Powered by Deep Web Technologies
Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Open Energy

2

Structural and thermal characters of the Longmen Shan (Sichuan, China) A. Robert a,  

E-Print Network [OSTI]

thick material abutting the resistant and cold Yangtze crust. © 2010 Elsevier B.V. All rights reservedStructural and thermal characters of the Longmen Shan (Sichuan, China) A. Robert a, , M. Pubellier: Longmen Shan Thermal data Crustal deformation Structural geology The Longmen Shan (Sichuan, China

Nicolas, Chamot-Rooke

3

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage...  

Open Energy Info (EERE)

sulphide-bearing mafic magma from a larger staging chamber. Authors Marian Munteanu, Allan H. Wilson, Yong Yao, Shao-Yong Jiang, Gordon Chunnett, Yaonan Luo, Leonard Mafurutu...

4

Interior intrusion detection systems  

SciTech Connect (OSTI)

The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

1991-10-01T23:59:59.000Z

5

Intrusion detection sensor testing tools  

SciTech Connect (OSTI)

Intrusion detection sensors must be frequently tested to verify that they are operational, and they must be periodically tested to verify that they are functioning at required performance levels. Concerns involving this testing can include: The significant amount of manpower required, inconsistent results due to variability in methods and personnel, exposure of personnel to hazardous environments, and difficulty in obtaining access to the areas containing some of the intrusion sensors. To address these concerns, the Department of Energy directed Sandia National Labs. to develop intrusion detection sensor testing tools. Over the past two years Sandia has developed several sensor testing tool prototypes. This paper describes the evolution of an exterior intrusion detection sensor tester and automatic data logger, and also describes various interior intrusion detection sensor test fixtures that can be remotely activated to simulate an intruder.

Hayward, D.R.

1994-08-01T23:59:59.000Z

6

Rapid deployment intrusion detection system  

SciTech Connect (OSTI)

A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs.

Graham, R.H.

1997-08-01T23:59:59.000Z

7

Gas intrusion into SPR caverns  

SciTech Connect (OSTI)

The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

1995-12-01T23:59:59.000Z

8

(Intrusion Path Analysis)  

SciTech Connect (OSTI)

The design and implementation of an Intrusion Path Analysis (IPA) function came about as a result of the upgrades to the security systems at the Savannah River Site (SRS), near Aiken, South Carolina. The stated requirements for IPA were broad, leaving opportunity for creative freedom during design and development. The essential elements were that it: be based on alarm and sensor state data; consider insider as well as outsider threats; be flexible and easily enabled or disabled; not be processor intensive; and provide information to the operator in the event the analysis reveals possible path openings. The final design resulted from many and varied conceptual inputs, and will be implemented in selected test areas at SRS. It fulfils the requirements and: allows selective inclusion of sensors in the analysis; permits the formation of concentric rings of protection around assets; permits the defining of the number of rings which must be breached before issuing an alert; evaluates current sensor states as well as a recent, configurable history of sensor states; considers the sensors' physical location, with respect to the concentric rings; and enables changes for maintenance without software recompilation. 3 figs.

Hardwick, R D

1989-01-01T23:59:59.000Z

9

acquisition intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Next Page Last Page Topic Index 1 Security Intrusion & Detection Security Intrusion Computer Technologies and Information Sciences Websites Summary: intrusions, log suspicious...

10

Buried fiber optic intrusion sensor  

E-Print Network [OSTI]

to the buried sensor induces a phase shift in light propagating along the fiber which allows for the detection and localization of intrusions. Through the use of an ultra-stable erbium-doped fiber laser and phase sensitive optical time domain reflectometry...

Maier, Eric William

2004-09-30T23:59:59.000Z

11

Land Assemblage Tax Credit Program (Missouri)  

Broader source: Energy.gov [DOE]

The Land Assemblage Tax Credit Programs the redevelopment of blighted areas in Missouri into productive use. Redevelopers must incur acquisition costs for at least 50 acres of 75+ acre parcels,...

12

The Statistical Upper Mantle Assemblage Anders Meibom*  

E-Print Network [OSTI]

Mantle Assemblage', which forms as the result of long-term plate tectonic recycling of sedimentary-3] and noble gases [4] has led to the notion that the source region for "normal" MORB (N-MORB), referred

Anderson, Don L.

13

Intrusion Detection Techniques in Sensor Aikaterini Mitrokotsa  

E-Print Network [OSTI]

to the network administrator because communication between the access point and the clients is broadcastPDF PROOF Intrusion Detection Techniques in Sensor Networks Aikaterini Mitrokotsa Department Research has been conducted in wired network Intrusion Detection Systems (IDS) for over 25 years. Although

14

The geochemical evolution of the Sonju Lake intrusion: assimilation and fractional crystallization in a layered mafic intrusion near Finland, Mn.  

E-Print Network [OSTI]

??The Sonju Lake Intrusion, located within the Beaver Bay Complex near Finland, MN, is the most completely differentiated intrusion related to the Midcontinent Rift System… (more)

Dayton, Ryan N.

2011-01-01T23:59:59.000Z

15

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

16

Advanced technologies for perimeter intrusion detection sensors  

SciTech Connect (OSTI)

The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

Williams, J.D.

1995-03-01T23:59:59.000Z

17

Automated intrusion recovery for web applications  

E-Print Network [OSTI]

In this dissertation, we develop recovery techniques for web applications and demonstrate that automated recovery from intrusions and user mistakes is practical as well as effective. Web applications play a critical role ...

Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

18

Intrusion detection in mobile ad hoc networks  

E-Print Network [OSTI]

Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a cooperative and friendly network environment and do not accommodate security. Therefore, Intrusion Detection Systems (IDSs), serving as the second line...

Sun, Bo

2005-08-29T23:59:59.000Z

19

Autonomous Rule Creation for Intrusion Detection  

SciTech Connect (OSTI)

Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-04-01T23:59:59.000Z

20

A system for distributed intrusion detection  

SciTech Connect (OSTI)

The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

AIDE - Advanced Intrusion Detection Environment  

SciTech Connect (OSTI)

Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

Smith, Cathy L.

2013-04-28T23:59:59.000Z

22

Computationally Efficient Neural Network Intrusion Security Awareness  

SciTech Connect (OSTI)

An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

Todd Vollmer; Milos Manic

2009-08-01T23:59:59.000Z

23

Numerical investigation of transient hydrothermal processes around intrusions: heat-transfer and fluid-  

E-Print Network [OSTI]

Numerical investigation of transient hydrothermal processes around intrusions: heat the intrusion. Keywords: Hydrothermal processes, numerical modelling, magmatic intrusion, permeability- depth around magmatic intrusions have been obtained through coupled hydrothermal numerical modelling that takes

Paris-Sud XI, Université de

24

Vapor intrusion modeling : limitations, improvements, and value of information analyses  

E-Print Network [OSTI]

Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

Friscia, Jessica M. (Jessica Marie)

2014-01-01T23:59:59.000Z

25

Non-intrusive fault detection in reciprocating compressors  

E-Print Network [OSTI]

This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

Schantz, Christopher James

2011-01-01T23:59:59.000Z

26

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

27

Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System  

E-Print Network [OSTI]

1 Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System Fanglu Guo Tzi normalization. Index Terms Packet (traffic) analysis, stateful firewall, network intrusion detection system intrusion detection system (NIDS). Stateful firewall analyzes packets up to their layer 4 headers while NIDS

Chiueh, Tzi-cker

28

MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT  

E-Print Network [OSTI]

MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

Noel, Steven

29

Intrusion Detection via Static Analysis David Wagner  

E-Print Network [OSTI]

Xerox PARC ddean@parc.xerox.com Abstract One of the primary challenges in intrusion detection degree of automation, pro­ tection against a broad class of attacks based on corrupted code. Beginning with Sun's introduction of the Java language and its support of mobile code in 1995, pro­ gramming

Wagner, David

30

Intrusive gravity currents in two-layer  

E-Print Network [OSTI]

Intrusive gravity currents in two-layer stratified media Morris R. Flynn & Paul F. Linden Dept to as a gravity current · In contrast to waves, gravity currents transport significant mass (e.g. fluid parcels, sediment, insects, etc.) Introduction Gravity currents in the environment www

Flynn, Morris R.

31

Asynchronous intrusion recovery for interconnected web services  

E-Print Network [OSTI]

Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, and tracking down and recovering from such an attack re- quires significant manual effort. Web services for such web services. Aire addresses several challenges, such as propagating repair across services when some

Sabatini, David M.

32

antilles assemblage structure: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

33

assemblage southwestern kerman: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

34

aquatic insect assemblages: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Assemblages Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance...

35

assemblages reaction progress: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

36

Distributed fiber optic moisture intrusion sensing system  

DOE Patents [OSTI]

Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

Weiss, Jonathan D. (Albuquerque, NM)

2003-06-24T23:59:59.000Z

37

Non-intrusive refrigerant charge indicator  

DOE Patents [OSTI]

A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

Mei, Viung C.; Chen, Fang C.; Kweller, Esher

2005-03-22T23:59:59.000Z

38

Non-intrusive appliance monitor apparatus  

DOE Patents [OSTI]

A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

1989-08-15T23:59:59.000Z

39

Non-intrusive appliance monitor apparatus  

DOE Patents [OSTI]

A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

1989-08-15T23:59:59.000Z

40

Freshwater Flow, Saltwater Intrusion, Paper Mill Effluent, and Fish Assemblage Structure in the Lower Neches River, Texas  

E-Print Network [OSTI]

during fall 2011 and summer 2012, after a season of rain. During fall 2011, sites surveyed above the barrier had lower salinity but similarly low dissolved oxygen (DO) levels compared with sites surveyed below the barrier. Salinity levels during fall 2011...

Pizano, Rebecca I

2013-06-11T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California  

E-Print Network [OSTI]

magmatic intrusions into unconsolidated hemipelagic mudsas off-axis intrusions into unconsolidated hemipelagic mudsas off-axis intrusions into unconsolidated hemipelagic muds

Kluesner, Jared W.

2011-01-01T23:59:59.000Z

42

The architecture of a network level intrusion detection system  

SciTech Connect (OSTI)

This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

Heady, R.; Luger, G.; Maccabe, A.; Servilla, M. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

1990-08-15T23:59:59.000Z

43

automated intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CLASS FILES, VOL. 1, NO. 11, NOVEMBER 2002 1 Hi-DRA: Intrusion Detection for Internet Security Computer Technologies and Information Sciences Websites Summary: for Internet...

44

adaptive intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Last Page Topic Index 1 Adaptive Model Generation for Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: Adaptive Model Generation for...

45

ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY ASSEMBLAGES  

E-Print Network [OSTI]

ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY ASSEMBLAGES in Environmental Science and titled "ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY with endophytic fungi. Cheatgrass populations were sampled across North America and endophytes were isolated from

46

Video Installation Design: Appropriation and Assemblage As Projection Surface Geometry  

E-Print Network [OSTI]

This area of research focuses on the use of video projections in the context of fine art. Emphasis is placed on creating a unique video installation work that incorporates assemblage and appropriation as a means to develop multiple complex...

Weaver, Timothy A.

2010-07-14T23:59:59.000Z

47

Epifaunal Assemblages on Deep-water Corals in Roatan, Honduras  

E-Print Network [OSTI]

Deep-water corals provide complex habitat structure for diverse assemblages of invertebrates and fishes. Similar to shallow coral reefs, oyster reefs, and seagrass beds, these complex biogenic structures serve many ecosystem functions: (a) as prey...

Lavelle, Katherine

2012-10-30T23:59:59.000Z

48

Nearshore fish assemblages associated with introduced predatory fishes in lakes  

E-Print Network [OSTI]

investigated the relationship between the presence of introduced largebodied predatory fishes (largemouth bass: impact; invasive species; native fishes; pike; largemouth bass; rock bass; smallmouth bass; walleyeNearshore fish assemblages associated with introduced predatory fishes in lakes JUSTIN TRUMPICKASa

Ricciardi, Anthony

49

E-Print Network 3.0 - austurhorn intrusive complex Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Considering Attack Complexity: Layered Intrusion Tolerance C. Taylor, A.W. Krings, W.S. Harrison, N... , hierarchical approach to intrusion tolerance based on the complexity...

50

E-Print Network 3.0 - anomaly-based network intrusion Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Computer Technologies and Information Sciences 5 INTRUSION DETECTION IN MOBILE AD HOC NETWORKS Summary: is anomaly-based intrusion detection which profiles the symptoms...

51

U.S. Department of Energy (DOE) Technical Assistance to Beichuan Reconstruction: Creating and Designing Low- to Zero-carbon Communities in New Beichuan, Sichuan Province  

SciTech Connect (OSTI)

Beichuan county, located in north of Sichuan Province, was the most severely damaged township in last May's Sichuan earthquake. Reconstruction of a new Beichuan is a high-profiled project by the governments. In addition to constructing structurally-sound, quake-safe buildings in the new development, rebuilding Beichuan presents an opportunity for constructing new low- to zero-carbon communities in the region. In fact, building up greener communities in the reconstruction has become a top priority for the county, which, at an estimated 7 square km, is expected to have 50,000 residents in 2015 and 70,000 in 2020. The recent focus of construction projects is on the east side of the river, while land on its west bank will be reserved for development in the mid- to long-term. In the near term, a number of new public buildings are scheduled to be constructed starting in November 2009. As indicated by the deputy county chief, Mr. He Wang, the construction timeframe is unusually tight. Many buildings, although in various stages of planning and design, will be constructed starting in November 2009. Timely expert advice on design improvement and planning considerations will benefit the integration of energy efficiency and environmental benign elements in Beichuan's reconstruction, and will help promoting integrated development of green communities with low- to zero-carbon emission from the region.

Xu, Tengfang; Wang, Chuang; Hong, Tianzhen; Levine, Mark

2009-10-29T23:59:59.000Z

52

Shipboard applications of non-intrusive load monitoring  

E-Print Network [OSTI]

The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM ...

Ramsey, Jack S

2004-01-01T23:59:59.000Z

53

Harmonic approaches to non-intrusive load diagnostics  

E-Print Network [OSTI]

The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

Fuller, Ashley E. (Ashley Eliot)

2008-01-01T23:59:59.000Z

54

Intrusion recovery for database-backed web applications  

E-Print Network [OSTI]

Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes. Warp repairs ...

Chandra, Ramesh

55

Minimally intrusive strategies for fault detection and energy monitoring  

E-Print Network [OSTI]

This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

Cox, Robert Williams, 1979-

2006-01-01T23:59:59.000Z

56

A framework for non-intrusive load monitoring and diagnostics  

E-Print Network [OSTI]

The widespread use of electrical and electromechanical systems places increasing demands on monitoring and diagnostic techniques. The non-intrusive load monitor (NILM) provides a low-cost, low-maintenance way to perform ...

Paris, James, Ph. D. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

57

Improving shipboard applications of non-intrusive load monitoring  

E-Print Network [OSTI]

The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

58

Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks  

E-Print Network [OSTI]

The problem of intrusion detection in wireless mesh networks (WMN) is challenging, primarily because of lack of single vantage points where traffic can be analyzed and the limited resources available to participating nodes. Although the problem has...

Hassanzadeh, Amin

2014-05-03T23:59:59.000Z

59

Bloom Filter Based Intrusion Detection for Smart Grid  

E-Print Network [OSTI]

This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n...

Parthasarathy, Saranya

2012-07-16T23:59:59.000Z

60

The Stabilisation Potential of Individual and Mixed Assemblages of Natural Bacteria and Microalgae  

E-Print Network [OSTI]

The Stabilisation Potential of Individual and Mixed Assemblages of Natural Bacteria and Microalgae components (heterotrophic bacteria and autotrophic microalgae) in terms of their individual contribution benthic assemblages (prokaryotic, eukaryotic and mixed cultures) of bacteria and microalgae. Mag

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

EFFECTS OF EGREGIA MENZIESII POPULATIONS ON ROCKY INTERTIDAL BENTHIC ASSEMBLAGES  

E-Print Network [OSTI]

Bancroft Hughes Egregia menziesii is a large and robust perennial kelp that creates a structurally complex or the annual life-histories of some algal species. Similar effects of kelp on benthic assemblages have been observed in temperate waters around the world for intertidal kelp or subtidal kelp that lacks floatation

California at Santa Cruz, University of

62

Fossil evidence for serpentinization fluids fueling chemosynthetic assemblages  

E-Print Network [OSTI]

(received for review June 30, 2010) Among the deep-sea hydrothermal vent sites discovered in the past 30 mantle rock serpentinization and the spectacular seafloor carbonate chimneys precipitated from- nite-hosted hydrothermal system currently lacks chemosynthetic assemblages dominated by large animals

Demouchy, Sylvie

63

Temporal Changes in a Tropical Nekton Assemblage and  

E-Print Network [OSTI]

Temporal Changes in a Tropical Nekton Assemblage and Performance of a Prawn Selective Gear TING and weights of 39 trials conductedfor a selective prawning gear whose performance in bycatch reduc tionI., 1975; Rob erts, 1978; Allen and Coates, 1990), but is extremely rich in the marine coun terpart

64

ORIGINAL ARTICLE Diatom assemblages promote ice formation in large  

E-Print Network [OSTI]

ORIGINAL ARTICLE Diatom assemblages promote ice formation in large lakes NA D'souza1,3 , Y evidence for the directed formation of ice by planktonic communities dominated by filamentous diatoms sampled from the ice-covered Laurentian Great Lakes. We hypothesize that ice formation promotes attachment

Lee Jr., Richard E.

65

Threshold Verification Technique for Network Intrusion Detection System  

E-Print Network [OSTI]

Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for I...

Faizal, M A; Shahrin, S; Robiah, Y; Rahayu, S Siti; Nazrulazhar, B

2009-01-01T23:59:59.000Z

66

Effective Conductivity of Spiral and other Radial Symmetric Assemblages  

E-Print Network [OSTI]

Assemblies of circular inclusions with spiraling laminate structure inside them are studied, such as spirals with inner inclusions, spirals with shells, assemblies of "wheels" - structures from laminates with radially dependent volume fractions, complex axisymmetric three-dimensional micro-geometries called Connected Hubs and Spiky Balls. The described assemblages model structures met in rock mechanics, biology, etc. The classical effective medium theory coupled with hierarchical homogenization is used. It is found that fields in spiral assemblages satisfy a coupled system of two second order differential equations, rather than a single differential equation; a homogeneous external field applied to the assembly is transformed into a rotated homogeneous field inside of the inclusions. The effective conductivity of the two-dimensional Star assembly is equivalent to that of Hashin-Shtrikman coated circles, but the conductivity of analogous three-dimensional Spiky Ball is different from the conductivity of coated sphere geometry.

Andrej Cherkaev; Alexander D. Pruss

2012-06-20T23:59:59.000Z

67

Detecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson  

E-Print Network [OSTI]

the design process. With this in mind, researchers have begun to address security issues specific to controlDetecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson to a remote-controlled system (deemed an "intrusion fault" or "intrusion") despite attempts to conceal

Hutchinson, Seth

68

Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a  

E-Print Network [OSTI]

Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a , T. Prabhakar Clement a 22 June 2011 Keywords: Saltwater intrusion Sea-level rise Coastal aquifer Climate change Confined, the adverse intrusion effects induced by sea-level rise. A detailed numerical study using the MODFLOW

Clement, Prabhakar

69

IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan  

E-Print Network [OSTI]

IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan School of Computing to monitor and protect their virtual existence by implementing their own intrusion detection capabilities along with other security technologies within the cloud fabric. Intrusion Detection as a Service (IDSaa

70

NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System  

E-Print Network [OSTI]

NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System C.I. Ezeife wireless intrusion detection systems, this paper presents a method of applying artificial neural networks mining clas- sification technique to wireless network intrusion detection system. The proposed system

Ezeife, Christie

71

BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur  

E-Print Network [OSTI]

Terms-- Bloom filter, intrusion detection, smart grid SCADA IDS. 1. INTRODUCTION Supervisory controlBLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur In this paper, we propose a distributed, light-weight and fast intrusion detection approach suitable

Kundur, Deepa

72

A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1  

E-Print Network [OSTI]

A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1 , Wenke Lee2, athomas}@cc.gatech.edu Abstract The current generation of centralized network intrusion detection systems that intrusion detection analysis should be distributed to network node IDS (NNIDS) running in hardware

Lee, Wenke

73

Visual monitoring environments, such as intrusion detection systems, debugging  

E-Print Network [OSTI]

Abstract Visual monitoring environments, such as intrusion detection systems, debugging environments, and feature extraction systems, require that a user familiar with the target domain examine, most in an efficient form. How the users employ the environment and the type and quantity of data will also affect

Erbacher, Robert F.

74

Energy Efficient Intrusion Detection in Camera Sensor Networks  

E-Print Network [OSTI]

Energy Efficient Intrusion Detection in Camera Sensor Networks Primoz Skraba1 and Leonidas Guibas2 1 Department of Electrical Engineering Stanford University, Stanford, CA 94305 primoz@stanford.edu 2 such paths is intractable, since there is generally an infinite number of potential paths. Using a geometric

Guibas, Leonidas J.

75

UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection  

E-Print Network [OSTI]

targets for terrorists and criminals to break-in. Intrusions can compromise the integrity, confidentiality Slammer Worm in less than seven hours the Internet traffic was overloaded to the point that many private]. Similarly, the ReVirt system [16] can record all actions below the level of the virtual machine, allowing

Zhou, Yuanyuan

76

Fish Assemblages in Reference and Restored Tidal Freshwater Marshes of the San Francisco Estuary  

E-Print Network [OSTI]

DM. 1998. Comparison of fish assemblages associated withand season effects on fish abundance data from deep waterfor annual changes in fish populations. Atwater BF, Conard

Grimaldo, Lenny; Miller, Robert E.; Peregrin, Chris M.; Hymanson, Zachary

2012-01-01T23:59:59.000Z

77

Contact metamorphism of Precambrian gneiss by the Skaergaard Intrusion  

E-Print Network [OSTI]

the time-scales controlling magma fractionation, eruptive behaviour, the formation of ore deposits and the thermodynamics of natural mineral assemblages. Cooling rates can be obtained from igneous rocks via the length-scales of mineral exsolution (e... & Bowman, 1994; Ferry, 1996; Mu« ller et al., 2008), determine the extent of crustal assimi- lation, and assess the degree to which the country rock may have supplied water to the magma, with potential ef- fects on the liquid line of descent. The Skaergaard...

Bufe, N. Aaron; Holness, Marian B.; Humphreys, Madeleine C.S.

2014-07-01T23:59:59.000Z

78

Animal intrusion status report for fiscal year 1989  

SciTech Connect (OSTI)

The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

Landeen, D.S.

