope exchange in thermal aureoles of Pb and S exsolved from magma and derived from decomposition of sedimentary pyrite. A third mechanism entails melting of TDS strata or assimilation of TDS strata by crustal or mantle magmas. TDS-derived or assimilated magmas ascend, decompress, and exsolve a mixture of TDS volatiles, including isotopically heavy S and

  19. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth

    PubMed Central

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.

    2013-01-01

    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  20. Multiscale Pore Throat Network Reconstruction of Tight Porous Media Constrained by Mercury Intrusion Capillary Pressure and Nuclear Magnetic Resonance Measurements

    NASA Astrophysics Data System (ADS)

    Xu, R.; Prodanovic, M.

    2017-12-01

    Due to the low porosity and permeability of tight porous media, hydrocarbon productivity strongly depends on the pore structure. Effective characterization of pore/throat sizes and reconstruction of their connectivity in tight porous media remains challenging. Having a representative pore throat network, however, is valuable for calculation of other petrophysical properties such as permeability, which is time-consuming and costly to obtain by experimental measurements. Due to a wide range of length scales encountered, a combination of experimental methods is usually required to obtain a comprehensive picture of the pore-body and pore-throat size distributions. In this work, we combine mercury intrusion capillary pressure (MICP) and nuclear magnetic resonance (NMR) measurements by percolation theory to derive pore-body size distribution, following the work by Daigle et al. (2015). However, in their work, the actual pore-throat sizes and the distribution of coordination numbers are not well-defined. To compensate for that, we build a 3D unstructured two-scale pore throat network model initialized by the measured porosity and the calculated pore-body size distributions, with a tunable pore-throat size and coordination number distribution, which we further determine by matching the capillary pressure vs. saturation curve from MICP measurement, based on the fact that the mercury intrusion process is controlled by both the pore/throat size distributions and the connectivity of the pore system. We validate our model by characterizing several core samples from tight Middle East carbonate, and use the network model to predict the apparent permeability of the samples under single phase fluid flow condition. Results show that the permeability we get is in reasonable agreement with the Coreval experimental measurements. The pore throat network we get can be used to further calculate relative permeability curves and simulate multiphase flow behavior, which will provide valuable