1990-08-01T23:59:59.000Z

79

THE INVERTEBRATE ASSEMBLAGE ASSOCIATED WITH THE GIANT KELP, MACROCYSTIS PYRIFERA, AT SANTA CATALINA  

E-Print Network [OSTI]

THE INVERTEBRATE ASSEMBLAGE ASSOCIATED WITH THE GIANT KELP, MACROCYSTIS PYRIFERA, AT SANTA CATALINA JAMES A. COYER' ABSTRACT The motile invertebrate assemblage associated with the giant kelp. Macrocysti. Subtidal forests of giant kelp have long attracted the interestofbiologists, beginning with Darwin's (1860

80

ANNUAL VARIABILITY OF REEF-FISH ASSEMBLAGES IN KELP FORESTS OFF SANTABARBARA, CALIFORNIA  

E-Print Network [OSTI]

ANNUAL VARIABILITY OF REEF-FISH ASSEMBLAGES IN KELP FORESTS OFF SANTABARBARA, CALIFORNIA ALFRED W. EBELING/ RALPH J. LARSON,2 WILLIAM S. ALEVIZON,3 AND RICHARD N. BRAy 4 ABSTRACT Assemblages of kelp-bed fishes that live in and about the kelp canopy or over the reef bottom were censused by movie strips

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Fish Assemblages and Substrates in the Middle Wabash River, USA Robert Mueller, Jr.1,2  

E-Print Network [OSTI]

Fish Assemblages and Substrates in the Middle Wabash River, USA Robert Mueller, Jr.1,2 and Mark Pyron1 We collected fishes at 28 sites of the middle Wabash River, Indiana, using a boat electrofisher for fish assemblage variation that was explained by variation in water depth and substrate frequency

Pyron, Mark

82

Stimulation of Alexandrium fundyense growth by bacterial assemblages from the Bay of Fundy  

E-Print Network [OSTI]

on Alexandrium fundyense str. CB301 growth. Methods and Results: Bacterial assemblages were collected from into axenic CB301 cultures. Bacterial assemblages dramatically enhanced CB301 growth. Retrieval and analysis factors that control Alexandrium distributions (e.g. Anderson et al. 1983, 1990a; Rasmussen and Richardson

Rooney-Varga, Juliette N.

83

Long-term history of chemosynthetic molluscan assemblages at Gulf of Mexico hydrocarbons seep sites  

E-Print Network [OSTI]

, Vesicomya cordata, and Calyptogena ponderosa, harbor sulfur-oxidizing symbionts. Seep assemblages from three sites, GB-386, GB-425, and GC-234, were sampled by piston core, in order to determine the long-term history of these assemblages from their preserved...

Warren, Kenneth Anderson

1995-01-01T23:59:59.000Z

84

E-Print Network 3.0 - anomaly-based intrusion detection Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and future anomaly-based intrusion detection systems. 1... arsenal, and the focus of this work, is the ... Source: Maxion, Roy - School of Computer Science, Carnegie Mellon...

85

MIDAS, the Mobile Intrusion Detection and Assessment System  

SciTech Connect (OSTI)

MIDAS is a semiautomated passive detection and assessment security system that can be quickly deployed to provide wide-area coverage for a mobile military asset. Designed to be mounted on top of an unguyed telescoping mast, its specially packaged set of 32 infrared sensors spin 360 degrees every two seconds. The unit produces a low resolution infrared image by sampling each sensor more than 16,000 times in a single 360-degree rotation. Drawing from image processing techniques, MIDAS detects vehicular and pedestrian intruders and produces an alarm when an intrusion is detected. Multiple intruders are tracked. MIDAS automatically directs either an assessment camera or a FLIR to one of the tracks. The alerted operator assesses the intruder and initiates a response. Once the operator assesses an intruder, the system continues to track it without generating new alarms. Because the system will track multiple targets and because the assessment system is a separate pan and tilt unit, the detection and tracking system cannot be blind-sided while the operator is assessing a diversionary intrusion. 4 figs.

Arlowe, H.D.; Coleman, D.E.; Williams, J.D.

1990-01-01T23:59:59.000Z

86

A Game Theoretic Analysis of Intrusion Detection in Access Control Systems  

E-Print Network [OSTI]

. The security of an access control system is of prime importance and is crucial for a successful operation, decision, and control processes for information security and intrusion detection. Such a mathematicalA Game Theoretic Analysis of Intrusion Detection in Access Control Systems Tansu Alpcan and Tamer

Alpcan, Tansu

87

Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu  

E-Print Network [OSTI]

Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

Ning, Peng

88

Porphyry Copper and Other Intrusion-Related Mineralization in Mexico MARK D. BARTON  

E-Print Network [OSTI]

Porphyry Copper and Other Intrusion-Related Mineralization in Mexico MARK D. BARTON JOHN-MARK G Inc., Tucson, Arizona ABSTRACT Intrusion-related copper-bearing ore deposits in Mexico span a wide. These deposits include world-class copper porphyry and skarn deposits as well as a continuum of similar skarn

Barton, Mark D.

89

An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig  

E-Print Network [OSTI]

mechanisms (e.g. authentication, encryption, or access control) they provide an automatic detection1 An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig Mail:{thh,mm,koenig}@informatik.tu-cottbus.de Abstract: Intrusion detection systems have proved

Meier, Michael

90

An evaluation of fiber optic intrusion detection systems in interior applications  

SciTech Connect (OSTI)

This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

Vigil, J.T.

1994-03-01T23:59:59.000Z

91

A Data Mining Framework for Building Intrusion Detection Models Salvatore J. Stolfo  

E-Print Network [OSTI]

A Data Mining Framework for Building Intrusion Detection Models Wenke Lee Salvatore J. Stolfo Kui W of expert knowledge, changes to IDSs are expensive and slow. In this paper, we describe a data mining, and apply data mining programs to learn rules that accurately capture the behavior of intrusions and normal

Yang, Junfeng

92

A Data Mining Framework for Building Intrusion Detection Models # Salvatore J. Stolfo  

E-Print Network [OSTI]

A Data Mining Framework for Building Intrusion Detection Models # Wenke Lee Salvatore J. Stolfo Kui. In this paper, we describe a data mining framework for adaptively building Intrusion Detection (ID) models each network connection or host ses­ sion, and apply data mining programs to learn rules

Lee, Wenke

93

Relationships of drought and biotic interactions to crayfish assemblage structure in Gulf coastal headwater streams  

E-Print Network [OSTI]

. In order to understand abiotic and biotic factors structuring native crayfish assemblages, environmental variables and densities of fishes and crayfishes were quantified simultaneously in 16 East Texas streams during June and October 1999, and February...

Healy, Brian Daniel

2002-01-01T23:59:59.000Z

94

Temporal and spatial variability of blenny (Perciformes:Labrisomidae and Blenniidae) assemblages on Texas jetties  

E-Print Network [OSTI]

habitats at Galveston, Port Aransas, and South Padre Island, Texas, during May 2000 through August 2001; and in Florida, once during December 2001 to characterize assemblage structure. All specimens (n=4555) were identified, enumerated, and measured and a...

Grabowski, Timothy Brian

2002-01-01T23:59:59.000Z

95

Play and tolerance : notions of looseness in social and material assemblages  

E-Print Network [OSTI]

The material scenario provides the most illustrative of entry points into this collection of evidence embodying the difference between play and tolerance. In a material assemblage, the looseness in a joint (expansion, pin, ...

Voorhees, Jeremy, 1978-

2004-01-01T23:59:59.000Z

96

Spatial and temporal variation in fish assemblage structure at Village Creek  

E-Print Network [OSTI]

Fish assemblages were sampled seasonally at Village Creek, a blackwater tributary of the Neches River in Hardin County, Texas. Forty four fish species were captured at Village Creek from diverse aquatic mesohabitats, (e.g., backwater pools, deep...

Moriarty, Loren Joan

1995-01-01T23:59:59.000Z

97

SUMMER FISH ASSEMBLAGES IN CHANNELIZED AND UNCHANNELIZED REACHES OF THE SOUTH SULPHUR RIVER, TEXAS  

E-Print Network [OSTI]

TWRI TR-257 SUMMER FISH ASSEMBLAGES IN CHANNELIZED AND UNCHANNELIZED REACHES OF THE SOUTH SULPHUR RIVER, TEXAS A Thesis by CHRISTINE CONNER BURGESS Submitted to the Office of Graduate Studies of Texas A&M University... in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE August 2003 Major Subject: Wildlife and Fisheries Sciences Texas Water Resources Institute (TWRI) Technical Report 244 SUMMER FISH ASSEMBLAGES...

BURGESS, CHRISTINE CONNER

98

Environmental factors influencing fish assemblage structure in a naturally saline river system  

E-Print Network [OSTI]

for the degree of MASTER OF SCIENCE May 2000 Major Subject: Wildlife and Fisheries Sciences ENVIRONMENTAL FACTORS INFLUENCING FISH ASSEMBLAGE STRUCTURE IN A NATURALLY SALINE RIVER SYSTEM A Thesis by NIKKOAL JEAN DICTSON Submitted to Texas A&M University... Major Subject: Wildlife and Fisheries Sciences ABSTRACT Environmental Factors Influencing Fish Assemblage Structure in a Naturally Saline River System. (May 2000) Nikkoal Jean Dictson, B. S. , New Mexico State University; Chair of Advisory Committee...

Dictson, Nikkoal Jean

2000-01-01T23:59:59.000Z

99

KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers  

E-Print Network [OSTI]

Abstract KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers working in the field of intrusion detection and is the only labeled dataset publicly available. Numerous researchers employed the datasets in KDD 99 intrusion detection datasets

Zincir-Heywood, Nur

100

A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han  

E-Print Network [OSTI]

A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J University Bethlehem, PA 18015 Abstract-- Several intrusion detection approaches have been proposed in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM

Chuah, Mooi-Choo "Mooi"

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Network intrusion detector: NID user`s guide V 1.0  

SciTech Connect (OSTI)

The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

Palasek, R. [ed.

1994-04-01T23:59:59.000Z

102

Evaluation of Non-Intrusive Load Monitoring for shipboard cycling system diagnostics  

E-Print Network [OSTI]

The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to determine the operating schedule of all of the major loads on an electrical service. Additionally, the NILM can use its ...

Mosman, James P. (James Paul)

2006-01-01T23:59:59.000Z

103

Non-intrusive water utility monitoring and free-space load monitoring  

E-Print Network [OSTI]

This work presents a non-intrusive, single-point sensing scheme to monitor the water usage for various loads on a water utility pipe network through the vibration of a pipe near the water intake source. Experiments with ...

Neuman, Sabrina M

2011-01-01T23:59:59.000Z

104

Interpreting human activity from electrical consumption data through non-intrusive load monitoring  

E-Print Network [OSTI]

Non-intrusive load monitoring (NILM) has three distinct advantages over today's smart meters. First, it offers accountability. Few people know where their kWh's are going. Second, it is a maintenance tool. Signs of wear ...

Gillman, Mark Daniel

2014-01-01T23:59:59.000Z

105

Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring  

E-Print Network [OSTI]

This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

McKay, Thomas Duncan

2006-01-01T23:59:59.000Z

106

Diagnostic indicators for shipboard systems using non-intrusive load monitoring  

E-Print Network [OSTI]

Field studies have demonstrated that the Non-Intrusive Load monitor (NILM) can provide real-time indication of the condition of electro-mechanical systems on board naval vessels. Results from data collected from engineering ...

DeNucci, Thomas W

2005-01-01T23:59:59.000Z

107

Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants  

E-Print Network [OSTI]

The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

Greene, William C. (William Calvin)

2005-01-01T23:59:59.000Z

108

E-Print Network 3.0 - adaptive intrusion data systems Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: adaptive intrusion data systems Page: << < 1 2 3 4 5 > >> 1 Noname manuscript No. (will be inserted by the editor) Summary: to obtain audit data, correlate events, and...

109

Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador  

E-Print Network [OSTI]

Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador J. Biggs,1 of the edifice, or temporary, in which case the magma will be released in a future eruption. Citation: Biggs, J

Biggs, Juliet

110

Assessment of Seawater Intrusion Potential From Sea-level Rise in Coastal Aquifers of California  

E-Print Network [OSTI]

2009). Impact of Sea-Level Rise on Sea Water Intrusion inC. (1997). Global Sea Level Rise: A Redetermination. Surveys2007). Effects of sea-level rise on groundwater flow in a

Loáiciga, Hugo A; Pingel, Thomas J; Garcia, Elizabeth S

2009-01-01T23:59:59.000Z

111

Effects of droplet size on intrusion of sub-surface oil spills  

E-Print Network [OSTI]

This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

Chan, Godine Kok Yan

2013-01-01T23:59:59.000Z

112

Evaluation of intrusion sensors and video assessment in areas of restricted passage  

SciTech Connect (OSTI)

This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

Hoover, C.E.; Ringler, C.E.

1996-04-01T23:59:59.000Z

113

An ethernet/IP security review with intrusion detection applications  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01T23:59:59.000Z

114

A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11  

SciTech Connect (OSTI)

This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

1991-05-15T23:59:59.000Z

115

FISH ASSEMBLAGES IN MACROCYSTIS AND NEREOCYSTIS KELP FORESTS OFF CENTRAL CALIFORNIA  

E-Print Network [OSTI]

FISH ASSEMBLAGES IN MACROCYSTIS AND NEREOCYSTIS KELP FORESTS OFF CENTRAL CALIFORNIA JAMES LEE canopy fonning kelp forests (giant kelp, Macrocystis 'Jl!j1'ifera, and bull kelp, NereolJlJstis luetkeana for substrate and cover within their habitat, such as rock or coral reefs or kelp beds, as well as man

116

Use of European hare (Lepus europaeus) carcasses by an avian scavenging assemblage in Patagonia  

E-Print Network [OSTI]

Use of European hare (Lepus europaeus) carcasses by an avian scavenging assemblage in Patagonia) carcasses by avian scavengers in Argentinean Patagonia. A total of 16 hare carcasses were placed in Africa. Key words: hare carcasses, avian scavengers, Patagonia, Lepus europaeus, raptors INTRODUCTION

Donázar, José A.

117

Prioritization of fish assemblages with a view to conservation and restoration on a large scale European  

E-Print Network [OSTI]

Prioritization of fish assemblages with a view to conservation and restoration on a large scale The hierarchical organization of important sites for the conservation or the restoration of fish communities, we developed a methodology, which is easy to implement in different locations. Based on the fish

Paris-Sud XI, Université de

118

Larval fish assemblages and mesoscale oceanographic structure along the Mesoamerican Barrier Reef System  

E-Print Network [OSTI]

Larval fish assemblages and mesoscale oceanographic structure along the Mesoamerican Barrier Reef Caribbean region, and contains spawning sites for a number of reef fish species. Despite this, little is known of the distribution and transport of pelagic fish larvae in the area, and basic in situ

119

Small-scale spatial variation of benthic algal assemblages in a peat bog Katerina Cerna n  

E-Print Network [OSTI]

Small-scale spatial variation of benthic algal assemblages in a peat bog Katerina Cerna´ n test Peat bog a b s t r a c t Spatial patterns on a very small scale (10 cm), and the effect microhabitat types were investigated. Samples were taken in a peat bog along linear transects on a scale of 10

120

Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems  

SciTech Connect (OSTI)

We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. The filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

Najm, Habib N. [Sandia National Laboratories, Livermore, CA 94551 (United States); Valorani, Mauro [Mechanical and Aerospace Engineering Dept., Sapienza University of Rome, Rome (Italy)

2014-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Smart container UWB sensor system for situational awareness of intrusion alarms  

DOE Patents [OSTI]

An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

2013-06-11T23:59:59.000Z

122

Effect of permeability on cooling of magmatic intrusion in a goethermal reservoir  

SciTech Connect (OSTI)

Transient cooling of magmatic intrusion in a geothermal reservoir due to conduction and convection is studied. The effects of overlying cap rock and different horizontal and vertical permeability of the reservoir are considered. Results are compared to the data from Salton Sea Geothermal Field. It is also observed that multiple layers of convection cells exist when horizontal permeability is much larger than the vertical permeability. The sharp dropoff of surface heat flow observed at Salton Sea Geothermal Field is confirmed by numerical results. Based on these numerical results, it is possible to speculate that the age of the intrusive body is about 8000 to 12,000 years.

Lau, K.H.

1980-09-01T23:59:59.000Z

123

29.01.03. M1.11 Information Resources Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

includes, but is not limited to, all information resources management personnel, owners, and system29.01.03. M1.11 Information Resources ­ Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.11 Information Resources ­ Intrusion Detection Approved July 18, 2005 Revised April 27

124

Mining in a Dataflow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok  

E-Print Network [OSTI]

Mining in a Data­flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

Lee, Wenke

125

Mining in a Data-flow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok  

E-Print Network [OSTI]

Mining in a Data-flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

Yang, Junfeng

126

Optimal Three-Material Wheel Assemblage of Conducting and Elastic Composites  

E-Print Network [OSTI]

We describe a new type of three material microstructures which we call wheel assemblages, that correspond to extremal conductivity and extremal bulk modulus for a composite made of two materials and an ideal material. The exact lower bounds for effective conductivity and matching laminates was found in (Cherkaev, 2009) and for anisotropic composites, in (Cherkaev, Zhang, 2011). Here, we show different optimal structures that generalize the classical Hashin-Shtrikman coated spheres (circles). They consist of circular inclusions which contain a solid central circle (hub) and radial spikes in a surrounding annulus, and (for larger volume fractions of the best material) an annulus filled with it. The same wheel assemblages are optimal for the pair of dual problems of minimal conductivity (resistivity) of a composite made from two materials and an ideal conductor (insulator), in the problem of maximal effective bulk modulus of elastic composites made from two linear elastic material and void, and the dual minimum problem.

Andrej Cherkaev

2011-05-22T23:59:59.000Z

127

Efficacy of Low and High Complexity Vegetation Treatments for Reestablishing Terrestrial Arthropod Assemblages during Montane Wetland Restoration  

E-Print Network [OSTI]

wetland types—than was observed between any restoration treatment andDual treatment was added to enhance restoration of wetlandTreatments for Reestablishing Terrestrial Arthropod Assemblages during Montane Wetland

Holmquist, Jeffrey G; Schmidt-Gengenbach, Jutta; Demetry, Athena

2014-01-01T23:59:59.000Z

128

ccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores  

E-Print Network [OSTI]

isotherms and capillary conden- sation, usually described as a gas-liquid phase transition shiftedccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores B- extrusion cycles of water in hydrophobic mesoporous materials, characterized by independent cylindrical

Boyer, Edmond

129

Comparison of Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty  

E-Print Network [OSTI]

, Blacksburg, VA 24061 Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods and ability to produce functional representations of stochastic variability. PCE estimates coefficients observed differences. In these computational experiments, performance of PCE and SC is shown to be very

130

Recent Advances in Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty  

E-Print Network [OSTI]

-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods are attractive techniques representations of stochastic variability. PCE estimates coefficients for known orthogonal polynomial basis using probabilistic methods is the polynomial chaos expansion (PCE) approach to UQ. In this work, we

131

Evaluation of Non-Intrusive Approaches for Wiener-Askey Generalized Polynomial Chaos  

E-Print Network [OSTI]

University, Stanford, CA 94305 Polynomial chaos expansions (PCE) are an attractive technique for uncertainty for general probabilistic analysis problems. Non-intrusive PCE methods allow the use of simulations as black the polynomial chaos expansion (PCE) approach to UQ. In particular, we focus on generalized polynomial chaos

132

Real-time processing of a long perimeter fiber optic intrusion system  

E-Print Network [OSTI]

This thesis reports on recent advances made in real-time intruder detection for an intrusion system developed at Texas A&M University that utilizes a phase-sensitive optical time-domain reflectometer. The system uses light pulses from a highly...

Snider, William Timothy

2009-09-30T23:59:59.000Z

133

NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA  

E-Print Network [OSTI]

NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA by Michael Takeshi Nakata A thesis DIAGNOSTIC FOR A NON-NEUTRAL PLASMA M. Takeshi Nakata Department of Physics and Astronomy Master of Science A simple, non-destructive diagnostic for the temperature of a non-neutral plasma is desirable as plasma

Hart, Gus

134

c Copyright by James Patrick Lyons, 2003 A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT  

E-Print Network [OSTI]

c Copyright by James Patrick Lyons, 2003 #12;A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT SYSTEM DESIGN BY JAMES PATRICK LYONS B.S., University of Pennsylvania, 2000 THESIS Submitted in partial and Family iii #12;Acknowledgments In writing this thesis many people have provided me with invaluable

Illinois at Urbana-Champaign, University of

135

A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures  

E-Print Network [OSTI]

-security Risk Management Process (RMP) tailored to smart grids [2]. In this paper we leverage information from1 A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures] and apply them to the specific case of AMI networks in which asset owners are evaluating the use of an IDS

Sanders, William H.

136

Dynamical and chemical characteristics of tropospheric intrusions observed during START08  

E-Print Network [OSTI]

. Homeyer,1 Kenneth P. Bowman,1 Laura L. Pan,2 Elliot L. Atlas,3 RuShan Gao,4 and Teresa L. Campos2 Received that the intruding air masses can be traced back to the tropical upper troposphere and lower stratosphere. In situ of the observed intrusions through use of a simple box model and trace species with different photochemical

Pan, Laura

137

A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks  

E-Print Network [OSTI]

A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering Algorithm and energy of nodes in the cluster formation in order to improve detection accuracy and re- duce energy

Stavrakakis, Ioannis

138

Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems  

E-Print Network [OSTI]

) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way, distribution au- tomation, network security, intrusion detection systems. I. INTRODUCTION A. Scope and Goals their development with that of an appropriate cyber security frame- work that would prevent attackers from gaining

Peisert, Sean

139

Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule  

E-Print Network [OSTI]

. Intrusion detection systems (IDSs) are security appliances that review audit data to identify cyber attacks is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness

Chen, Ing-Ray

140

Supporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision History  

E-Print Network [OSTI]

-XXXXX-XX-X/XX/XX ...$5.00. Eclipse Platform Revision Collector History Exporter Graphical Visualizer Other ToolsSupporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision This paper presents a code-revision history collection and vi- sualization Eclipse plugin for use

Robillard, Martin

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA  

E-Print Network [OSTI]

with a real-world power plant simulator. The experiment results show that SRID can detect various false data, College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power. Advanced false data injection attack in targeted malware intrusion is becoming an emerging severe threat

Gu, Guofei

142

Functional requirements with survey results for integrated intrusion detection and access control annunciator systems  

SciTech Connect (OSTI)

This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

Arakaki, L.H.; Monaco, F.M.

1995-09-01T23:59:59.000Z

143

HoBIDS: A Data Mining Approach to Host Based Intrusion Detection  

E-Print Network [OSTI]

HoBIDS: A Data Mining Approach to Host Based Intrusion Detection Department of Computer Science of a host based IDS built on a data mining framework. This framework allows the system to detect both known and lightweight sensor system with the capabilities of sophisticated data-mining techniques to build a powerful

Hershkop, Shlomo

144

Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo  

E-Print Network [OSTI]

Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo Computer Science. The key ideas are to use data mining techniques to discover consistent and useful patterns of system experiments on the sendmail system call data and the network tcpdump data, we demonstrate that we can

Somayaji, Anil

145

Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project  

E-Print Network [OSTI]

Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project Salvatore J. Stolfo by sensing a misuse or a breach of a security policy and alerting operators to an ongoing (or, at least on a weekly basis reporting that malicious users still succeed in attacking systems with sometimes devastating

Yang, Junfeng

146

Compilation of gas intrusion measurements, variations, and consequence modeling for SPR caverns.  

SciTech Connect (OSTI)

The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H2S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

Hinkebein, Thomas E.

2003-03-01T23:59:59.000Z

147

Phylogenetic beta diversity in bacterial assemblages across ecosystems: deterministic versus stochastic processes  

SciTech Connect (OSTI)

Increasing evidence emerged for non-random spatial distributions for microbes, but the underlying processes resulting in microbial assemblage variation among and within Earth’s ecosystems is still lacking. For instance, some studies showed that the deterministic processes by habitat specialization are important, while other studies hold that bacterial communities are assembled by neutral forces. Here we examine the relative importance of deterministic and stochastic processes for bacterial communities from subsurface environments, as well as stream biofilm, lake water, lake sediment and soil using pyrosequencing of 16S rRNA gene. We show that there is a general pattern in phylogenetic signal in species niches across recent evolutionary time for all studied habitats, enabling us to infer the influences of community assembly processes from patterns of phylogenetic turnover in community composition. The phylogenetic dissimilarities among habitat types were significantly higher than within them, and the communities were clustered according to their original habitat types. For communities within habitat types, the highest phylogenetic turnover rate through space was observed in subsurface environments, followed by stream biofilm on mountainsides, whereas the sediment assemblages across regional scales showed the lowest turnover rate. Quantifying phylogenetic turnover as the deviation from a null expectation suggested that measured environmental variables imposed strong selection on bacterial communities for nearly all sample groups, and for three sample groups, that spatial distance reflects unmeasured environmental variables that impose selection, as opposed to spatial isolation. Such characterization of spatial and environmental variables proved essential for proper interpretation of partial mantel results based on observed beta diversity metrics. In summary, our results clearly indicate a dominant role of deterministic processes on bacterial assemblages and highlight that bacteria show strong habitat associations that have likely emerged through evolutionary adaptation.

Wang, Jianjun; Shen, Jianhaua; Wu, Yucheng; Tu, Chen; Soininen , Janne; Stegen, James C.; He, Jizheng; Liu, Xingqi; Zhang, Lu; Zhang, Enlou

2013-02-28T23:59:59.000Z

148

Hydrothermal formation of Clay-Carbonate alteration assemblages in the Nili Fossae region of Mars  

E-Print Network [OSTI]

The Compact Reconnaissance Imaging Spectrometer for Mars (CRISM) has returned observations of the Nili Fossae region indicating the presence of Mg- carbonate in small (carbonate-bearing units. We applied absorption band mapping techniques to investigate a range of possible phyllosilicate and carbonate minerals that could be present in the Nili Fossae region. We also describe a clay-carbonate hydrothermal alteration mineral assemblage in the Archean Warrawoona Group of Western Australia that is a potential Earth analog to the Nili Fossae carbonate-bearing rock units. We discuss the geological and biological implications for hydrothermal processes on Noachian Mars.

Brown, Adrian J; Baldridge, Alice M; Crowley, James K; Bridges, Nathan T; Thomson, Bradley J; Marion, Giles M; Filho, Carlos R de Souza; Bishop, Janice L

2014-01-01T23:59:59.000Z

149

Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant  

SciTech Connect (OSTI)

The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

1993-11-01T23:59:59.000Z

150

Evaluation of geologic materials to limit biological intrusion into low-level radioactive waste disposal sites  

SciTech Connect (OSTI)

This report describes the results of a three-year research program to evaluate the performance of selected soil and rock trench cap designs in limiting biological intrusion into simulated waste. The report is divided into three sections including a discussion of background material on biological interactions with waste site trench caps, a presentation of experimental data from field studies conducted at several scales, and a final section on the interpretation and limitations of the data including implications for the user.

Hakonson, T.E.

1986-02-01T23:59:59.000Z

151

Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application  

DOE Patents [OSTI]

An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

Piper, T.C.

1980-09-24T23:59:59.000Z

152

Compilation of Gas Intrusion Measurements, Variations, and Consequence Modeling for SPR Caverns  

SciTech Connect (OSTI)

The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H{sub 2}S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

HINKEBEIN, THOMAS E.

2003-03-01T23:59:59.000Z

153

Wave-swept rocky shores support a surprisingly diverse assemblage of organisms that includes members of virtually  

E-Print Network [OSTI]

Wave-swept rocky shores support a surprisingly diverse assemblage of organisms that includes members of virtually every animal phylum and both algae and vascular plants. In general, wave that hydrodynamic forces can play an important role in limiting the size of wave-swept plants and animals (Denny et

California at Santa Cruz, University of

154

Amazon River water in the northeastern Caribbean Sea and its effect on larval reef fish assemblages during April 2009  

E-Print Network [OSTI]

Amazon River water in the northeastern Caribbean Sea and its effect on larval reef fish assemblages.S.A. ABSTRACT During April to June 2009, a large bolus of Amazon River water impacted the northeastern Caribbean Ocean waters to the north, with Caribbean surface waters showing intermediate values. Plankton net tows

155

Raoul et al. Small mammals and forest management in China 1 Title: Small-mammal assemblage response to deforestation and  

E-Print Network [OSTI]

to deforestation and afforestation in central China. Running title: Small mammals and forest management in China Deforestation is a major environmental issue driving the loss of animal and plant species. Afforestation has of small-mammal assemblages in an area where forest and associated deforestation habitats dominate

Paris-Sud XI, Université de

156

Evaluation of the aquatic habitat and fish assemblage in an urban reach of the historic Rideau Canal, Ottawa,  

E-Print Network [OSTI]

Evaluation of the aquatic habitat and fish assemblage in an urban reach of the historic Rideau communities, particularly in the urban reach in Ottawa between Hartwell's Lock and the outflow of Dows Lake natural and engineered habitat/substrate types across the period when the canal is at navigational water

Cooke, Steven J.

157

Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)  

SciTech Connect (OSTI)

Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

Jared Verba; Michael Milvich

2008-05-01T23:59:59.000Z

158

HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System  

SciTech Connect (OSTI)

Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

Chen, Yan [Northwesten University] [Northwesten University

2013-12-05T23:59:59.000Z

159

Update on intrusive characterization of mixed contact-handled transuranic waste at Argonne-West  

SciTech Connect (OSTI)

Argonne National Laboratory and Lockheed Martin Idaho Technologies Company have jointly participated in the Department of Energy`s (DOE) Waste Isolation Pilot Plant (WIPP) Transuranic Waste Characterization Program since 1990. Intrusive examinations have been conducted in the Waste Characterization Area, located at Argonne-West in Idaho Falls, Idaho, on over 200 drums of mixed contact-handled transuranic waste. This is double the number of drums characterized since the last update at the 1995 Waste Management Conference. These examinations have provided waste characterization information that supports performance assessment of WIPP and that supports Lockheed`s compliance with the Resource Conservation and Recovery Act. Operating philosophies and corresponding regulatory permits have been broadened to provide greater flexibility and capability for waste characterization, such as the provision for minor treatments like absorption, neutralization, stabilization, and amalgamation. This paper provides an update on Argonne`s intrusive characterization permits, procedures, results, and lessons learned. Other DOE sites that must deal with mixed contact-handled transuranic waste have initiated detailed planning for characterization of their own waste. The information presented herein could aid these other storage and generator sites in further development of their characterization efforts.

Dwight, C.C.; Jensen, B.A.; Bryngelson, C.D.; Duncan, D.S.

1997-02-03T23:59:59.000Z

160

Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars  

SciTech Connect (OSTI)

The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

Villa, Andrea; Mussi, Valerio [Laboratorio MUSP-via Turotti 9, 29122 Piacenza (Italy); Strano, Matteo [Politecnico di Milano-Dipartimento di Meccanica, via La Masa 1, 20156, Milan (Italy)

2011-05-04T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Lafont, M. and Vivier, A. (2006). Oligochaete assemblages in the hyporheic zone and coarse surface sediments: their importance for understanding of ecological  

E-Print Network [OSTI]

sediments: their importance for understanding of ecological functioning of watercourses. Hydrobiologia. 564 assemblages in the hyporheic zone and coarse surface sediments: their importance for understanding Laboratory, 3 bis Quai Koch, 67000 Strasbourg (France) Keywords: Running waters, coarse sediments, hyporheic

Boyer, Edmond

162

Tuna-Dolphin-Bird Feeding Assemblages in the Galapagos Islands and Their Response to the Physical Characteristics of the Upper Water Column  

E-Print Network [OSTI]

Tuna-dolphin-bird feeding assemblages are unique to the Eastern Tropical Pacific Ocean (ETP). These multiple species groups are believed to forage together in response to the physical properties of the near surface ocean as these constrain...

Johnston, Michelle

2012-10-19T23:59:59.000Z

163

c 2004 by Fabrice Stevens. All rights reserved. VALIDATION OF AN INTRUSION-TOLERANT INFORMATION SYSTEM USING  

E-Print Network [OSTI]

c 2004 by Fabrice Stevens. All rights reserved. #12;VALIDATION OF AN INTRUSION-TOLERANT INFORMATION of Illinois at Urbana-Champaign, 2004 Urbana, Illinois #12;To my parents iii #12;ACKNOWLEDGMENTS I would like to thank my advisor, Professor William H. Sanders, for giving me the op- portunity to work for him. His

Illinois at Urbana-Champaign, University of

164

Numerical Model Investigation for Potential Methane Explosion and Benzene Vapor Intrusion Associated with High-Ethanol Blend  

E-Print Network [OSTI]

Associated with High-Ethanol Blend Releases Jie Ma, Hong Luo, George E. DeVaull,§ William G. Rixey, and Pedro ABSTRACT: Ethanol-blended fuel releases usually stimulate methanogenesis in the subsurface, which could conditions exist. Ethanol- derived methane may also increase the vapor intrusion potential of toxic fuel

Alvarez, Pedro J.

165

U-PB ZIRCON AND TITANITE AGES OF LATE-TO POST-TECTONIC INTRUSIONS OF THE CORTLANDT-  

E-Print Network [OSTI]

U-PB ZIRCON AND TITANITE AGES OF LATE-TO POST-TECTONIC INTRUSIONS OF THE CORTLANDT- BEEMERVILLE, and monzonorite of the Cortlandt Complex 446±2Ma. Titanite from the Beemerville nepheline syenite has yielded.D., Aleinikoff, J.N., Amelin, Yuri; Merguerian, Charles; and Panish, P.T., 2012, U-Pb zircon and titanite ages

Merguerian, Charles

166

Using the sequential regression (SER) algorithm for long-term signal processing. [Intrusion detection  

SciTech Connect (OSTI)

The use of the sequential regression (SER) algorithm (Electron. Lett., 14, 118(1978); 13, 446(1977)) for long-term processing applications is limited by two problems that can occur when an SER predictor has more weights than required to predict the input signal. First, computational difficulties related to updating the autocorrelation matrix inverse could arise, since no unique least-squares solution exists. Second, the predictor strives to remove very low-level components in the input, and hence could implement a gain function that is essentially zero over the entire passband. The predictor would then tend to become a no-pass filter which is undesirable in certain applications, e.g., intrusion detection (SAND--78-1032). Modifications to the SER algorithm that overcome the above problems are presented, which enable its use for long-term signal processing applications. 3 figures.

Soldan, D. L.; Ahmed, N.; Stearns, S. D.

1980-01-01T23:59:59.000Z

167

Non-intrusive Low-Rank Separated Approximation of High-Dimensional Stochastic Models  

E-Print Network [OSTI]

This work proposes a sampling-based (non-intrusive) approach within the context of low-rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs.

Alireza Doostan; AbdoulAhad Validi; Gianluca Iaccarino

2012-10-04T23:59:59.000Z

168

Verifying the secure setup of Unix client/servers and detection of network intrusion  

SciTech Connect (OSTI)

This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

Feingold, R.; Bruestle, H.R.; Bartoletti, T.; Saroyan, A.; Fisher, J.

1995-07-01T23:59:59.000Z

169

Establishment of a facility for intrusive characterization of transuranic waste at the Nevada Test Site  

SciTech Connect (OSTI)

This paper describes design and construction, project management, and testing results associated with the Waste Examination Facility (WEF) recently constructed at the Nevada Test Site (NTS). The WEF and associated systems were designed, procured, and constructed on an extremely tight budget and within a fast track schedule. Part 1 of this paper focuses on design and construction activities, Part 2 discusses project management of WEF design and construction activities, and Part 3 describes the results of the transuranic (TRU) waste examination pilot project conducted at the WEF. In Part 1, the waste examination process is described within the context of Waste Isolation Pilot Plant (WIPP) characterization requirements. Design criteria are described from operational and radiological protection considerations. The WEF engineered systems are described. These systems include isolation barriers using a glove box and secondary containment structure, high efficiency particulate air (HEPA) filtration and ventilation systems, differential pressure monitoring systems, and fire protection systems. In Part 2, the project management techniques used for ensuring that stringent cost/schedule requirements were met are described. The critical attributes of these management systems are described with an emphasis on team work. In Part 3, the results of a pilot project directed at performing intrusive characterization (i.e., examination) of TRU waste at the WEF are described. Project activities included cold and hot operations. Cold operations included operator training, facility systems walk down, and operational procedures validation. Hot operations included working with plutonium contaminated TRU waste and consisted of waste container breaching, waste examination, waste segregation, data collection, and waste repackaging.

Foster, B.D.; Musick, R.G.; Pedalino, J.P.; Cowley, J.L. [Bechtel Nevada Corp., Las Vegas, NV (United States); Karney, C.C. [Dept. of Energy, Las Vegas, NV (United States); Kremer, J.L.

1998-01-01T23:59:59.000Z

170

iSSH v. Auditd: Intrusion Detection in High Performance Computing  

SciTech Connect (OSTI)

The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks were roughly the same regardless of which tool was running.

Karns, David M. [Los Alamos National Laboratory; Protin, Kathryn S. [Los Alamos National Laboratory; Wolf, Justin G. [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

171

Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu)  

E-Print Network [OSTI]

Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie on a network. It uses simple data mining techniques to process the network input data and help expose metrics administrator. This paper describes the components in the FIRE architecture and explains their roles. Particular

Dickerson, Julie A.

172

Resolving discrepancies between hydraulic and chemical calibration data for seawater intrusion groundwater flow models by considering climate-driven sea level change.  

SciTech Connect (OSTI)

Groundwater models of seawater intrusion environments can be calibrated using both hydraulic and chemical information. The possible impact of the long-term transient process of sea level change is difficult to identify, but important to accurate simulation of present conditions. The response times of the pressure and chemical fields to major fluctuations in sea level change are investigated

J. Chapman; A. Hassan; K. Pohlmann

2001-10-18T23:59:59.000Z

173

Extratropical Dry-Air Intrusions into the West African Monsoon Midtroposphere: An Important Factor for the Convective Activity over the Sahel  

E-Print Network [OSTI]

and sec- ond, the entrainment of dry air as the parcel rises that decreases the parcel's buoyancy (MapesExtratropical Dry-Air Intrusions into the West African Monsoon Midtroposphere: An Important Factor during July to August 1992. The approach documents both the moisture content and the origin of the air

Roca, Rémy

174

Changes in Native Aquatic Vegetation, Associated Fish Assemblages, and Food Habits of Largemouth Bass (Micropterus salmoides) Following the Addition of Triploid Grass Carp to Manage Hydrilla (Hydrilla Verticillata) in Lake Conroe, TX  

E-Print Network [OSTI]

and condition changes of Centrachid species, largemouth diet changes, and changes in the fish assemblages among randomly selected sampling stations between early fall 2007, when grass carp were stocked, and one year later in early fall of 2008. The areas...

Ireland, Patrick Alexander

2011-10-21T23:59:59.000Z

175

Diatom species composition and abundance in water column assemblages from five drill sites in Prydz Bay, Antarctica, Ocean Drilling Program Leg 119: distributional patterns  

E-Print Network [OSTI]

the Maersk Master cruise (ODP Leg 119). A) Site 739, Sta. 1, B) Site 740, St. 8, C)Site 742, St. 11. 104 53. Comparison of mean cell numbers of total empty diatoms between HPMA technique and Utermohl technique 105 54. Comparison of mean cell numbers...DIATOM SPECIES COMPOSITION AND ABUNDANCE IN WATER COLUMN ASSEMBLAGES FROM FIVE DRILL SITES IN PRYDZ BAY, ANTARCTICA, OCEAN DRILLING PROGRAM LEG 119: DISTRIBUTIONAL PATTERNS A Thesis by SUNG-HO KANG Submitted to the Office of Graduate Studies...

Kang, Sung-Ho

1989-01-01T23:59:59.000Z

176

Considerations Related To Human Intrusion In The Context Of Disposal Of Radioactive Waste-The IAEA HIDRA Project  

SciTech Connect (OSTI)

The principal approaches for management of radioactive waste are commonly termed ‘delay and decay’, ‘concentrate and contain’ and ‘dilute and disperse’. Containing the waste and isolating it from the human environment, by burying it, is considered to increase safety and is generally accepted as the preferred approach for managing radioactive waste. However, this approach results in concentrated sources of radioactive waste contained in one location, which can pose hazards should the facility be disrupted by human action in the future. The International Commission on Radiological Protection (ICRP), International Atomic Energy Agency (IAEA), and Organization for Economic Cooperation and Development/Nuclear Energy Agency (OECD/NEA) agree that some form of inadvertent human intrusion (HI) needs to be considered to address the potential consequences in the case of loss of institutional control and loss of memory of the disposal facility. Requirements are reflected in national regulations governing radioactive waste disposal. However, in practice, these requirements are often different from country to country, which is then reflected in the actual implementation of HI as part of a safety case. The IAEA project on HI in the context of Disposal of RadioActive waste (HIDRA) has been started to identify potential areas for improved consistency in consideration of HI. The expected outcome is to provide recommendations on how to address human actions in the safety case in the future, and how the safety case may be used to demonstrate robustness and optimize siting, design and waste acceptance criteria within the context of a safety case.

Seitz, Roger; Kumano, Yumiko; Bailey, Lucy; Markley, Chris; Andersson, Eva; Beuth, Thomas

2014-01-09T23:59:59.000Z

177

MONITORING DE LA CORROSION EN LIGNE DE LA CORROSION EN LIGNE NON INTRUSIF NON-INTRUSIVE ONLINE CORROSION MONITORING  

E-Print Network [OSTI]

La corrosion dans l’industrie du procédé est un enjeu majeur et est la cause la plus fréquente des défaillances des équipements et des arrêts forcés des sites industriels. Les défaillances des pipelines ou des réservoirs peuvent être dangereuses, coûteuses et ont des effets graves sur l’environnement. Une défaillance typique est la diminution jusqu’à un seuil critique de l’épaisseur des parois à cause de l’érosion ou de la corrosion interne comme externe. Actuellement, le suivi de la corrosion dans les pipes et les réservoirs utilise le plus souvent une inspection et un suivi manuel, procédure coûteuse notamment en temps. De plus, les zones critiques sont souvent situées dans des emplacements d’accès difficile. Comme ces données ne sont pas automatiquement informatisées, elles sont peu fiables pour des analyses à long terme ou le suivi de la corrosion. L’objectif de cet article est de présenter une nouvelle technologie non intrusive pour le monitoring de la corrosion, utilisant les ultrasons et un software afin de stocker les données, suivre les taux et les tendances de la corrosion, ce qui permet un plan de maintenance avant que la défaillance se produise. Cet article est divisé en deux parties. Dans la première partie nous allons aborder les différents types de corrosion et comment ils se produisent. Dans la

A. Saluja; J Costain; E. Van Der Leden; C. Laverde

178

Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report  

SciTech Connect (OSTI)

Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

2011-09-01T23:59:59.000Z

179

Technology Review of Nondestructive Methods for Examination of Water Intrusion Areas on Hanford’s Double-Shell Waste Tanks  

SciTech Connect (OSTI)

Under a contract with CH2M Hill Hanford Group, Inc., PNNL has performed a review of the NDE technology and methods for examination of the concrete dome structure of Hanford’s double-shell tanks. The objective was to provide a matrix of methodologies that could be evaluated based on applicability, ease of deployment, and results that could provide information that could be used in the ongoing structural analysis of the tank dome. PNNL performed a technology evaluation with the objective of providing a critical literature review for all applicable technologies based on constraints provided by CH2M HILL. These constraints were not mandatory, but were desired. These constraints included performing the evaluation without removing any soil from the top of the tank, or if necessary, requesting that the hole diameter needed to gain access to evaluate the top of the tank structure to be no greater than approximately 12-in. in diameter. PNNL did not address the details of statistical sampling requirements as they depend on an unspecified risk tolerance. PNNL considered these during the technology evaluation and have reported the results in the remainder of this document. Many of the basic approaches to concrete inspection that were reviewed in previous efforts are still in use. These include electromagnetic, acoustic, radiographic, etc. The primary improvements in these tools have focused on providing quantitative image reconstruction, thus providing inspectors and analysts with three-dimensional data sets that allow for operator visualization of relevant abnormalities and analytical integration into structural performance models. Available instruments, such as radar used for bridge deck inspections, rely on post-processing algorithms and do not provide real-time visualization. Commercially available equipment only provides qualitative indications of relative concrete damage. It cannot be used as direct input for structural analysis to assess fitness for use and if necessary to de-rate critical components. There are currently no tools that automatically convert the NDE data to formats compatible with structural analysis programs. While radiographic techniques still provide significant advantages in spatial resolution, non-ionizing techniques are still preferred. Radar imagining in the 1–5 GHz has become the most useful. Unfortunately the algorithms and underlying assumptions used in these reconstructions are proprietary, and it is not possible to assess the quality and limitations of the analytical methods used to generate the derived structural data. The hypothesis that water intrusion may contribute to potential rebar corrosion of the tank domes provided the primary guidance in reviewing and evaluating available NDE technologies. Of primary concern is the need to employ technologies that provide the best opportunity for visualizing the rebar and providing quantitative data that can be integrated into structural analysis efforts to better understand and quantify the structural capacity of the domes. The conclusion is that an imaging system capable of locating and quantifying the distribution and conditions of the cement, aggregate, and rebar will provide the most valuable baseline upon which to build a case for the integrity of the structure. If successful, such a system would fulfill the need to incorporate valuable data into current structural load capacity analysis.

Watkins, Michael L.; Pardini, Allan F.

2008-05-09T23:59:59.000Z

180

Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada  

SciTech Connect (OSTI)

In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for extraction of groundwater from the deep carbonate aquifer. Grazing and hunting are unlikely to be potential causes for inadvertent human intrusion into waste areas because of vegetation characteristics and lack of significant game animal populations.

NSTec Environmental Management

2007-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Monitoring CO 2 sequestration into deep saline aquifer and associated salt intrusion using coupled multiphase flow modeling and time lapse electrical resistivity tomography  

SciTech Connect (OSTI)

Successful geological storage and sequestration of carbon dioxide (CO2) require efficient monitoring of the migration of CO2 plume during and after large-scale injection in order to verify the containment of the injected CO2 within the target formation and to evaluate potential leakage risk. Field studies have shown that surface and cross-borehole electrical resistivity tomography (ERT) can be a useful tool in imaging and characterizing solute transport in heterogeneous subsurface. In this synthetic study, we have coupled a 3-D multiphase flow model with a parallel 3-D time-lapse ERT inversion code to explore the feasibility of using time-lapse ERT for simultaneously monitoring the migration of CO2 plume in deep saline formation and potential brine intrusion into shallow fresh water aquifer. Direct comparisons of the inverted CO2 plumes resulting from ERT with multiphase flow simulation results indicate the ERT could be used to delineate the migration of CO2 plume. Detailed comparisons on the locations, sizes and shapes of CO2 plume and intruded brine plumes suggest that ERT inversion tends to underestimate the area review of the CO2 plume, but overestimate the thickness and total volume of the CO2 plume. The total volume of intruded brine plumes is overestimated as well. However, all discrepancies remain within reasonable ranges. Our study suggests that time-lapse ERT is a useful monitoring tool in characterizing the movement of injected CO2 into deep saline aquifer and detecting potential brine intrusion under large-scale field injection conditions.

Chuan Lu; CHI Zhang; Hai Hanag; Timothy C. Johnson

2014-04-01T23:59:59.000Z

182

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

SciTech Connect (OSTI)

One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water standards might be exceeded was evaluated. A variety of scenarios and aquifer conditions was considered in a sensitivity evaluation. The scenarios and conditions simulated in Section 4, in particular those describing the geochemistry and mineralogy of potable aquifers, were selected based on the comprehensive geochemical model developed in Section 3.

Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu

2008-10-01T23:59:59.000Z

183

Development of computer program ENAUDIBL for computation of the sensation levels of multiple, complex, intrusive sounds in the presence of residual environmental masking noise  

SciTech Connect (OSTI)

The relative audibility of multiple sounds occurs in separate, independent channels (frequency bands) termed critical bands or equivalent rectangular (filter-response) bandwidths (ERBs) of frequency. The true nature of human hearing is a function of a complex combination of subjective factors, both auditory and nonauditory. Assessment of the probability of individual annoyance, community-complaint reaction levels, speech intelligibility, and the most cost-effective mitigation actions requires sensation-level data; these data are one of the most important auditory factors. However, sensation levels cannot be calculated by using single-number, A-weighted sound level values. This paper describes specific steps to compute sensation levels. A unique, newly developed procedure is used, which simplifies and improves the accuracy of such computations by the use of maximum sensation levels that occur, for each intrusive-sound spectrum, within each ERB. The newly developed program ENAUDIBL makes use of ERB sensation-level values generated with some computational subroutines developed for the formerly documented program SPECTRAN.

Liebich, R. E.; Chang, Y.-S.; Chun, K. C.

2000-03-31T23:59:59.000Z

184

The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts  

SciTech Connect (OSTI)

Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system.

Tolan, T.L. [Tolan, Beeson and Associates, Kennewick, WA (United States)

1993-06-01T23:59:59.000Z

185

Non-intrusive cooling system  

DOE Patents [OSTI]

A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

2001-05-22T23:59:59.000Z

186

Intrusive multi-probe system  

SciTech Connect (OSTI)

The Diagnostic Instrumentation and Analysis Laboratory (DIAL) in the College of Engineering at Mississippi State University is the result of the efforts of several faculty members in the Aerospace and Chemical Engineering Departments obtaining funding in 1976. At that time, an initial research project was begun which was funded by the US Department of Energy as part of the national magnetohydrodynamic (MHD) program. Initial research efforts concentrated in heat recovery and seed recovery (HRSR) from the MHD combustion process as well as some materials investigations. Over the years, efforts at DIAL were shifted from HRSR studies to the development of optical based, microprocessor controlled instrumentation for use in the harsh MHD environment.

Green, R.A.; Hester, L.R.; Bouchillon, C.W.

1995-02-01T23:59:59.000Z

187

Water intrusion in underground structures  

E-Print Network [OSTI]

This thesis presents a study of the permissible groundwater infiltration rates in underground structures, the consequences of this leakage and the effectiveness of mitigation measures. Design guides and codes do not restrict, ...

Nazarchuk, Alex

2008-01-01T23:59:59.000Z

188

E-Print Network 3.0 - area sichuan basin Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Source: Rowe, Charlotte - Department of Earth and Planetary Sciences, University of New Mexico; Sun, Youshun - Earth Resources Laboratory, Massachusetts Institute of Technology...

189

The Epidemiology of Schistosomiasis Reinfection and Reemergence in Sichuan, China: Implications for Surveillance and Intervention  

E-Print Network [OSTI]

their household. If anaerobic biogas digesters were present,improved sanitation if a biogas digester was present andof anaerobic biogas digesters [23], a second biogas-adjusted

Carlton, Elizabeth Jean

2010-01-01T23:59:59.000Z

190

Pottery Production and Social Complexity of the Bronze Age Cultures on the Chengdu Plain, Sichuan, China  

E-Print Network [OSTI]

XRF) 315 Thermal2010TN05W03: 9:7 Bronze Age III zhan XRD, XRF, Petro, TGA/DSC XRD, XRF, Petro, TGA/DSC Analysis Thin- undertaken

Lin, Kuei-chen

2013-01-01T23:59:59.000Z

191

Pottery Production and Social Complexity of the Bronze Age Cultures on the Chengdu Plain, Sichuan, China  

E-Print Network [OSTI]

inspection of the clay matrix of the ceramic samples. Afterclay matrix. Moreover, we may compare data regarding ceramic

Lin, Kuei-chen

2013-01-01T23:59:59.000Z

192

Pottery Production and Social Complexity of the Bronze Age Cultures on the Chengdu Plain, Sichuan, China  

E-Print Network [OSTI]

Kexue Wenxian Chubanshe. Yue Hongbin ??? 2006 Yinxu qingtongfirst millennium BC (Yue Hongbin 2006:329). Such influence

Lin, Kuei-chen

2013-01-01T23:59:59.000Z

193

Under the Gun: Nationalist Military Service and Society in Wartime Sichuan, 1938-1945  

E-Print Network [OSTI]

McCord, The Power of the Gun, p. 21. 27. The classic accountMcCord, The Power of the Gun, p. 119-141; the quote is fromChapter Six Of Pen and Gun: Political Practice, Culture and

Landdeck, Kevin Paul

2011-01-01T23:59:59.000Z

194

The Epidemiology of Schistosomiasis Reinfection and Reemergence in Sichuan, China: Implications for Surveillance and Intervention  

E-Print Network [OSTI]

having improved sanitation if a biogas digester was presentbiogas adjusted‡ Continued on next page Table 7. The associations between improved sanitation,biogas was not associated with a decrease in infection risk warrants further evaluation, as installation of improved sanitation

Carlton, Elizabeth Jean

2010-01-01T23:59:59.000Z

195

The Epidemiology of Schistosomiasis Reinfection and Reemergence in Sichuan, China: Implications for Surveillance and Intervention  

E-Print Network [OSTI]

E (2009) Leveraging rural energy investment for parasitichas been promoted by rural energy departments through theand energy co-benefits of anaerobic digesters in rural

Carlton, Elizabeth Jean

2010-01-01T23:59:59.000Z

196

The Epidemiology of Schistosomiasis Reinfection and Reemergence in Sichuan, China: Implications for Surveillance and Intervention  

E-Print Network [OSTI]

5. Night soil from non-biogas sources (quartiles) Householdnight soil use, biogas adjusted No YesVillage night soil use, biogas adjusted‡ 6.1 - 25.7 buckets

Carlton, Elizabeth Jean

2010-01-01T23:59:59.000Z

197

Trace fossil assemblages in selected shelf sandstones  

E-Print Network [OSTI]

Harris. Thank you, good luck in the future, and may God bless you all. vi TABLE OF CONTENTS INTRODUCTION Background Objectives Methods . TRACE FOSSIL IDENTIFICATION IN CORES Introduction Description of Selected Trace Fossils TRACE FOSSILS..., the trace foss11 distributions agreed with those of the ichnofacies described by Seilacher (1978) and with the known environmental distributions compiled by Chamberlain (1978), but many trace fossils have widespread occurrences that limit...

Locke, Kathleen Ann

1983-01-01T23:59:59.000Z

198

Apparatuses, Globalities, Assemblages: Third Cinema, Now  

E-Print Network [OSTI]

and energy production that have been wrought upon the “developing” world.and energy production that have been wrought upon the “developing” world.

Benfield, Dalida Maria

2011-01-01T23:59:59.000Z

199

Apparatuses, Globalities, Assemblages: Third Cinema, Now  

E-Print Network [OSTI]

Lighting Ltd. , Foshan/Siemens art program. Fanon, F. (decolonizing-the-digitaldigital- decolonization Siemens. (2010a). “Siemens in China – November 2008. ” Retrieved from

Benfield, Dalida Maria

2011-01-01T23:59:59.000Z

200

re.Assemblage Bridging Traditional Craft  

E-Print Network [OSTI]

to the significanceofattentiontodetailsuchascraftandwoodqualities. #12; 4 Finally,FusedCraftsisacollectionofartifactsthatareparthandcraftedandpart3D printed

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Geochemical taphonomy of shallow marine vertebrate assemblages  

E-Print Network [OSTI]

: bones; taphonomy; rare earth elements; diagenesis; redox; marine 1. Introduction 1.1. Background Many). Trueman and Benton (1997) and Staron et al. (2001) demonstrated that the rare earth ele- ment (REE.R. Palmer b a Department of Earth Sciences, University of Bristol, Bristol BS8 1RJ, UK b School of Ocean

Benton, Michael

202

Brine and Gas Flow Patterns Between Excavated Areas and Disturbed Rock Zone in the 1996 Performance Assessment for the Waste Isolation Pilot Plant for a Single Drilling Intrusion that Penetrates Repository and Castile Brine Reservoir  

SciTech Connect (OSTI)

The Waste Isolation Pilot Plant (WIPP), which is located in southeastern New Mexico, is being developed for the geologic disposal of transuranic (TRU) waste by the U.S. Department of Energy (DOE). Waste disposal will take place in panels excavated in a bedded salt formation approximately 2000 ft (610 m) below the land surface. The BRAGFLO computer program which solves a system of nonlinear partial differential equations for two-phase flow, was used to investigate brine and gas flow patterns in the vicinity of the repository for the 1996 WIPP performance assessment (PA). The present study examines the implications of modeling assumptions used in conjunction with BRAGFLO in the 1996 WIPP PA that affect brine and gas flow patterns involving two waste regions in the repository (i.e., a single waste panel and the remaining nine waste panels), a disturbed rock zone (DRZ) that lies just above and below these two regions, and a borehole that penetrates the single waste panel and a brine pocket below this panel. The two waste regions are separated by a panel closure. The following insights were obtained from this study. First, the impediment to flow between the two waste regions provided by the panel closure model is reduced due to the permeable and areally extensive nature of the DRZ adopted in the 1996 WIPP PA, which results in the DRZ becoming an effective pathway for gas and brine movement around the panel closures and thus between the two waste regions. Brine and gas flow between the two waste regions via the DRZ causes pressures between the two to equilibrate rapidly, with the result that processes in the intruded waste panel are not isolated from the rest of the repository. Second, the connection between intruded and unintruded waste panels provided by the DRZ increases the time required for repository pressures to equilibrate with the overlying and/or underlying units subsequent to a drilling intrusion. Third, the large and areally extensive DRZ void volumes is a significant source of brine to the repository, which is consumed in the corrosion of iron and thus contributes to increased repository pressures. Fourth, the DRZ itself lowers repository pressures by providing storage for gas and access to additional gas storage in areas of the repository. Fifth, given the pathway that the DRZ provides for gas and brine to flow around the panel closures, isolation of the waste panels by the panel closures was not essential to compliance with the U.S. Environment Protection Agency's regulations in the 1996 WIPP PA.

ECONOMY,KATHLEEN M.; HELTON,JON CRAIG; VAUGHN,PALMER

1999-10-01T23:59:59.000Z

203

Intrusion detection and monitoring for wireless networks.  

SciTech Connect (OSTI)

Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

2005-11-01T23:59:59.000Z

204

Online Display Advertising: Targeting and Intrusiveness  

E-Print Network [OSTI]

We use data from a large-scale field experiment to explore what influences the effectiveness of online advertising. We find that matching an ad to website content and increasing an ad's obtrusiveness independently increase ...

Tucker, Catherine Elizabeth

205

Hierarchical Task Analysis of Intrusion Detection Systems  

E-Print Network [OSTI]

.......................... 4 3. Hierarchical Task Analysis ............................ 6 3.1 Network Security Administrator .................... 7 3.2 Functions of Network Security Administrator ....... 7 4. Diagrams on a single or group of persons called Network Security Administrators. They use a wide variety of tools

Blustein, J.

206

Intrusion-Tolerant Protection for Critical Infrastructures  

E-Print Network [OSTI]

of an organization in the face of accidents and attacks. How- ever, they are not simple firewalls but distributed]. In recent years these systems evolved in several aspects that greatly increased their exposure to cyber-attacks, a critical information infrastructure is formed by facilities, like power transformation substations or cor

Neves, Nuno

207

Non-intrusive Termination of Noisy Optimization ?  

E-Print Network [OSTI]

May 31, 2011 ... U.S. Department of Energy, under Contract DE-AC02-06CH11357. ... Computer Science Division, Argonne National Laboratory, Argonne, IL 60439. ..... determine when continuing with the present course is likely wasteful as ...

2011-07-20T23:59:59.000Z

208

Intrusion Recovery Using Selective Re-execution  

E-Print Network [OSTI]

RETRO repairs a desktop or server after an adversary compromises it, by undoing the adversary's changes while preserving legitimate user actions, with minimal user involvement. During normal operation, RETRO records an ...

Kim, Taesoo

209

Disruptive event analysis: volcanism and igneous intrusion  

SciTech Connect (OSTI)

An evaluation is made of the disruptive effects of volcanic activity with respect to long term isolation of radioactive waste through deep geologic storage. Three major questions are considered. First, what is the range of disruption effects of a radioactive waste repository by volcanic activity. Second, is it possible, by selective siting of a repository, to reduce the risk of disruption by future volcanic activity. And third, can the probability of repository disruption by volcanic activity be quantified. The main variables involved in the evaluation of the consequences of repository disruption by volcanic activity are the geometry of the magma-repository intersection (partly controlled by depth of burial) and the nature of volcanism. Potential radionuclide dispersal by volcanic transport within the biosphere ranges in distance from several kilometers to global. Risk from the most catastrophic types of eruptions can be reduced by careful site selection to maximize lag time prior to the onset of activity. Certain areas or volcanic provinces within the western United States have been sites of significant volcanism and should be avoided as potential sites for a radioactive waste repository. Examples of projection of future sites of active volcanism are discussed for three areas of the western United States. Probability calculations require two types of data: a numerical rate or frequency of volcanic activity and a numerical evaluation of the areal extent of volcanic disruption for a designated region. The former is clearly beyond the current state of art in volcanology. The latter can be approximated with a reasonable degree of satisfaction. In this report, simplified probability calculations are attempted for areas of past volcanic activity.

Crowe, B.M.

1980-08-01T23:59:59.000Z

210

Inverse Modeling for Coastal Seawater Intrusion  

E-Print Network [OSTI]

, USA) #12;INTRODUCTION · Inverse modeling ­ standard tool for groundwater modeling ­ uncommonD3D.1 ­ 2D and 3D finite-element code for simulating variable-density groundwater problems · UCODE 3 and given time (i.e. at one observation location) on one of the parameters in the groundwater model

Politècnica de Catalunya, Universitat

211

assemblage copepoda crustacea: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an...

212

assemblage combustible nucleaire: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an...

213

LATE ORDOVICIAN CLIMBING DUNE ASSEMBLAGES, THE SIGNATURE OF GLACIAL OUTBURST ?  

E-Print Network [OSTI]

, jean-loup.rubino@total.com 4NOC, Libya, Y-Boujazia@yahoo.com Meltwater-related processes have long been of the Western Murzuq Basin/ Tassili n'Ajjer area (southern Libya ­ Algeria boundary), this presentation aims

Paris-Sud XI, Université de

214

The assemblage of exchange : housing, industry and the potential mall  

E-Print Network [OSTI]

This thesis is interested in examining a contemporary generative method for approaching design in urban areas. It considers the levels of interactions in the city in which the questions of architecture are clearly affected ...

Eng, Ronald J. (Ronald Jan)

1994-01-01T23:59:59.000Z

215

Fish assemblages on coral reefs in Guanaja, Bay Islands, Honduras  

E-Print Network [OSTI]

reefs that support a wide variety of habitats, a rich ichthyofauna, and one of the highest coral diversities found in the Caribbean, Guanaja is one of Honduras' major eco-tourism destinations. Coral bleaching, a phenomena initially documented in 1931...

Mahendran, Christopher Kandiah

2012-06-07T23:59:59.000Z

216

Analysis of the Pass Cavallo shipwreck assemblage, Matagorda Bay, Texas  

E-Print Network [OSTI]

at Goliad. The vessel wrecked at the entrance of the historic Pass Cavallo while evading capture from a Mexican brig-of-war in November of 1835....

Borgens, Amy Anne

2004-09-30T23:59:59.000Z

217

The analysis and conservation of the Belle footwear assemblage  

E-Print Network [OSTI]

Nautical archaeology can be loosely defined as the study of the material remains of ships and their contents as a component of a broader cultural system. The oceans and lakes of the world are replete with shipwrecks from all eras, and these sites...

Randolph, Anthony G., Jr

2003-01-01T23:59:59.000Z

218

LATE ORDOVICIAN CLIMBING DUNE ASSEMBLAGES : THE SIGNATURE OF GLACIAL OUTBURST?  

E-Print Network [OSTI]

· Channel axis SW-NE · 4 internal erosion-based subunits Wadi Inlalen example · Steady & uniform · Lower · Transfert toward adjacent eddy-related side bars Smaller scale analogue channel in modern wadi sandy flood · In places, accretion surfaces Wadi Aramat & Alun example Depositional facies Depositional model · Unconfined

Paris-Sud XI, Université de

219

ant dispersal assemblages: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

surface) with numerous colonies of the ascidian Diazona violacea, and the polychaete Sabella pavonina. This study highlights, also for a Mediterranean seamount, the potential...

220

Shipboard fluid system diagnostics using non-intrusive load monitoring  

E-Print Network [OSTI]

Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

Mitchell, Gregory R. (Gregory Reed)

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Intrusion Detection in Realtime Database Systems Via Time Signatures*  

E-Print Network [OSTI]

as ``normal'' transactions, and compare the ability of different numerically quantifiable measures to capture. Introduction In a real­time database system, transactions often have timing constraints. Transactions must meet their timing constraints, often expressed as deadlines, in order to be correct and useful. In stock market

Son, Sang H.

222

A Multi-Dimensional approach towards Intrusion Detection System  

E-Print Network [OSTI]

Sanyal School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India detection. Network and system usage parameters like source and destination IP addresses; source of abnormality in the system usage with respect to that dimension. This mature function is referred

Sanyal, Sugata

223

Intrusive Galerkin methods with upwinding for uncertain nonlinear hyperbolic systems  

SciTech Connect (OSTI)

This paper deals with stochastic spectral methods for uncertainty propagation and quantification in nonlinear hyperbolic systems of conservation laws. We consider problems with parametric uncertainty in initial conditions and model coefficients, whose solutions exhibit discontinuities in the spatial as well as in the stochastic variables. The stochastic spectral method relies on multi-resolution schemes where the stochastic domain is discretized using tensor-product stochastic elements supporting local polynomial bases. A Galerkin projection is used to derive a system of deterministic equations for the stochastic modes of the solution. Hyperbolicity of the resulting Galerkin system is analyzed. A finite volume scheme with a Roe-type solver is used for discretization of the spatial and time variables. An original technique is introduced for the fast evaluation of approximate upwind matrices, which is particularly well adapted to local polynomial bases. Efficiency and robustness of the overall method are assessed on the Burgers and Euler equations with shocks.

Tryoen, J., E-mail: tryoenj@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France); LIMSI-CNRS, 91403 Orsay cedex (France); Le Maitre, O., E-mail: olm@limsi.f [LIMSI-CNRS, 91403 Orsay cedex (France); CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ndjinga, M., E-mail: michael.ndjinga@cea.f [CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ern, A., E-mail: ern@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France)

2010-09-01T23:59:59.000Z

224

Policy-controlled Event Management for Distributed Intrusion Detection  

E-Print Network [OSTI]

building blocks for the formulation of a site's security policy since its conception. A recent addition

Sommer, Robin

225

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection  

E-Print Network [OSTI]

of network packets in order to detect attacks and, more generally, violations of a site's security pol- icy

Sommer, Robin

226

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network [OSTI]

also challenges network administrators to deal with identitya fact of life for network administrators. Detecting attackscan help the network administrator tell whether the current

Xu, Jing

2010-01-01T23:59:59.000Z

227

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network [OSTI]

3 for more details). The ESS for any variable X in a CTBNwhen event P i can happen. The ESS we need are M P i |U Pi :occur when U = U p i , the ESS M P i |U Pi is just M P i ,

Xu, Jing

2010-01-01T23:59:59.000Z

228

anomaly intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Creation via Clustering Anomalies Gilbert R. Hendry and Shanchieh J. Yang apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work...

229

Minimizing Intrusiveness in Home Energy Measurement David Lachut  

E-Print Network [OSTI]

to carefully monitor energy supply and past energy consumption, however, using this information to drive demand and using often limited resources including energy and bandwidth. In this work, we present the design monitor energy supply and past energy consumption. Using this information to drive demand management

Rollins, Sami

230

Automatic compilation framework for Bloom filter based intrusion detection  

E-Print Network [OSTI]

the FPGA fabric of a CSoC device. In the execution model underlying ROCCC, sequential computations are carried out on the microprocessor in the CSoC, while the compute intensive code segments are mapped onto

Najjar, Walid A.

231

Automatic intrusion recovery with system-wide history  

E-Print Network [OSTI]

Compromises of our computer systems are inevitable. New software vulnerabilities are discovered and exploited daily, but even if the software is bug-free, administrators may inadvertently make mistakes in configuring ...

Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

2014-01-01T23:59:59.000Z

232

Distributed fiber optic intrusion sensor system for monitoring long perimeters  

E-Print Network [OSTI]

A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from...

Juarez, Juan C.

2009-06-02T23:59:59.000Z

233

Improving shipboard maintenance practices using non-intrusive load monitoring  

E-Print Network [OSTI]

(cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

Piber, Mark A. (Mark Augustin)

2007-01-01T23:59:59.000Z

234

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...  

Energy Savers [EERE]

traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE...

235

Methods for non-intrusive sensing and system monitoring  

E-Print Network [OSTI]

Improving the efficiency of collection, transmission, and consumption of resources is the focus of a wide swath of engineering research. Current technological solutions for capturing or mitigating energy and resource waste ...

Schantz, Christopher James

2014-01-01T23:59:59.000Z

236

Non-Intrusive Electric Load Monitoring in Commercial Buildings  

E-Print Network [OSTI]

, W.T.; Cameron, lR. and Dow, A.B. 1988. "On line diagnostics of large induction motors." Vibrations and Audible Noise in Alternating Current Machines, Belmans, R.; Binns, K.; Geysen, W.; and Vandenput, A., eds. Kluwer Academic Publishers. 140... review of elecnic motor literature indicated that samples of elecnical current taken at slightly faster than twice the 60 Hz fundamental can be used to detect several indicators of incipient motor failure. Tests were initiated to determine whether...

Norford, L. K.; Mabey, N.

237

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network [OSTI]

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

238

Intrusion Detecting Using Secure Signatures - Energy Innovation Portal  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared LandResponses to EngineeredADepartment of1999Two SignElectricity

239

Intrusion Margins and Associated Fractures | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (bot load)InternationalRenewable Energy Council

240

CV-1b: Magmatic - Intrusive | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin: EnergyBoston Areais3: Crystalline Rock -COPPE IncubatorCSU -b: Magmatic -

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U.S. Department of Energy (DOE) Technical Assistance to Beichuan Reconstruction: Creating and Designing Low- to Zero-carbon Communities in New Beichuan, Sichuan Province  

E-Print Network [OSTI]

systems and energy-efficient designs often need smaller HVACdesign and construction process for energy-efficient

Xu, Tengfang

2010-01-01T23:59:59.000Z

242

An Intelligent Tutor for Intrusion Detection on Computer Systems An Intelligent Tutor for Intrusion Detection on Computer Systems  

E-Print Network [OSTI]

and not especially common, practice with simulators is valuable. Simulators can efficiently drill students on rare-recognition rules to itself infer the problems, planning methods to figure how best to fix them, plan

243

Acculturation in the Upper Middle Missouri Valley as Reflected in Modified Bone Assemblages  

E-Print Network [OSTI]

to the Pacific coast. The site is adjacent to the Knife River and has been partially destroyed by cutbank erosion, but recent construction of an erosion-resistant berm beneath the cutbank has ensured its continued preservation. The Big Hidatsa site... culture of the 18th and 19th centuries. Prior to contact, the villagers were already involved in a wide ranging aboriginal trade network with established links stretching as far as the Pacific coast. Euro-American traders used these trade networks...

Weston, Timothy

1986-05-01T23:59:59.000Z

244

Authenticity, Authority, and Assemblage Masculinity: Geek Identity and Hardware Production in Networked Spaces  

E-Print Network [OSTI]

firearm legislation and the politics of the group specifically has clearly been affected by the group’s appropriation of 3D printing

Ross, Ian W.

2014-01-01T23:59:59.000Z

245

The analysis of the Conde de Tolosa and the Nuestra Senora de Guadalupe olive jar assemblage  

E-Print Network [OSTI]

recovered in the New World. Analysis of these containers imparts a wealth of information critical to the understanding of this widely used and diffused ceramic type. Besides revealing a previously unreported form the study suggests needed changes in both.... A. , for his time and trouble with maps, provenience and general information; to all the people of the Domincan Republic for their buenas aventuras and smiles given during our stay on the island; to all my friends, colleagues and professors, who...

James, Stephen Robert

1985-01-01T23:59:59.000Z

246

Changes in species assemblages and diets of Collembola along a gradient of metal pollution  

E-Print Network [OSTI]

pollution. Keywords: Collembolan communities, Heavy metals, Gut contents 1. Introduction * Corresponding.1016/S0929-1393(02)00134-8 #12;2 Pollution by heavy metals, due to smelter, mining or agricultural the hypothesis that soil animal communities sampled along a gradient of heavy metal pollution show a) shifts

Paris-Sud XI, Université de

247

ORIGINAL PAPER Small-scale gold mining erodes fish assemblage structure  

E-Print Network [OSTI]

, and heavy metal pollution (Cleary 1990). Freshwater ecosystems are particularly impacted by these mining

Grenouillet, Gael

248

Aquatic Vertebrate Assemblages in the Middle Trinity River Basin, with Emphasis on Turtles  

E-Print Network [OSTI]

between the two study sites, turtle species richness decreased, whereas habitat overlap between species increased. I analyzed the capture efficiency of 7 trap types used throughout the course of this project and found that effectiveness of each trap type...

Riedle, Jimmy

2014-05-03T23:59:59.000Z

249

Integrated metatranscriptomic and metagenomic analyses of stratified microbial assemblages in the North Pacific Subtropical Gyre  

E-Print Network [OSTI]

As part of an ongoing survey of microbial community gene expression in the ocean, we sequenced and compared ~38?Mbp of community transcriptomes and ~157?Mbp of community genomes from four bacterioplankton samples, along a ...

Shi, Yanmei

250

Citizen Science System Assemblages: Understanding the Technologies that Support Crowdsourced Science  

E-Print Network [OSTI]

how different citizen science functionalities may lead to successful project outcomes. Four detailed case studies of current citizen science projects encompassing a cross- section of varying project sizes]. Sometimes described as crowdsourced science, citizen science projects include (for example) those that ask

Crowston, Kevin

251

Discordance between living and death assemblages as evidence for anthropogenic ecological change  

E-Print Network [OSTI]

'' in settings of documented anthropogenic eutrophication (AE) than in areas where AE and other human impacts with eutrophication (anomalous abundance of seagrass-dwellers and/or scarcity of organic-loving species in the death. ecological baseline eutrophication marine communities paleoecology Human activities affect living systems

Boyce, C. Kevin

252

------. 1980. Avian feeding assemblages in Puerto Rico. Carib. J. Sci. 15:21-27.  

E-Print Network [OSTI]

Rico, Mayaguez Notes on the Ecology and Behavior of Anolis cuvieri (Lacertilia: Iguanidae) in Puerto, Center for Energy and Environment Research, Terrestrial Ecology Di- vision, G.P.O. Box 3682, San Juan the summer of 1988, on movement patterns, home range, and diet of the "lagarto verde" in the Luquillo

Losos, Jonathan B.

253

Changes in seagrass polychaete assemblages after invasion by Caulerpa racemosa var. cylindracea  

E-Print Network [OSTI]

, si bien algunas de especies coincidentes difieren claramente en abundancia. La biomasa de C. racemosa

Martin, Daniel

254

UNCORRECTEDPROOF 1 Fecundity determines the extinction threshold in a Canadian assemblage  

E-Print Network [OSTI]

suggested to have negative effects on forest species. We determined 13 the extinction threshold for 12, species caught moving outside forest habitat had lower extinction thresholds than 19 species not caught habitat loss affects the 39extinction risk of different species is therefore an 40important part

Holland, Jeffrey

255

Authenticity, Authority, and Assemblage Masculinity: Geek Identity and Hardware Production in Networked Spaces  

E-Print Network [OSTI]

his seminal text on media fandom Textual Poachers, discussesbe associated with the levels of fandom seen in the kinds oforiented digital sites of fandom that I discuss throughout

Ross, Ian W.

2014-01-01T23:59:59.000Z

256

Dynamics of larval fish assemblages over a shallow coral reef in the Florida Keys  

E-Print Network [OSTI]

J. Fortuna Ã? K. Grorud Ã? T. Lee Communicated by P.W. Sammarco, Chauvin S. Sponaugle (&) Ã? J. Fortuna

Sponaugle, Su

257

E-Print Network 3.0 - assemblages honoring professor Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

gives me the incentive to get to know some of my professors... Ira A. Fulton School of Engineering Honors Students leadership creativity motivation teamwork... .727.8713 "Being...

258

Evaluation of the paraphyletic assemblages within Lonchophyllinae, with description of a new tribe and genus  

E-Print Network [OSTI]

UM of texas tech University Table 1. Karyotype data obtained from the literature or described herein. Locality data are provided when available. Abbreviations are: L. = Lonchophylla, H. = Hsunycteris, 2N = diploid number, FN = fundamental number, Suriname... = Republic of Suriname. Gardner (1977) did not include a figure of his karyotype, therefore we were unable to determine whether Peruvian and Republic of Suriname individuals of H. thomasi had identical karyotypes. Species Karyotype Locality of Karyotype...

Parlos, Julie A.; Timm, Robert M.; Swier, Vicki J.; Zeballos, Horacio; Baker, Robert J.

2014-01-28T23:59:59.000Z

259

Architectural intensification : patterns of use and construction assemblage as opportunity for elaboration  

E-Print Network [OSTI]

The loss of small scale elements and the lack of opportunity for personal elaboration has been an area of failure in contemporary buildings . These small scale elements are essential in providing human scale, enabling ...

Treister, Charles

1981-01-01T23:59:59.000Z

260

Ecology of the predator assemblage affecting nest success of passerines in Sierra Nevada, California  

E-Print Network [OSTI]

were surveyed since 1997 (15 from 1997 to 2006, plus 6 added in 2003). My study areas were located in montane meadows in central Sierra Nevada, California, USA, including El Dorado, Placer, Nevada, and Sierra counties. The area presents a... the line intercept method (Bonham 1989), using a pole (200 cm tall ? 1.25 cm diameter). I took measurements every 3 meters, including vegetation type, as each species of plant that touched the pole (willow, other shrub species, grass/forbs, aspen, alder...

Cocimano, Maria C.

2010-07-14T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Effects of Grassland Restoration on Avian Assemblage Characteristics and Dickcissel Nesting Success in Texas  

E-Print Network [OSTI]

?2008. C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s W a s h i n g t on 34 0 0. 81 W a s h i n g t on 29 0. 43 0. 69 N a v a r r o 34 0. 13 0. 82 C ol or a do 29 0. 3 0. 8 N a... v a r r o 32 0. 11 0. 63 A n de r s on 26 .6 0. 11 0. 77 N a v a r r o 29 .7 0. 04 0. 84 N a v a r r o 22 .5 0. 18 0. 75 N a v a r r o 24 .5 0. 26 0. 74 N a v a r r o 21 .9 0. 6 0. 32 N a v a r r o 18 .4 0. 33 0. 72 N a v a r r o 17 .6 0. 31 0. 76 N...

Lituma, Christopher M.

2010-07-14T23:59:59.000Z

262

Benthic Assemblage Variability in the Upper San Francisco Estuary: A 27-Year Retrospective  

E-Print Network [OSTI]

which lead from the Pacific Ocean to an inland river delta,San Joaquin River Pacific Ocean 10 m 16 km Water Export

Peterson, Heather A; Vayssieres, Marc

2010-01-01T23:59:59.000Z

263

Effects Of Sea Otter Colonization On Soft-Sediment Intertidal Prey Assemblages In Glacier Bay, Alaska  

E-Print Network [OSTI]

al. 2012). In mixed or unconsolidated substrate habitats (rocky-reef and mixed or unconsolidated substrate habitat hasrocky substrate and unconsolidated environments highlights

Weitzman, Benjamin Phillip

2013-01-01T23:59:59.000Z

264

Analysis of the Black-capped Vireo and White-eyed Vireo Nest Predator assemblages  

E-Print Network [OSTI]

Predation is the leading cause of nest failure in songbirds. My study identified nest predators of black-capped vireos and white-eyed vireos, quantified the activity of potential predator species, examined the relationships between vegetation...

Conkling, Tara J.

2011-08-08T23:59:59.000Z

265

E-Print Network 3.0 - assemblage growth rate Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

J. - Department of Zoology, University of Oklahoma Collection: Biology and Medicine ; Environmental Sciences and Ecology 6 Crustal architecture of SW Yukon, northern...

266

Effects of an introduced predator on the native fish assemblage in the Devils River, Texas  

E-Print Network [OSTI]

in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved as to style and content by: Kirk O. Winemiller (Chair of Committee) (Fary Garrett (Member) Frances elwick (Member) Merrill Sweet (Member) Robert D. Brown... of attaining my Master's degree. I would also like to recognize the efforts of the rest of my advisory committee, Dr. Frances Gelwick, Dr. Gary Garrett, and Dr. Merrill Sweet. Each member was invaluable by providing advice and answering numerous questions...

Robertson, Michael Shard

1999-01-01T23:59:59.000Z

267

Composition, structure, and habitat associations of fish assemblages of the Dolan Falls Preserve  

E-Print Network [OSTI]

at which their survival is threatened (Hubbs and Garrett 1990). Moreover, the introduction of species like Micropterus dolomieu (smallmouth bass), Morone chrysops (white bass), and Lepomis aurirus (yellowbreast sunfish) could lead to a decline... of the native endemics due to competition or predation. Over the past few decades, the Devil's River has been sampled at irregular time intervals and at scattered locations, mostly well below Dolan Falls (Harrell 1974; Garrett et al. 1992). Little effort has...

Valdes Cantu, Nora Edith

1995-01-01T23:59:59.000Z

268

Fish assemblage structure along environmental gradients in a coastal plain drainage: influences from a reservoir  

E-Print Network [OSTI]

). Discharge was calculated for each stream reach every 4-7 weeks when streams were at baseflow conditions and unaffected by transitory runoff fiom storm events (Gordon et al 1992). Baseflow sampling conditions were determined by examining hydrographic... 16. 1 5, 5 10. 3 29. 5 3. 1 4. 6 3, 4 5. 1 10. 4 54 5. 5 50, 0 11. 1 5. 6 5. 6 55. 7 22. 8 2, 8 11. 8 60. 6 7. 5 5. 4 2. 2 32, 6 100, 9 3. 0 20. 0 59. 6 2, 4 8. 8 2. 7 14. 5 6. 1 -6. 9 2-14 &0. 1-0. 1 5. 9-6. 7 4...

Herbert, Matthew Earl

1999-01-01T23:59:59.000Z

269

Nutrient loading and consumers: Agents of change in open-coast macrophyte assemblages  

E-Print Network [OSTI]

of carbon emissions and nitrogen fixation) and on population size of consumers (e.g., by overfishing) can.g., estuaries, bays, and inland seas) worldwide (9). Transport of fixed inorganic nitrogen from the land.g., the Gulf of Mexico and the Baltic Sea; refs. 12 and 13). In contrast, open, wave-swept coastlines along

Nielsen, Karina J.

270

Fish Assemblages in Manistee River Tributaries: Longitudinal Distribution Analysis, Seasonal Variation, and Riparian Improvement Evaluation.  

E-Print Network [OSTI]

??Sedimentation affects both stream physical and biological integrity. Improperly designed stream passage accompanied with sedimentation and altered hydrology can impede fish passage and reduce fish… (more)

Gressick, Nicholas J.

2009-01-01T23:59:59.000Z

271

Patterns in fish assemblages and seagrass herbivory in a temperate Australian seagrass meadow.  

E-Print Network [OSTI]

??While eutrophication of coastal waters has long been attributed as a major cause of seagrass decline, there is now emerging evidence from both tropical and… (more)

White, Kirrily

2011-01-01T23:59:59.000Z

272

Panel assemblage for housing : some form and construction explorations for small buildings  

E-Print Network [OSTI]

This thesis examines the consequences of building homes in a factory and explores viable construction alternatives using factory-made panels. The exploration considers panelized systems of dwelling construction and its ...

Borenstein, David Reed

1984-01-01T23:59:59.000Z

273

The influence of littoral zone structural complexity on fish assemblages in Lake Conroe, TX  

E-Print Network [OSTI]

the centroid for Spring. Centroids for threadfin shad and yellow bass lie in an intermediate position between Spring and Summer. The centroids for black crappie (Porno@i s nigromaculatus), gizzard shad (Dorasoma cepedianum), channel catfish (Ictalurus...

Trial, Perry Felix

1999-01-01T23:59:59.000Z

274

The copper artifact assemblage from an Ottoman period shipwreck in the Red Sea  

E-Print Network [OSTI]

. . . . . 58 vIu CHAPTER Page Pots. . . . . . . . ?. . ??, . ?????, , Lids. . Basins . . . . . . . . . . . . . . . . . . . . . . , . . . , Unique Large Vessel . . Small Vessels. Dishes . Cooking Pans . Trays. . Pitchers . . Strainers...

Willis, Kathryn Ewalt

2002-01-01T23:59:59.000Z

275

Reef fish assemblages on hard banks in the northwestern Gulf of Mexico  

E-Print Network [OSTI]

f~C~ h h d banks of the northwestern Gulf based on submersible observations 106 46. Comparison of coloration characters in Holacanthus spp. and their intermediates. Totals for scores on Feddern's patterns 1, 5, and 7 (comparative data from...' Figure 1. Hard banks of the northwestern Gulf of Nexico. eO p+ O 4 cp v+ A +~+~ 0~0 ~4 ~O + ohio+ 50 50 5 Z 100 III 0 100 150 150 Figure 2. Biotic zones known to occur on the hard banks of the northwestern Gulf of Mexico. Broken bar...

Dennis, George David

1985-01-01T23:59:59.000Z

276

Summer fish assemblages in channelized and unchannelized reaches of the South Sulphur River, Texas  

E-Print Network [OSTI]

and Moss 1975; Stem and Stern 1980a, b; Schlosser 1982a, b, 1987; Lyons and Courtney 1989). Although ecologists realize that processes related to both physical disturbance and biotic interactions influence community organization (Sousa 1984b...). Moreover, spatial heterogeneity, frequency and intensity of physical disturbances, and life history attributes of stream biota must be considered (Connell 1975, 1978; Sousa 1979, 1984a, b; Strong 1983; Karr and Freemark 1983, 1985; Wiens 1984). One...

Burgess, Christine Conner

2012-06-07T23:59:59.000Z

277

An Index of Biotic Condition Based on Bird Assemblages in Great Lakes Coastal Wetlands  

E-Print Network [OSTI]

Phragmites australis tended to yield IBC values that were lower than expected based on environmental

Howe, Robert W.

278

Convergence of temperate and tropical stream fish assemblages Carla Ibaez1,2  

E-Print Network [OSTI]

, France 2 Instituto de Ecología - UMSA, Unidad de limnología, Casilla: 10077, La Paz, Bolivia 3 Cemagref sites. This divergence can be linked to differences in energy availability between temperate

Boyer, Edmond

279

Distributed Intrusion Detection Models for Mobile Ad Hoc Networks CHIN-YANG HENRY TSENG  

E-Print Network [OSTI]

feel really lucky to be his student at UC Davis. I sincerely thank to Professor Matt Bishop in the OFFICE OF GRADUATE STUDIES of the UNIVERSITY OF CALIFORNIA DAVIS Approved By: Karl N. Levitt, Chair. I am very grateful that he spent his precious time and energy for advising my works

California at Davis, University of

280

Development of real time non-intrusive load monitor for shipboard fluid systems  

E-Print Network [OSTI]

Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

Branch, Perry L. (Perry Lamar)

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

An experimental investigation of the sensitivity of a buried fiber optic intrusion sensor  

E-Print Network [OSTI]

A distributed fiber optic sensor with the ability of detecting and locating intruders on foot and vehicles over long perimeters (>10 km) was studied. The response of the sensor to people walking over or near it and to vehicles driving nearby...

Kuppuswamy, Harini

2006-04-12T23:59:59.000Z

282

Recent Approaches to Non-intrusive Load Monitoring Techniques in Residential Settings  

E-Print Network [OSTI]

the effectiveness of energy conservation efforts in residential settings without any sort of end-use energy measurement of individual energy consumption of household appliances and provision of real-time feedback to energy used by different load classes or in particular to deter operation of certain loads in residential

Sekercioglu, Y. Ahmet

283

Chemical and petrological characteristics of the intrusive rocks of the Quitman Mountains, Texas  

E-Print Network [OSTI]

of the behavior of elements in a magmatic environment. Due to the relatively small size of the Quitman intru- sion, the diversity of rock types, and the shallow depth of the source magma as evidenced by the composition and tex- ture of the rocks, it provides... faulted Creta- ceous sedimentary rocks. These Cretaceous rocks consist of some 12, 000 feet of marine shales, sandstones and limestones, and non-marine sandstones and shales. In places, volcanic rocks, mainly tuffaceous rhyolites and andesites...

Seay, Christopher Sidney

1973-01-01T23:59:59.000Z

284

Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol  

SciTech Connect (OSTI)

To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

2013-07-01T23:59:59.000Z

285

Seawater intrusion and aquifer freshening near reclaimed coastal area of Shenzhen  

E-Print Network [OSTI]

water supply system was established, and now 80% of the city's water supply is drawn from a river the fill materials may have WaterScience&Technology:WaterSupplyVol7No2pp137­145QIWAPublishing2007 137doi experienced heavy pumping since the 1980s when it began to expand very quickly from a fishing village

Jiao, Jiu Jimmy

286

Magnetotelluric evidence for layered mafic intrusions beneath the Vring and Exmouth rifted margins  

E-Print Network [OSTI]

David Myer , Steven Constable, Kerry Key Scripps Institution of Oceanography, 9500 Gilman Drive MC-0225

Constable, Steve

287

An Intrusive Super-Wideband Speech Quality Model: DIAL Nicolas C^ote1  

E-Print Network [OSTI]

´erie Gautier-Turbin2 , Alexander Raake3 , Sebastian M¨oller3 1 LISyC EA 3883, UBO/ENIB, Brest, France 2 France- tegral quality estimations as well as diagnostic information in a super-wideband context. Index Terms to an acoustic speech sig- nal. Auditory tests are the most reliable way to assess the per- ceived speech quality

Paris-Sud XI, Université de

288

A comprehensive system for non-intrusive load monitoring and diagnostics  

E-Print Network [OSTI]

Energy monitoring and smart grid applications have rapidly developed into a multi-billion dollar market. The continued growth and utility of monitoring technologies is predicated upon the ability to economically extract ...

Paris, James, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

289

Using the non-intrusive load monitor for shipboard supervisory control  

E-Print Network [OSTI]

Field studies have demonstrated that it is possible to evaluate the state of many shipboard systems by analyzing the power drawn by electromechanical actuators [1], [2], [3], [4], [5]. One device that can perform such an ...

Bennett, Patrick Lawrence

2007-01-01T23:59:59.000Z

290

Intrusive Projection Methods with Upwinding for Uncertain Nonlinear Hyperbolic Systems6  

E-Print Network [OSTI]

. Tryoen), olm@limsi.fr (O. Le Ma^itre), michael.ndjinga@cea.fr (M. Ndjinga), ern@cermics.enpc.fr (A. Ern

291

Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless  

E-Print Network [OSTI]

the tradeoff between energy consumption vs. the gain in reliability, timeliness, and security to maximize to prolong the system useful lifetime. The tradeoff between energy consumption vs. reliability gain-mail: {hhamadi, irchen}@vt.edu). (CHs) and sensor nodes (SNs) leveraging CH election protocols such as HEED [1

Chen, Ing-Ray

292

Modeling and simulation of intrusion detection system in mobile ad-hoc networks.  

E-Print Network [OSTI]

??The thesis investigates the process of modeling and simulation of the mobile ad-hoc networks. It provides a overview of the actual state of art together… (more)

Jarmal, Piotr

2008-01-01T23:59:59.000Z

293

Policy-controlled Event Management for Distributed Intrusion Detection Christian Kreibich  

E-Print Network [OSTI]

- sic building blocks for the formulation of a site's security policy since its conception. A recent

Hand, Steven

294

Foundations for Intrusion Prevention Shai Rubin, Ian D. Alderman, David W. Parter, and Mary K. Vernon  

E-Print Network [OSTI]

the vulnerability on every system host, estimates the vulnerability threat with respect to the site security develop a site­customizable threat analyzer that ranks vulnerabilities according to the site security pref

Vernon, Mary K.

295

Foundations for Intrusion Prevention Shai Rubin, Ian D. Alderman, David W. Parter, and Mary K. Vernon  

E-Print Network [OSTI]

the vulnerability on every system host, estimates the vulnerability threat with respect to the site security develop a site-customizable threat analyzer that ranks vulnerabilities according to the site security

Liblit, Ben

296

Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras  

E-Print Network [OSTI]

facilities such as water distribution infrastructures, electricity generation plants and oil refineries need industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs industry and government, leading to several efforts to increase secu- rity in these industrial networks

Paris-Sud XI, Université de

297

Fault Detection and Diagnostics for Non-Intrusive Monitoring Using Motor Harmonics  

E-Print Network [OSTI]

Harmonic analysis of motor current has been used to track the speed of motors for sensorless control. Algorithms exist that track the speed of a motor given a dedicated stator current measurement, for example. Harmonic ...

Orji, Uzoma A.

298

A survey of intrusion detection in wireless network applications Robert Mitchell, Ing-Ray Chen  

E-Print Network [OSTI]

tool that can defend against the real-world cyber attacks threatening critical systems. These attacks include the Stuxnet attack on Iranian engineering facilities [1,2], proof of concept attacks on insulin pumps [3] and cardiac devices [4], the DoS attack on a German power grid opera- tor [5

Chen, Ing-Ray

299

SMIT: Uma Arquitetura Tolerante a Intrus~oes Baseada em Virtualizac~ao  

E-Print Network [OSTI]

. Sistemas financeiros, de controle de gerac¸~ao e distribuic¸~ao de energia, de controle de dispositivos a necessidade de, no m´inimo, 3f + 1 r´eplicas para tolerar faltas bizantinas [Lamport et al. 1982

Correia, Miguel

300

Modelling of Seawater Intrusion in Coastal Area of North Goa C. P. Kumar*  

E-Print Network [OSTI]

) Introduction India has been blessed with a vast stretch of coastline. Many urban centres of the country. National Water Policy ­ 2002 also stresses that "Over exploitation of ground water should be avoided river and Nerul creek (around 74 km2 ) and covered by Survey of India toposheets number 48E/10, 48E/14

Kumar, C.P.

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Learning Cost-Sensitve Classification Rules for Network Intrusion Detection using RIPPER  

E-Print Network [OSTI]

to the information gain function is as follows: (2^Gain - 1) / (Cost(A)) + 1)^w. Here, a cost-sensitivity constant (w

Yang, Junfeng

302

Non-Intrusive Occupancy Monitoring using Smart Meters Dong Chen, Sean Barker, Adarsh Subbaswamy  

E-Print Network [OSTI]

Based on recent estimates, commercial and residential buildings continue to account for 75% of the electricity usage in the United States [23], with residential buildings alone accounting for nearly 45%.1 As a result, improving building energy-efficiency is becom- ing an increasingly important research area. One

Shenoy, Prashant

303

Thermal Constraints on the Emplacement Rate of a Large Intrusive Complex: The Manaslu Leucogranite, Nepal  

E-Print Network [OSTI]

, Nepal Himalaya. C. ANNEN1*, B. SCAILLET2 AND R. S. J. SPARKS3 1 SECTION DES SCIENCES DE LA TERRE The emplacement of the Manaslu leucogranite body (Nepal, Himalaya) has been modelled as the accretion

Paris-Sud XI, Université de

304

Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems  

E-Print Network [OSTI]

Security protocols against cyber attacks in the distributioncyber security weak- ness and system fragility of power distribution

Parvania, Masood; Koutsandria, Georgia; Muthukumar, Vishak; Peisert, Sean; McParland, Chuck; Scaglione, Anna

2014-01-01T23:59:59.000Z

305

An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks  

E-Print Network [OSTI]

University of California, Santa Barbara {vigna,sumitg,kavitha,ebelding,kemm}@cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy the stream of audit data to identify evidence of the occurrence of the modeled attacks. Misuse and anomaly

California at Santa Barbara, University of

306

An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks  

E-Print Network [OSTI]

University of California, Santa Barbara vigna,sumitg,kavitha,ebelding,kemm¡ @cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy "signatures") that are matched against the stream of audit data to identify evidence of the oc- currence

Belding-Royer, Elizabeth M.

307

Study of Kinematics of Extreme Waves Impacting Offshore and Coastal Structures by Non Intrusive Measurement Techniques  

E-Print Network [OSTI]

from G3 appears to induce a large inundation depth in the flow along the opening. Next, green water velocities and dynamic impacts of the extreme ocean waves on a fixed offshore deck structure are investigated. The experiments focused on the impacting...

Song, Youn Kyung

2013-11-07T23:59:59.000Z

308

E-Print Network 3.0 - active non-intrusive inspection Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of the main activities that take place... ... Source: Texas A&M University, Texas Transportation Institute Collection: Engineering 17 Technical Report Documentation Page 1. Report...

309

The design of an intrusion security system using digital processing for alarm indication  

E-Print Network [OSTI]

has been noise spikes in the diode. These spikes can easily cause a false alarm which is difficult to trace since it results from a sporadic, elec- tronic malfunction. General Electric, Amperex, and other concerned companies have made a great... is the requirement of multiple triggering of this one threshold. AMF Inc. , Alexandria, Virginia, has recently introduced an intricate signal processor with diode transistor logic and transistor transistor logic integrated circuits to handle intru- sion signals...

Holyoak, Joel Nelson

2012-06-07T23:59:59.000Z

310

Intrusion of radioactive industrially polluted water from North Sea into central Baltic Sea  

SciTech Connect (OSTI)

The problem of penetration of radioactive industrially polluted water into the central Baltic Sea was studied. The content of Cs-134 as determined in water near the bottom of deep water trenches along the path traveled by North Sea water entering the Baltic. Samples were taken at 5 locations, with Cs-134 concentrated from samples of several thousands of liters. It was found that radioactive pollution caused by the entry of water from the North Sea extends through the system of deep water depressions into the Baltic as far as the Gotland trench. The greatest degree of contamination is found in the Arkona depression adjacent to the straits. The concentration of Cs-134 in the Gdansk trench is one-half as great and in the Gotland trench one-third as great as in the Arkona depression. Radioactive contamination in the Baltic is attributed to discharge of radioactive wastes by plants at Windscale.

Vakulovskiy, S.M.; Nikitin, A.I.

1985-02-01T23:59:59.000Z

311

Oxygen isotopic disequilibrium in plagioclasecorundumhercynite xenoliths from the Voisey's Bay Intrusion, Labrador, Canada  

E-Print Network [OSTI]

Oxygen isotopic disequilibrium in plagioclase­corundum­hercynite xenoliths from the Voisey's Bay to skeletal. Ion microprobe analyses indicate that oxygen isotopic equilibrium was neither established during corundum is characterized by 18 O values between 2.5 and 7.6. Oxygen isotopic equilibration with mantle

312

Design and testing of a non-intrusive torque measurement system  

E-Print Network [OSTI]

rpm conditions. Two sensor types, phototransistor and photodiode, were tested. The photodiode sensor was tested with two emitter types: infrared LED and red laser. No significant difference in response was found using either the LED or red laser...

Wilson, Edwin Ernest

1998-01-01T23:59:59.000Z

313

An Outcrop Example of Large-scale Conglomeratic Intrusions Sourced from  

E-Print Network [OSTI]

. Cartwright, eds., Sand injectites: Implications for hydrocarbon exploration and production: AAPG Memoir 87, p, it is probable that the highly energetic process in- volved gas charging of the source body and, potentially remobilization of clastic material through injection processes adds complexity to both facies dis- tribution

314

Electric load information system based on non-intrusive power monitoring  

E-Print Network [OSTI]

Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

Lee, Kwangduk Douglas, 1970-

2003-01-01T23:59:59.000Z

315

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94:Service

316

Non-Intrusive Cognitive Radio Networks based on Smart Antenna Technology  

E-Print Network [OSTI]

--Cognitive radio has recently been identified as a po- tential relief to spectrum scarcity by improving temporal and applications has made radio spectrum an increasingly scarce commodity. The need for higher spectral efficiency reported [1], [2], a large proportion of the licensed spectrum remain mostly unused or under

Liu, Xin

317

Non-intrusive vibration monitoring in US Naval and US Coast Guard ships  

E-Print Network [OSTI]

In 2011, the Laboratory for Electromagnetic and Electronic Systems proposed a new type of vibration monitoring system, entitled vibration assessment monitoring point with integrated recovery of energy or VAMPRIE, in their ...

Gerhard, Katherine Leigh

2013-01-01T23:59:59.000Z

318

Cybersecurity testing and intrusion detection for cyber-physical power systems.  

E-Print Network [OSTI]

?? Power systems will increasingly rely on synchrophasor systems for reliable and high-performance wide area monitoring and control (WAMC). Synchrophasor systems greatly use information communication… (more)

Pan, Shengyi

2014-01-01T23:59:59.000Z

319

Experimental and numerical investigation of saltwater intrusion dynamics in flux-controlled groundwater systems  

E-Print Network [OSTI]

evidence that cli- mate change could decrease the net freshwater input to groundwater resources [Feseker in Bangladesh, threatening to physically displ

Clement, Prabhakar

320

Evaluating impacts of CO2 gas intrusion into a confined sandstone aquifer: Experimental results  

SciTech Connect (OSTI)

Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnership Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

2014-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller  

E-Print Network [OSTI]

determined prior to the schedulability analysis. We demonstrate how to provide micro-timings for multiple granularity levels of application code. Through bounds checking of these micro-timings, we develop techniques) to highly critical ones (anti-lock brakes, hydro-electric dam controls and flight control systems

Mueller, Frank

322

Local Enforcement of Appliance Efficiency Standards and Labeling Program in China: Progress and Challenges  

E-Print Network [OSTI]

lamps Electric storage water heaters Small and medium 3-storage electric water heaters, household induction cooktopsSichuan Storage electric water heaters Jiangsu Small and

Zheng, Nina

2014-01-01T23:59:59.000Z

323

Status of the Local Enforcement of Energy Efficiency Standards and Labeling Program in China  

E-Print Network [OSTI]

and electric storage water heaters were selected. Forlamps Electric storage water heaters Sichuan Shandonglamps Electric storage water heaters Small and medium 3-

Zhou, Nan

2013-01-01T23:59:59.000Z

324

Status of the Local Enforcement of Energy Efficiency Standards and Labeling Program in China  

E-Print Network [OSTI]

lamp”), and electric storage water heaters were selected.lamps Electric storage water heaters Sichuan Shandonglamps Electric storage water heaters Small and medium 3-

Zhou, Nan

2013-01-01T23:59:59.000Z

325

Preservation of exceptional vertebrate assemblages in Middle Permian fluviolacustrine mudstones of Kotel'nich, Russia: stratigraphy, sedimentology,  

E-Print Network [OSTI]

of Kotel'nich, Russia: stratigraphy, sedimentology, and taphonomy Michael J. Benton a, , Andrew J. Newell b Region 610000, Russia d School of Geography, Earth and Environmental Sciences, University of Plymouth Profsoyuznaya 123, Moscow 117997, Russia a b s t r a c ta r t i c l e i n f o Article history: Received 2 July

Benton, Michael

326

An assemblage of fragments : history, revolutionary aesthetics and global capitalism in Vietnamese/American literature, films and visual culture  

E-Print Network [OSTI]

York: Phaidon Press, 2008. Heng, Russell H. Of the State,Press and Media in Vietnam. Heng, R. H. Of the State, ForTransforming Society. Russell H. Heng, Of the State, For the

Võ, Ch'o'ng-?ài H?òng

2009-01-01T23:59:59.000Z

327

A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments  

E-Print Network [OSTI]

1964. Mass transport of sediment in the heads of ScrippsCalifornia: implications for sediment provenance. Thesis (M.1976. The unconsolidated sediment distribution on the San

Le Dantec, Nicolas

2009-01-01T23:59:59.000Z

328

A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments  

E-Print Network [OSTI]

1964. Mass transport of sediment in the heads of ScrippsCalifornia: implications for sediment provenance. Thesis (M.1976. The unconsolidated sediment distribution on the San

Le Dantec, Nicolas

2009-01-01T23:59:59.000Z

329

Comparison of benthic macroinvertebrate assemblages associated with salt marshes in low and high salinity areas of Galveston Bay  

E-Print Network [OSTI]

Two study areas in Galveston Bay, Texas were chosen to assess the species composition and abundance of benthic macroinvertebrates in salt marshes that are utilized by juvenile brown shrimp. The objectives of the study were to compare the benthic...

Pool, Suzan Samantha

1999-01-01T23:59:59.000Z

330

Character of the diatom assemblage spanning a depositional transition in the Eastern Equatorial Pacific Ocean at 6.6 Ma  

E-Print Network [OSTI]

Approximately 6.6 million years ago in the Eastern Equatorial Pacific a large increase in biogenic mass accumulation rates (MAR?s) occurred. This increased level of biogenic mass accumulation persisted until about 4.4 Ma at which time levels...

Brookshire, Brian Neville, Jr.

2005-02-17T23:59:59.000Z

331

Functional structure of ant and termite assemblages in old growth forest, logged forest and oil palm plantation in Malaysian Borneo  

E-Print Network [OSTI]

in varying stages of decay (e.g. dead wood, leaf litter and soil). They play major roles in processes such as decomposition, and nutrient and carbon cycling (Eggleton et al. 1997; Jones and Eggleton 2000; Donovan et al. 2001). Ants disperse seeds, assist soil... and accidental effects on soil and feedback loops. Appl Soil Ecol 32:153–164. doi:10.1016/j.apsoil.2005. 07.004 Klimes P, Idigel C, Rimandai M et al (2012) Why are there more arboreal ant species in primary than in secondary tropical forests? J Animal Ecol 81...

Luke, Sarah H.; Fayle, Tom M.; Eggleton, Paul; Turner, Edgar C.; Davies, Richard G.

2014-07-30T23:59:59.000Z

332

Patterns of fish assemblage structure and dynamics in waters of the Savannah River Plant. Comprehensive Cooling Water Study final report  

SciTech Connect (OSTI)

Research conducted as part of the Comprehensive Cooling Water Study (CCWS) has elucidated many factors that are important to fish population and community dynamics in a variety of habitats on the Savannah River Plant (SRP). Information gained from these studies is useful in predicting fish responses to SRP operations. The overall objective of the CCWS was (1) to determine the environmental effects of SRP cooling water withdrawals and discharges and (2) to determine the significance of the cooling water impacts on the environment. The purpose of this study was to: (1) examine the effects of thermal plumes on anadromous and resident fishes, including overwintering effects, in the SRP swamp and associated tributary streams; (2) assess fish spawning and locate nursery grounds on the SRP; (3) examine the level of use of the SRP by spawning fish from the Savannah River, this objective was shared with the Savannah River Laboratory, E.I. du Pont de Nemours and Company; and (4) determine impacts of cooling-water discharges on fish population and community attributes. Five studies were designed to address the above topics. The specific objectives and a summary of the findings of each study are presented.

Aho, J.M.; Anderson, C.S.; Floyd, K.B.; Negus, M.T.; Meador, M.R.

1986-06-01T23:59:59.000Z

333

Reconstructing the Assemblage of Iron Artifacts from the Late Hellenistic Shipwreck at K?z?lburun, Turkey  

E-Print Network [OSTI]

Artifacts found within the context of a shipwreck offer valuable insight into specific events surrounding a vessel’s journey and also have broader implications regarding the time period of the ship’s sinking. A collection of iron objects, excavated...

Rash, Kimberly 1981-

2012-11-27T23:59:59.000Z

334

Fish Assemblage and Food Web Structure in Whedos (Shallow Floodplain Habitats) of the Oueme River, West Africa  

E-Print Network [OSTI]

In the Oueme River, a lowland river in Benin, Africa, artificial ponds constructed in the floodplain (whedos) are colonized during the high-water period by a presumably random sample of fishes from the river channel. As water slowly recedes from...

Jackson, Andrew

2012-10-19T23:59:59.000Z

335

Species Assemblage Structure and Ecomorphological Convergence in Perciform Fishes (Cichlidae and Centrarchidae) in Tropical and Temperate Floodplain Rivers  

E-Print Network [OSTI]

Lee, Shuang Liu). My research in Venezuela was carried out thanks to amazing people and lab technician in the Museo de Ciencias Naturales Guanare. I would like to thank the vii valuable help I received in the field from Alexis Medina, Pablo... where they were examined and measured. Voucher specimens were archived in the Museo de Ciencias Naturales at 15 UNELLEZ Guanare, Venezuela, and the Texas Cooperative Wildlife Collection at Texas A&M University, Texas, USA. Morphological traits...

Montana, Carmen 1976-

2012-08-16T23:59:59.000Z

336

Evaluating Flake Assemblage and Stone Tool Distributions at a Large Western Stemmed Tradition Site Near Yucca Mountain, Nevada  

E-Print Network [OSTI]

community above 1,200 m. (Beatley 1976). Temperatures fluc-in Anthrofwlogy No. 4. Beatley, Janice 1976 Vascular Plants

Haynes, Gregory M

1996-01-01T23:59:59.000Z

337

A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments  

E-Print Network [OSTI]

high societal impacts (Beatley et al. 2002). Slope failuresof Civil Engineers, New York Beatley T, Brower D, Schwab A (

Le Dantec, Nicolas

2009-01-01T23:59:59.000Z

338

A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments  

E-Print Network [OSTI]

high societal impacts (Beatley et al. 2002). Slope failuresof Civil Engineers, New York Beatley T, Brower D, Schwab A (

Le Dantec, Nicolas

2009-01-01T23:59:59.000Z

339

An assemblage of fragments : history, revolutionary aesthetics and global capitalism in Vietnamese/American literature, films and visual culture  

E-Print Network [OSTI]

Films in the late 1980s and 1990s were created in the context of the failure of agricultural andagricultural work. In the last sequence of shots, the film

Võ, Ch'o'ng-?ài H?òng

2009-01-01T23:59:59.000Z

340

A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments  

E-Print Network [OSTI]

Henry, M.J. , 1976. The unconsolidated sediment distributionWaggoner, J.A. , 1979. Unconsolidated shelf sediments in theconsiders the behavior of unconsolidated sediments below the

Le Dantec, Nicolas

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments  

E-Print Network [OSTI]

Henry, M.J. , 1976. The unconsolidated sediment distributionWaggoner, J.A. , 1979. Unconsolidated shelf sediments in theconsiders the behavior of unconsolidated sediments below the

Le Dantec, Nicolas

2009-01-01T23:59:59.000Z

342

Reduction Assemblage Models in the Interpretation of Lithic Technology at the Tosawihi Quarries, North-Central Nevada  

E-Print Network [OSTI]

Technology at the Tosawihi Quarries, North-Central Nevada Wfrom the Tosawihi Chert Quarries illustrate how rep-data. The Tosawihi quarries are a source of white chert (

Bloomer, William W.

1991-01-01T23:59:59.000Z

343

Revisiting Copano Bay, Texas: an exceptional long-term record of ecological communities and their associated death assemblages  

E-Print Network [OSTI]

metrics for the 2004-2005 and 1981-1982 datasets for genera (A) and species (B)........................................ 34 x LIST OF FIGURES FIGURE Page 1 Location map... Calnan (1980) and the 2004-2005 dataset (total inertia =2.60; percents reflect fraction of total inertia) and (B) Circles mark the 2004-2005 sites related to Calnan?s (1980) sites...

Ebnother, Danielle Dawn

2006-10-30T23:59:59.000Z

344

Patterns in Functional Structure and Diversity of Stream Fish Assemblages Related to Environmental Factors at Multiple Scales  

E-Print Network [OSTI]

, Rob Powell, Kevin Baker, Ada Szczepaniec, Sunny Scobell, and Machteld Verzijden. My research in Mexico was carried out thanks largely to my amazing colleagues at El Colegio de la Frontera Sur in Villahermosa, Tabasco and San Crist?bal de las Casas..., Chiapas. Dr. Manuel Mendoza-Carranza helped me design and carry out field work in Tabasco. Drs. Roc?o Rodiles-Hern?ndez and Alfonso Gonz?les-D?az provided their incredible expertise and field assistance in Chiapas. I would also like to thank...

Pease, Allison Ann

2011-02-22T23:59:59.000Z

345

Parental responses of hispid cotton rats (Sigmodon hispidus) to intrusion by red imported fire ants (Solenopsis invicta) into simulated nests  

E-Print Network [OSTI]

postedp' A t (S~lo sbl lets) t Sl RRdN ts. (A g a(994) Kathleen Patricia Ferris, B. S. , Armstrong State College Chair of Advisory Committee: Dr. William E. Grant Mate al dpat a)bah I fMpld tt ts(SSi od ~li ld ) ee observed in simulated nests at 24, 72... Activit Levels. Fire ant activity levels are highly variable in response to temperature, humidity and season. Phillips and Cokendolpher (1988) found that fire ant foraging most often occurs between 20n and 32 C. In this study, all experiments were...

Ferris, Kathleen Patricia

1994-01-01T23:59:59.000Z

346

Intrusion Tolerance 18 PublishedbytheieeeComPutersoCiety1540-7993/08/$25.002008ieeeieeeseCurity&PrivaCy  

E-Print Network [OSTI]

- structures such as power, water, gas, oil, and trans- portation. Therefore, the threat is no longer against

Neves, Nuno

347

Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2012 Annual Report  

SciTech Connect (OSTI)

Progress in the second year of this project is described by the series of technical reports and manuscripts that make up the content of this report. These documents summarize successes in our goals to develop our robust image-hash templating and material-discrimination techniques and apply them to test image data.

Jarman, Kenneth D.; McDonald, Benjamin S.; Robinson, Sean M.; Gilbert, Andrew J.; White, Timothy A.; Pitts, W. Karl; Misner, Alex C.; Seifert, Allen

2012-11-01T23:59:59.000Z

348

The role of the Ord Arid Intrusion in the historical and contemporary genetic division of long-tailed finch  

E-Print Network [OSTI]

-tailed finch subspecies in northern Australia Lee Ann Rollins, Nina Svedin, Sarah R. Pryke & Simon C. Griffith, and a Postdoctoral Fellowship to Nina Svedin from the Research Council FORMAS. Received: 15 January 2012; Revised: 15

349

Boiling heat transfer in a vertical microchannel: Local estimation during flow boiling with a non intrusive method  

E-Print Network [OSTI]

Boiling heat transfer in a vertical microchannel: Local estimation during flow boiling with a non the results of experimental and numerical studies concerning boiling heat transfer inside vertical in minichannels for several gravity levels (µg, 1g, 2g). To fully understand the high heat transfer potential

350

The origin and evolution of granites: an in-situ study of zircons from Scottish Caledonian intrusions   

E-Print Network [OSTI]

Granitic magmatism in collision belts is widely regarded as a major mechanism for generating continental crust. This hypothesis can be tested by identifying the source rocks of granitic magmas, and in particular the ...

Appleby, Sarah Kristina

2008-01-01T23:59:59.000Z

351

Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis  

E-Print Network [OSTI]

Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

Luo, Dong, 1966-

2001-01-01T23:59:59.000Z

352

Non-Intrusive Load Identification for Smart Outlets Sean Barker, Mohamed Musthag, David Irwin, and Prashant Shenoy  

E-Print Network [OSTI]

@ecs.umass.edu Abstract--An increasing interest in energy-efficiency com- bined with the decreasing cost of embedded recent advances in energy-efficiency, residential and commercial buildings continue to be responsible improvements in building energy-efficiency, if implemented across many buildings, have the potential

Shenoy, Prashant

353

Parental magma of the Skaergaard intrusion: constraints from melt inclusions in primitive troctolite blocks and FG-1 dykes  

E-Print Network [OSTI]

Yb and \\20% for Er. Rare earth element compositions of theTable 2 Major- and rare earth elements concentrations in FG-the middle- to heavy-rare earth elements, expressed by Dy/Yb

2010-01-01T23:59:59.000Z

354

Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development  

E-Print Network [OSTI]

including a) LED lamp, b) incandescent lamp, c) Macbook Pro,W) a LED Lamp 15W b Incandescent Lamp 25W c Macbook 200W dLED lamp (LED) from the incandescent lamp (Lamp) and the Fan

Balakrishnan, Vikram

2013-01-01T23:59:59.000Z

355

Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 4th Keystroke Biometric Intrusion Detection  

E-Print Network [OSTI]

user has entered a specific set of data. Keylogging collects specific data about the input and method

Tappert, Charles

356

Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development  

E-Print Network [OSTI]

in and notifies the smart meter, via wireless connection orcosts. Back to our smart meters, it is easy to see howdevelopment. Modern smart meters already incorporate FPGAs

Balakrishnan, Vikram

2013-01-01T23:59:59.000Z

357

Non-Intrusive Experiemental Investigation of Multi-Scale Flow Behavior in Rod Bundle with Spacer-Grids  

E-Print Network [OSTI]

5 x 5 rod bundle with spacer-grids. Measurements were performed using two different grid designs. One typical of Boiling Water Reactors (BWR) with swirl type mixing vanes and the other typical of Pressurized Water Reactors (PWR) with split type...

Dominguez Ontiveros, Elvis Efren

2011-08-08T23:59:59.000Z

358

Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development  

E-Print Network [OSTI]

PowCap with PLC: Lookingti] “Power Line Communication (PLC) Solutions. ” http://overview.page? DCMP=plc&HQS=plc. [Tsu99] K. Tsuda. “Subspace

Balakrishnan, Vikram

2013-01-01T23:59:59.000Z

359

Single-cell genomics reveal metabolic strategies for microbial growth and survival in an oligotrophic aquifer  

SciTech Connect (OSTI)

Bacteria from the genus Pedobacter are a major component of microbial assemblages at Hanford Site and have been shown to significantly change in abundance in response to the subsurface intrusion of Columbia River water. Here we employed single cell genomics techniques to shed light on the physiological niche of these microorganisms. Analysis of four Pedobacter single amplified genomes (SAGs) from Hanford Site sediments revealed a chemoheterotrophic lifestyle, with the potential to exist under both aerobic and microaerophilic conditions via expression of both aa3­?type and cbb3-type cytochrome c oxidases. These SAGs encoded a wide-range of both intra-and extra­-cellular carbohydrate-active enzymes, potentially enabling the degradation of recalcitrant substrates such as xylan and chitin, and the utilization of more labile sugars such as mannose and fucose. Coupled to these enzymes, a diversity of transporters and sugar-binding molecules were involved in the uptake of carbon from the extracellular local environment. The SAGs were enriched in TonB-dependent receptors (TBDRs), which play a key role in uptake of substrates resulting from degradation of recalcitrant carbon. CRISPR-Cas mechanisms for resisting viral infections were identified in all SAGs. These data demonstrate the potential mechanisms utilized for persistence by heterotrophic microorganisms in a carbon-limited aquifer, and hint at potential linkages between observed Pedobacter abundance shifts within the 300 Area subsurface and biogeochemical shifts associated with Columbia River water intrusion.

Wilkins, Michael J.; Kennedy, David W.; Castelle, Cindy; Field, Erin; Stepanauskas, Ramunas; Fredrickson, Jim K.; Konopka, Allan

2014-02-01T23:59:59.000Z

360

Ya ri a bsod Collection 13  

E-Print Network [OSTI]

This collection contains fourteen songs collected in the grasslands of Amdo (northeast Tibet) in the area where Sichuan, Gansu, and Qinghai provinces meet. The songs represent various genres, and were all composed by Ya ri a bsod, an itinerant bard...

Sha bo don 'grub rdo rje; Skal dbang skyid

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

New Roads to Capitalism: China and Global Value Chains  

E-Print Network [OSTI]

two new massive petrochemical fiber plants: one in Shanghaibuild very large plants next to its new petrochemical sites.plants in Shanghai, Liaoyang, Tianjin and Sichuan, some of the major rising centers of China’s petrochemical

Dallas, Mark Peter

2010-01-01T23:59:59.000Z

362

The ma Ni Song 2  

E-Print Network [OSTI]

ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Name(s), age, sex, place of birth of performer(s) Bo... nyed. Female. Born 1954. and Song rgyas dbar sgron. Female. Born 1992 Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Language of recording Khams Tibetan Performer(s)’s first...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

363

A Threshing Song  

E-Print Network [OSTI]

, ritual) Threshing song Name of recorder (if different from collector) Zla ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan... Province, China. Name(s), age, sex, place of birth of performer(s) Bo nyed. Female. Born 1954. Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Language of recording Khams Tibetan...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

364

The ma Ni Song 1  

E-Print Network [OSTI]

ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Name(s), age, sex, place of birth of performer(s) Bo... nyed. Female. Born 1954. Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Language of recording Khams Tibetan Performer(s)’s first / native language Khams Tibetan Performer...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

365

The ma Ni Song 5  

E-Print Network [OSTI]

ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Name(s), age, sex, place of birth of performer(s) Chos... tdog. Female. Born 1984. Song rgyas dpar sgron. Female. Born 1992. Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Language of recording Khams Tibetan Performer(s)’s first...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

366

A Love Song 5  

E-Print Network [OSTI]

Name of recorder (if different from collector) Zla ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Name... (s), age, sex, place of birth of performer(s) Bo nyed. Female. Born 1954. Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Language of recording Khams Tibetan Performer(s)’s first...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

367

The ma Ni Song 3  

E-Print Network [OSTI]

ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Name(s), age, sex, place of birth of performer(s) Bo... nyed. Female. Born 1954 and Song rgyas dbar sgron. Female. Born 1992. Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Language of recording Khams Tibetan Performer(s)’s first...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

368

A Love Song 3  

E-Print Network [OSTI]

Name of recorder (if different from collector) Zla ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Name... (s), age, sex, place of birth of performer(s) Bo nyed. Female. Born 1954 Ci jo. Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Language of recording Khams Tibetan Performer(s)’s first...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

369

The influence of physicochemical factors and wind-induced resuspension on microalgal and zooplankton community assemblages in a shallow coastal embayment, South Bay, TX, USA  

E-Print Network [OSTI]

, such as predation, on the plankton communities in South Bay, Texas. Microalgal photopigments were ascertained by high-performance liquid chromatography (HPLC) to determine the relative abundances of major algal classes. Zooplankters were identified to the lowest...

Stone, Jennifer Sue

2006-08-16T23:59:59.000Z

370

Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils  

E-Print Network [OSTI]

JT (2011). Validation of heavy-water stable isotope probingdeveloped application of heavy water (H 218 O) in SIPSchwartz et al 2007). In heavy water SIP experiments, H 218

Blazewicz, Steven Joseph

2012-01-01T23:59:59.000Z

371

Explorations in additive, associative design : an assemblage of collective use of forms for part of the M.I.T. West Campus  

E-Print Network [OSTI]

My thesis is an attempt at synthesizing a series of observations of built and unbuilt environments which exemplify the elusive physical qualities of harmonic diversity - unity with variety. This synthesis will be the basis ...

Fung, Vivian

1985-01-01T23:59:59.000Z

372

The artifact assemblage from the Pepper Wreck: an early seventeenth century Portuguese East-Indiaman that wrecked in the Tagus River  

E-Print Network [OSTI]

some of the ship's navigational instruments, Asian trade goods such as pepper and porcelain dishes, and personal items. Other materials recovered include everything from modern signage and trash to hundreds of ceramic sherds and balls of lead shot...

Brigadier, Sara R

2002-01-01T23:59:59.000Z

373

Scripta Fac. Sci. Nat. Univ. Masaryk. Brun., Volume 36, Geology. Brno, 2007. 57 The Early Miocene micromammalian assemblage from Mokr 1/2001 Turtle  

E-Print Network [OSTI]

and in deposits of the main brown coal seam (Merkur-North) or in the limestone quarry and erosive relicts of hot

Horacek, Ivan

374

NUMERICAL MODELING OF THE DISRUPTION OF COMET D/1993 F2 SHOEMAKER-LEVY 9 REPRESENTING THE PROGENITOR BY A GRAVITATIONALLY BOUND ASSEMBLAGE OF RANDOMLY SHAPED POLYHEDRA  

SciTech Connect (OSTI)

We advance the modeling of rubble-pile solid bodies by re-examining the tidal breakup of comet Shoemaker-Levy 9, an event that occurred during a 1.33 R encounter with Jupiter in 1992 July. Tidal disruption of the comet nucleus led to a chain of sub-nuclei {approx}100-1000 m diameter; these went on to collide with the planet two years later. They were intensively studied prior to and during the collisions, making SL9 the best natural benchmark for physical models of small-body disruption. For the first time in the study of this event, we use numerical codes treating rubble piles as collections of polyhedra. This introduces forces of dilatation and friction, and inelastic response. As in our previous studies we conclude that the progenitor must have been a rubble pile, and we obtain approximately the same pre-breakup diameter ({approx}1.5 km) in our best fits to the data. We find that the inclusion of realistic fragment shapes leads to grain locking and dilatancy, so that even in the absence of friction or other dissipation we find that disruption is overall more difficult than in our spheres-based simulations. We constrain the comet's bulk density at {rho}{sub bulk} {approx} 300-400 kg m{sup -3}, half that of our spheres-based predictions and consistent with recent estimates derived from spacecraft observations.

Movshovitz, Naor; Asphaug, Erik; Korycansky, Donald, E-mail: nmovshov@ucsc.edu [Department of Earth and Planetary Sciences, University of California, Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States)

2012-11-10T23:59:59.000Z

375

The observation of the morphology of the fibrous molecular assem-blages and the NiP microtubes was carried out using a Hitachi S-  

E-Print Network [OSTI]

] S. E. Frazier, J. A. Bedford, J. Hower, M. E. Kenney, Inorg. Chem. 1967, 6, 1693. [2] C. R. Martin

Sottos, Nancy R.

376

Paleomycology of the Princeton Chert II. Dark-septate fungi in the aquatic angiosperm Eorhiza arnoldii indicate a diverse assemblage of root-colonizing fungi during the Eocene  

E-Print Network [OSTI]

-8137.2010.03611.x O’Keefe JM, Hower JC, Finkelman RF, Drew JW, Stucker JD. 2011. Petrographic, geochemical and mycological aspects of Miocene coals from the Nova´ky and Handlova´ mining districts, Slovakia. Int J Coal Geol 87:268–281, doi:10.1016/j.coal.2011...

Klymiuk, Ashley A.; Taylor, Thomas N.; Taylor, Edith L.; Krings, Michael

2013-09-01T23:59:59.000Z

377

Major shifts in calcareous phytoplankton assemblages through the Eocene-Oligocene transition of Tanzania and their implications for low-latitude primary production  

E-Print Network [OSTI]

in the deep sea, significant glaciomarine sedimen- tation commences around the margins of both East and West Antarctica indicating the first Cenozoic advance of conti- nental-scale ice sheets in southern high latitudes [Breza and Wise, 1992; Ivany et al., 2006... patterns. In low south- ern latitudes the present-day western boundary of the Indian Ocean is dominated by the northward flowing East African Coastal Current (EACC), which is sourced from the west- ward flowing South Equatorial Current (SEC) [Swallow et al...

Jones, Tom Dunkley; Bown, Paul R.; Pearson, Paul N.; Wade, Bridget S.; Coxall, Helen K.; Lear, Caroline H.

378

Beaver Dams Maintain Native Fish Biodiversity Via Altered Habitat Heterogeneity in a Coastal Stream Network: Evaluating Gear, Quantifying Fish Assemblages, and Testing Ecological Hypotheses.  

E-Print Network [OSTI]

??Understanding the relationship between heterogeneity, biodiversity and ecosystem function is an active focus of ecological research that has direct applications to the formulation of sustainable,… (more)

Smith, Joseph Michael

2012-01-01T23:59:59.000Z

379

Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils  

E-Print Network [OSTI]

in Gulf of Mexico gas hydrates: comparative analysis of DNA-Sediment from a marine gas hydrate area coupled AOM tothat were also from gas hydrate areas, but lower rates (

Blazewicz, Steven Joseph

2012-01-01T23:59:59.000Z

380

Reconstructing the Habitat Mosaic of Australopithecus robustus: Evidence from Quantitative Morphological Analysis of Bovid Teeth  

E-Print Network [OSTI]

. The fossil bovids abundances were compared across the assemblages over time in order to define the environmental mosaic in each assemblage and to determine if environmental heterogeneity existed across the assemblages. The relative abundances of the bovid...

Brophy, Juliet

2012-02-14T23:59:59.000Z

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Physical models of magmatic intrusion during thrusting Olivier Galland, Jean de Bremond d'Ars, Peter R. Cobbold and Erwan Hallot  

E-Print Network [OSTI]

of the experi- ments quoted, fluid viscosity was too large for hydraulic fracturing to occur. By contrast, the viscosity of our model material was low enough to permit hydraulic fracturing. During hydraulic fracturing, which form perpen- dicularly to the direction of least principal stress. Hydraulic fracturing

Galland, Olivier

382

Non-intrusive measurement of particle charge: Electrostatic dry coal cleaning. Technical progress report No. 8, April 1, 1993--June 30, 1993  

SciTech Connect (OSTI)

As we reported in the Technical Progress Report No. 7, there are surges of electric current in the charging loop during triboelectrification of all particles. A high speed data acquisition and analysis system was developed to monitor and record the current pattern. There is no known report on such charge-discharge surges in the literature. The mechanism for it is yet to be understood. The on-line computerized electric current measurement also leads to an observation of charging effects as a function of particle feeding rate. It is shown that feed rate greatly alters particle charge. Such an effect is mostly overlooked by researchers and it could have a important role in process design where the feed rate would be maximized. The initial results for coal and mineral particles demonstrated that the average charge was lower when the feed rate was increased. Further investigation is scheduled to identify potential controlling factors, eg, the solid volume fraction and particle number density could be important process factors. The study of charging velocity and particle size was continued. It was found that particle charge was linearly dependent on the charging velocity for all samples investigated. However, the slope of this linear dependence varied for particles having different diameters. In addition, the charge-velocity relationships were dependent on feeding rates. Hence, the data discussed below include these interrelationships.

Not Available

1993-09-01T23:59:59.000Z

383

Mechanical design of PlayLamp : a minimally intrusive device for recording the behavior of children at-risk of developmental disorders  

E-Print Network [OSTI]

This thesis paper documents the design process, decisions, and outcomes of the design of the physical form factor of PlayLamp, a device for video and audio recording the development of children at-risk of having developmental ...

Steger, Stephen Andrew

2008-01-01T23:59:59.000Z

384

Non-intrusive measurement of particle charge: Electrostatic dry coal cleaning. Technical progress report No. 11, January 1, 1994--March 31, 1994  

SciTech Connect (OSTI)

As has been previously reported, the charge measurement portion of this project has been broadened to include direct measurement techniques which yield an average particle charge per unit mass. These methods, which now include current measurements from the charging loop, an electrolytic collection solution and a Faraday cage have been employed to expand the charge measurement capabilities over those that were originally developed using the PDPA. The effects of gas velocity, humidity and temperature as well as particle size on charge was evaluated for different coals and silica. The charge accumulated on silica particles was linearly dependent on their velocity in the tribocharger for the velocities and mass loadings which were investigated. For coals, a linear increase in charge occurred over a more limited velocity range. Transport gas humidity had a much stronger effect on the charge established on silica particles than on coal particles.

Not Available

1994-06-01T23:59:59.000Z

385

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

E-Print Network [OSTI]

B.L. Phillips, and J.B. Parise (2007), The structure ofD.R. Strongin, and J.B. Parise (2007), Similarities in 2-

Birkholzer, Jens

2008-01-01T23:59:59.000Z

386

Technical Advice and Support for the Joint Integrated Non-Intrusive Inspection (JINII) Program Task 2.2 Transmission Digital Radiography (DR)  

SciTech Connect (OSTI)

The Cargo Advanced Automated Radiography System (CAARS) program aims to utilize advanced radiographic systems to detect radiological and nuclear threats. Validation of initial design and testing concepts is a precondition for prototype system development and large-scale deployment. As expected, Depleted Uranium (DU) is a valid surrogate for Special Nuclear Materials (SNM) in CAARS Advanced Technology Demonstration (ATD) performance field-tests of transmission radiography systems. Dual-energy transmission measurements of DU are nearly identical to SNM, and are distinct from lower Z materials, provided the samples are matched to equal areal density. Results from an alternative method, using samples of equal thickness, showed sample discrimination by material density, rather than by atomic number (Z). The transmission measurements of DU and SNM were made with equipment that is nearly identical to current field systems. X-ray source beams at endpoint energies of 5.4 MeV and 9.6 MeV were used to measure transmission through the selected sample materials. The ratio of the x-ray linear attenuation coefficient times length ({micro}L) at 5.4 MeV, to {micro}L at 9.6 MeV is a metric for atomic number based discrimination of materials. The measured ratios were compared with computed values based on LLNL photon cross section data and LLNL developed models of x-ray detector characteristics. Measured ratios for DU differed from HEU by an average of 0.25%, and from WGPu by 0.08%, which is within the noise level of 0.4 to 0.5%. For comparison, measured ratios for Sn differed from HEU by 3.2%, and from WGPu by 3.6%, well beyond the measurement noise. Measured ratios for W differed from HEU by 0.01%, and from WGPu by 0.32%. The measured ratio values presented in Table 1 demonstrate the feasibility of using a threshold ratio to discriminate low-Z (Z < 72) from high-Z (Z {ge} 72) materials (as defined by CAARS specification). In the case of our test system, a threshold ratio of 1.08 would be suitable based on the measured results.

Martz, H; Chinn, D; Pincus, C

2011-03-03T23:59:59.000Z

387

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

E-Print Network [OSTI]

ICP-MS Hg LBNL NAA NASCENT NURE MCL MSW NGS NWIS Pb Sb SDWRAbundance ICP Part. AA NAA NURE ICP See notes See Notes HostNeutron activation analysis NURE: National Uranium Resource

Birkholzer, Jens

2008-01-01T23:59:59.000Z

388

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

E-Print Network [OSTI]

ENvironmenT National Uranium Resource Evaluation MaximumNURE: National Uranium Resource Evaluation, a program

Birkholzer, Jens

2008-01-01T23:59:59.000Z

389

Long-term changes in quiescent degassing at Mount Baker Volcano, Washington, USA; Evidence for a stalled intrusion in 1975 and connection to a deep magma source  

E-Print Network [OSTI]

2009 Available online 28 July 2009 Keywords: Mount Baker gas emission chemistry fumarole hydrothermal and carbon dioxide output was observed both in emission rates and in fumarole samples. Emission rates of CO2 and decreases in the CO2/CH4 ratio since 1975 suggest a long steady trend back toward a more hydrothermal gas

390

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

E-Print Network [OSTI]

Changes in Response to CO2 Leakage from Deep Geologicalstudy mineral trapping for CO2 disposal in deep arenaceousconstituents as function of P(CO2)? function of P(CO2)? – –

Birkholzer, Jens

2008-01-01T23:59:59.000Z

391

Int. J. Engg, Sc. & Mgmt. / Vol. II / Issue II / Jul-Dec 2012 ISSN: 2231-3273 A HYBRID APPROACH TOWARDS INTRUSION DETECTION  

E-Print Network [OSTI]

the network or the distributed computing infrastructure from malicious attacks like DDoS attack, key-logging

Sanyal, Sugata

392

Reducing booster-pump-induced contaminant intrusion in Indian water systems with a self-actuated, back-pressure regulating valve  

E-Print Network [OSTI]

Intermittently-operated water systems struggle to equitably and effectively distribute clean water to customers. One common customer response to intermittency is to supplement the water system's pressure by using a household, ...

Taylor, David Donald James

2014-01-01T23:59:59.000Z

393

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

E-Print Network [OSTI]

70 (June 2000), 235–238. Hower, J.C. and J. D. Robertson (concentration in the coal (Hower and Robertson, 2003).

Birkholzer, Jens

2008-01-01T23:59:59.000Z

394

DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA  

SciTech Connect (OSTI)

Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

2010-12-02T23:59:59.000Z

395

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

E-Print Network [OSTI]

N s sj s c j = 1N C (F18) where superscript 0 representsBy substituting Equations (F18) and (F19) into Equation (

Birkholzer, Jens

2008-01-01T23:59:59.000Z

396

E-Print Network 3.0 - architecture seed development Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mixture and management on beetle assemblages of arable field margins Summary: Effects of seed mixture and management on beetle assemblages of arable field margins Ben A... Beetle...

397

ER-12-1 completion report  

SciTech Connect (OSTI)

The objective of drillhole ER-12-1 was to determine the hydrogeology of paleozoic carbonate rocks and of the Eleana Formation, a regional aquitard, in an area potentially downgradient from underground nuclear testing conducted in nearby Rainier Mesa. This objective was addressed through the drilling of well ER-12-1 at N886,640.26 E640,538.85 Nevada Central Coordinates. Drilling of the 1094 m (3588 ft) well began on July 19, 1991 and was completed on October 17, 1991. Drilling problems included hole deviation and hole instability that prevented the timely completion of this borehole. Drilling methods used include rotary tri-cone and rotary hammer drilling with conventional and reverse circulation using air/water, air/foam (Davis mix), and bentonite mud. Geologic cuttings and geophysical logs were obtained from the well. The rocks penetrated by the ER-12-1 drillhole are a complex assemblage of Silurian, Devonian, and Mississippian sedimentary rocks that are bounded by numerous faults that show substantial stratigraphic offset. The final 7.3 m (24 ft) of this hole penetrated an unusual intrusive rock of Cretaceous age. The geology of this borehole was substantially different from that expected, with the Tongue Wash Fault encountered at a much shallower depth, paleozoic rocks shuffled out of stratigraphic sequence, and the presence of an altered biotite-rich microporphyritic igneous rock at the bottom of the borehole. Conodont CAI analyses and rock pyrolysis analyses indicate that the carbonate rocks in ER-12-1, as well as the intervening sheets of Eleana siltstone, have been thermally overprinted following movement on the faults that separate them. The probable source of heat for this thermal disturbance is the microporphyritic intrusion encountered at the bottom of the hole, and its age establishes that the major fault activity must have occurred prior to 102.3+0.5 Ma (middle Cretaceous).

Russell, C.E.; Gillespie, D.; Cole, J.C.; Drellack, S.L. [and others

1996-12-01T23:59:59.000Z

398

Spatial and temporal dynamics of the microbial community in the Hanford unconfined aquifer  

SciTech Connect (OSTI)

Pyrosequencing analysis of 16S rRNA genes was used to study temporal dynamics of groundwater Bacteria and Archaea over 10 months within 3 well clusters separated by ~30 m and located 250 m from the Columbia River on the Hanford Site, WA. Each cluster contained 3 wells screened at different depths ranging from 10 to 17 m that differed in hydraulic conductivities. Representative samples were selected for analyses of prokaryotic 16S and eukaryotic 18S rRNA gene copy numbers. Temporal changes in community composition occurred in all 9 wells over the 10 month sampling period. However, there were particularly strong effects near the top of the water table when the seasonal rise in the Columbia River caused river water intrusion at the top of the aquifer. The occurrence and disappearance of some microbial assemblages (such as Actinobacteria ACK-M1) were correlated to river water intrusion. This seasonal impact on microbial community structure was greater in the shallow saturated zone than deeper in the aquifer. Spatial and temporal patterns for several 16S rRNA gene operational taxonomic units associated with particular physiological functions (e.g.methane oxidizers and metal reducers) suggests dynamic changes in fluxes of electron donors and acceptors over an annual cycle. In addition, temporal dynamics in eukaryotic 18S rRNA gene copies and the dominance of protozoa in 18S clone libraries suggest that bacterial community dynamics could be affected not only by the physical and chemical environment, but also by top-down biological control.

Lin, Xueju; McKinley, James P.; Resch, Charles T.; Kaluzny, Rachael M.; Lauber, C.; Fredrickson, Jim K.; Knight, Robbie C.; Konopka, Allan

2012-03-29T23:59:59.000Z

399

A supermatrix analysis of genomic, morphological, and paleontological data from crown Cetacea  

E-Print Network [OSTI]

Cetaeea, Mammalia) from Patagonia, southern Argentina. Ammolluscan assemblages of eastern Patagonia (Argentina): a

Geisler, Jonathan H; McGowen, Michael R; Yang, Guang; Gatesy, John

2011-01-01T23:59:59.000Z

400

Pollinator diversity and crop pollination services are at risk  

E-Print Network [OSTI]

assemblages. Furthermore, self- compatible plants, as well as self-incompatible plants, can profit from insect

Cruzan, Mitchell B.

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Enabling Trusted Software Integrity Darko Kirovski  

E-Print Network [OSTI]

this problem from two perspectives: · Intrusion detection ­ a set of mechanisms that aim at scanning system address this problem by trying to de- tect the intrusion at run-time or by formally verifying aim at intrusion prevention as the core technology for enabling secure computing systems. Intrusion

Potkonjak, Miodrag

402

A model of forensic analysis using goal-oriented logging  

E-Print Network [OSTI]

A Toward Forensic Models . . . . . . . . . . . . . . . .of Forensic Analysis . . . . . . . . . . . . . . . .150 3. Applying Forensic Techniques to Intrusion

Peisert, Sean Philip

2007-01-01T23:59:59.000Z

403

Timing of granite emplacement and cooling in the SongpanGarze^ Fold Belt (eastern Tibetan Plateau) with tectonic implications  

E-Print Network [OSTI]

Timing of granite emplacement and cooling in the Songpan­Garze^ Fold Belt (eastern Tibetan Plateau Abstract New U­Pb and Rb­Sr geochronology on syn- and post-orogenic granites provide constraints on the timing of major tectonic events in the Songpan­Garze^ fold belt, west Sichuan, China. The Ma Nai granite

404

Ya ri a bsod Collection 4  

E-Print Network [OSTI]

????????????????????????? Genre or type (i.e. epic, song, ritual) Persuade Song ??? ??????????????? Name of recorder (if different from collector) Date of recording February 2007 ????? ?????????????????????????? Place of recording A skyid Village, A skyid Township... of performer(s) E kho, 72, female, A skyid Township, Mdzo dge County, Rnga ba Tibetan and Qiang Autonomous Prefecture, Sichuan Province. ??,?????????????????????????? ?? ?????? ???? ??? ??????????????????????????????????...

Sha bo don 'grub rdo rje; Skal dbang skyid

405

Current Research at BBISS John C. Crittenden, Ph.D., N.A.E., P.E.  

E-Print Network [OSTI]

Economic Analysis Sergiy Smetana PhD, CEE Fulbright Scholar Visiting Student, Institute of NatureD, CEE Sichuan University Electrochemical degradation of organic pollutants. Yuheng Feng Visiting Student, PhD, CEE Zhejian University Catalytic degradation of dioxin using computational chemistry. Xia Yang

Das, Suman

406

Fretting wear behavior of superelastic nickel titanium shape memory alloy  

E-Print Network [OSTI]

University, Chengdu, 610031, Sichuan Province, P.R. China b Department of Mechanical Engineering, The Hong to the low phase transition stress (only 1/4 the value of its plastic yield stress) and the large recoverable. [8] showed that the surface modification by sequential ion implantation with argon and oxygen could

Sun, Qing-Ping

407

Trnqvist et al. HFN: Technical Heterogeneity and Virtual PoLOs Proceedings of the 6th  

E-Print Network [OSTI]

Eva Törnqvist Dept. of Technology and Social Change Linköping University, Sweden eva an effective mutual conversation space for involved stakeholders, and how the development of socio-technological, leaves us with a depressing result. The magnitude 8.0 earthquake in China's Sichuan province, the cyclone

408

Post-Disaster Reconstruction Models in the Asia Pacific: the cases of China, Iran and  

E-Print Network [OSTI]

Post-Disaster Reconstruction Models in the Asia Pacific: the cases of China, Iran and Myanmar Helen ­ Sichuan Earthquake 2008 Iran ­ Bam Earthquake 2003; Tabriz Earthquake 2012 Myanmar ­ Cyclone Nargis 2008 element in psycho-social recovery and reconstruction phase. #12;Iran Model Iran: Bam Earthquake 2003

Botea, Adi

410

In this project, we deal with the simulation and the optimisation of flows when uncertainties exist in the models and/or the data. We only consider non intrusive methods so that existing CFD softwares  

E-Print Network [OSTI]

with the thermodynamical models for dense organic gas flows used in some energy production devices. It is knownSummary In this project, we deal with the simulation and the optimisation of flows when arising from the study of energy generators for renewable sources. The three task will be done in parallel

Abgrall, Rémi

411

Archaeological investigations in the Elm Creek Watershed, Runnels County, Texas: sites 41RN61, 41RN64, 41RN65, 41RN72, 41RN74, 41RN76  

E-Print Network [OSTI]

. Data recovery, based on geomorphic investigations to resolve potential for subsurface cultural deposits, resulted in retrieval of representative samples of lithic assemblages from four sites (41RN61, 41RN64, 41RN65, 41RN74). These lithic assemblages...

Sanders, Calvin B

2012-06-07T23:59:59.000Z

412

Beyond the Edge of a Niche: The Role of Grazing on Prymnesium parvum Bloom Formations in Two Texas Lakes  

E-Print Network [OSTI]

. Controls and treatments consisted of P. parvum cultures in log- and stationary-growth phases, natural phytoplankton assemblages, and natural rotifer assemblages from each lake. Monitored parameters included P. parvum population density and population growth...

Davis, Stephen Louis

2014-03-25T23:59:59.000Z

413

1018 BioScience December 2001 / Vol. 51 No. 12 The 21st century is an exciting time for biological  

E-Print Network [OSTI]

,and unraveling functional genomics at scales ranging from organisms to community assemblages--to pro- vide just

414

Objects + Scripts = Applications1 Oscar Nierstrasz  

E-Print Network [OSTI]

as customized assemblages of largely standard parts. Such a sce- nario, however, requires a shift in our

Nierstrasz, Oscar

415

Passive Operating System Identification From TCP/IP Packet Headers* Richard Lippmann, David Fried, Keith Piwowarski, William Streilein  

E-Print Network [OSTI]

-based intrusion detection systems and maintaining a site security policy. Configuring network-based intrusion useful for maintaining a site security policy. A site policy may specify the types of hosts

416

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

417

Charles University in Prague Faculty of Science  

E-Print Network [OSTI]

algal assemblages in peat bogs Kateina Cerná Ph.D. Thesis Prague, May 2010 Supervised by: Dr. Jií ................................................24 Paper 1. Spatial distribution of algal assemblages in a temperate lowland peat bog .............................26 Paper 2. Small-scale spatial variation of benthic algal assemblages in a peat bog

418

Slide 1  

National Nuclear Security Administration (NNSA)

obligations ('Managed Access' concept). * Perceived Issues - Degree of intrusiveness - Security and proliferation risks - Managing access - Training staff - Proving robustness...

419

Biometric Authentication via Keystroke Sound Joseph Roth Xiaoming Liu Arun Ross  

E-Print Network [OSTI]

the mouse [16]. Although being non- intrusive, keystroke dynamics utilizes key-logging to record all typed

Ross, Arun Abraham

420

Use of tritium and helium to define groundwater flow conditions in Everglades National Park  

E-Print Network [OSTI]

and tem- perature as tracers of the seawater intrusion into coastal aquifers [Back et al., 1970; Kohout

Swart, Peter K.

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

E-Print Network 3.0 - alert operation network Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Approach to Intrusion Detection Alert Correlation Summary: correlation, alert reduction, correlation data sets. 1 INTRODUCTION RECENTLY, networks have evolved... by...

422

E-Print Network 3.0 - altered cellular priorities Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Computer Technologies and Information Sciences 3 Informing Algorithms for Efficient Scheduling of Synchronizing Threads on Multiprogrammed SMPs Summary: -intrusiveness...

423

Magmatic and tectonic extension at mid-ocean ridges: 1. Controls on fault characteristics  

E-Print Network [OSTI]

and the injection of hot magma into the crust. We examine a range of intrusion rates and axial thermal structures@hawaii.edu) [1] We use 2-D numerical models to explore the thermal and mechanical effects of magma intrusion in proportion to the rate of intrusion to simulate the thermal effects of magma crystallization

Ito, Garrett

424

An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection  

E-Print Network [OSTI]

-- There is an emerging need for the traffic processing capability of network security mechanisms, such as intrusion-based security systems, like intrusion detection systems (IDS), have not kept pace with the increasing usage that can be attributed to the incapability of current solutions to detect intrusions in high- speed

425

A Comparison Between Signature and Machine Learning Based Detectors  

E-Print Network [OSTI]

in implementation, their effect on WiFi networks can be devastating. To this end, several Intrusion Detection-Wireless and a genetic programming (GP) based intrusion detector, in the detection of a particular data link layer attack and stealthy manner in order to beat the signatures in the intrusion detection database. Based on the past

Zincir-Heywood, Nur

426

A Geochemical Model of the Kilauea East Rift Zone | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) |

427

A Low Carbon Economic Strategy for Scotland | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China)

428

A New 'Geothermal Play Type' Catalog: Streamlining Exploration Decision  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China)|

429

A Preliminary Conceptual Model for the Blue Mountain Geothermal System,  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw

430

A Resurgent Cauldron In The Early Paleozoic Of Wales, Uk | Open Energy  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan,

431

A Review of Geothermal Resource Estimation Methodology | Open Energy  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan,Financial Framework

432

A Review of the World Bank Forest Carbon Partnership Facility Readiness  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan,Financial Frameworkand

433

A Simple Heat-Flow Quality Function And Appraisal Of Heat-Flow Measurements  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan,Financial

434

A Study Of Scale Deposition- An Analogue Of Meso- To Epithermal Ore  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan,FinancialTracer

435

Paleoautecology of Caninia torquia (Owen) from the Beil Limestone Member (Pennsylvanian, Virgilian), Kansas  

E-Print Network [OSTI]

soft mud sub- 3 strate. Baird ( 1971) recognized two coral assemblages, a "Coral-Algal Community Wackestone" on the Nebraska shelf and a "Fusulinid-Coral Assemblage Wackestone" on the Nebraska shelf and in the Forest City basin. In the former... ( 1971) concluded that this assemblage lived in slightly deeper waters than the coral-algal community. Paleoecology of midcontinent Penn.sylva- nian rugose corals.—Most pre-1950 work on Pennsylvanian rugose corals was taxonomic, and later studies included...

Maerz, R. H., Jr.

1978-06-14T23:59:59.000Z

436

Changes in neogene Caribbean benthic community structure after closure of the Central America Seaway  

E-Print Network [OSTI]

and faunal turnover in the Caribbean Neogene. Proceedings oflate Cenozoic turnover of Caribbean reefs. Paleobiology 25:assemblages of Neogene Caribbean Mollusca of lower Central

Leonard-Pingel, Jill Suzanne

2012-01-01T23:59:59.000Z

437

Paradigm or Paradox: Can we Attribute Species Changes to Global Climate Change in Light of Decreasing Water Temperatures in Central California?  

E-Print Network [OSTI]

reef- fish assemblages in kelp habitats off Santa Barbara,1985. The ecology of giant kelp habitats in California: asubstrate and extensive kelp forests. Since 1992, NMFS

Breaker, Laurence; Cailliet, Gregor; Launer, Andrea; Wadsworth, Tom

2012-01-01T23:59:59.000Z

438

OVAI Contract Report #2012-43 PHASE II ARCHAEOLOGICAL EVALUATION...  

Broader source: Energy.gov (indexed) [DOE]

assemblages. Despite the 1950s-era farmstead demolition, which removed the farmstead buildings, the six farmsteads examined in this study are in fairly good archaeological...

439

E-Print Network 3.0 - armata collembola onychiuridae Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 Changes in species assemblages and diets of Collembola along a gradient of metal pollution Summary: of three Collembola (Family Onychiuridae). Rev. Ecol. Biol. Sol 12,...

440

arabian gulf higher: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

species assemblage of Phoreiobothrium in C. limbatus in the Gulf of Mexico has the potential to inform us about its population structure of the host.... Owens, Hannah L....

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

E-Print Network 3.0 - atherinops affinis ayres Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

variation in otolith trace-elemental fingerprints in a temperate estuarine fish assemblage Summary: . The species evaluated comprised a mid-water-dwelling smelt...

442

E-Print Network 3.0 - astyanax altiparanae garutti Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

altiparanae garutti Page: << < 1 2 3 4 5 > >> 1 http:www.biotaneotropica.org.br FISH ASSEMBLAGE STRUCTURE IN A FIRST ORDER STREAM, Summary: . ...

443

GRADUATE FELLOWSHIPS, GRANTS & PRIZES Fullbright-Hayes Doctoral Dissertation Research  

E-Print Network [OSTI]

Ethics Bowl Team UNDERGRADUATE RESEACH AWARDS UC Santa Cruz Dean's & Chancellor's Awards Corey Raymond" Graduate Research Symposium ­ Dean's Prize Jimmy Fazzino, Literature "Beat Subterranean: Assemblages

California at Santa Cruz, University of

444

A Local Search Appproach for Transmembrane Segment and Signal Peptide Discrimination  

E-Print Network [OSTI]

,2 , Dominique Tessier1 , B´eatrice Duval2 , and Jin-Kao Hao2 1 UR1268 Biopolym`eres Interactions Assemblages

Hao, Jin-Kao

445

E-Print Network 3.0 - affecting species diversity Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

search results for: affecting species diversity Page: << < 1 2 3 4 5 > >> 1 Community Ecology & Species Assemblages Summary: affect species distributions Tropical regions - most...

446

Wetland Plant Influence on Sediment Ecosystem Structure and Trophic Function  

E-Print Network [OSTI]

alterniflora and benthic microalgae in salt marsh food webs:assemblages of marine wetland microalgae and photosyntheticalternijlora and benthic microalgae in salt marsh food webs:

Whitcraft, Christine R.

2007-01-01T23:59:59.000Z

447

Wetland plant influence on sediment ecosystem structure and trophic function  

E-Print Network [OSTI]

alterniflora and benthic microalgae in salt marsh food webs:assemblages of marine wetland microalgae and photosyntheticalterniflora and benthic microalgae in salt marsh food webs:

Whitcraft, Christine René

2007-01-01T23:59:59.000Z

448

Eytan Vitae 1 Dr. Ron I Eytan  

E-Print Network [OSTI]

? Inferring acanthomorph teleost phylogeny using anchored hybrid enrichment. In revision Alex Dornburg, Jon Fish Assemblage Structure Over 50 Years at Reefs of New Providence Island, the Bahamas Highlight

Eytan, Ron I.

449

Fish ecology of a wetland in the southern Western Ghats, India.  

E-Print Network [OSTI]

??Fish assemblages and abiotic environmental conditions in a wetland in the Western Ghats, southern India, were investigated from August 2000 to July 2001. Rainfall showed… (more)

Grubh, Archis Robert

2012-01-01T23:59:59.000Z

450

Full vector low-temperature magnetic measurements of geologic materials  

E-Print Network [OSTI]

the early history of the solar system. The assemblage ofas they pass by the Sun (at solar perigee) or as they enter

Feinberg, Joshua M; Solheid, Peter A; Swanson-Hysell, Nicholas L; Jackson, Mike J; Bowles, Julie A

2015-01-01T23:59:59.000Z

451

A Statistics-Based Method For The Short-Wave Infrared Spectral...  

Open Energy Info (EERE)

of alteration minerals, which classifies spectra according to their shape and absorption features, thus obtaining groups of spectra equivalent to mineral assemblages. It...

452

E-Print Network 3.0 - adaptive stochastic collocation Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Stochastic Expansion Methods Summary: Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods... , or sparse grid approaches. The linear...

453

automated seaport container: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

technology, we propose a solution for real-time automated detection Terms-- rootkits, stealth malware, intrusion, con- tainment,virtual machines I. INTRODUCTION Despite to...

454

automated container offering: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

technology, we propose a solution for real-time automated detection Terms-- rootkits, stealth malware, intrusion, con- tainment,virtual machines I. INTRODUCTION Despite to...

455

Enterprise Information Security Management Framework [EISMF  

E-Print Network [OSTI]

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

456

Microsoft Word - Chapter 02 rev 4, implemented Nov 19, 2013  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to detect fracturing, corrosion, deterioration, and water intrusion. A comprehensive preventive maintenance program, including all required MSHA inspections, is in place....

457

Planetary Wave Breaking and Nonlinear Reflection: Seasonal Cycle and Interannual Variability  

E-Print Network [OSTI]

and L. M. Polvani, 2000: Climatology of intrusions into theM. H. Hitchman, 1999: A climatology of Rossby wave breaking

Abatzoglou, John T; Magnusdottir, Gudrun

2006-01-01T23:59:59.000Z

458

E-Print Network 3.0 - advanced candu reactor Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Astroparticule & Cosmologie 10, rue Alice Domon et... it the automatic and non intrusive monitoring of nuclear reactor by its antineutrino signal ... Source: Ecole Polytechnique,...

459

Text att freg Frsvarsmaktens lista med uppsatsfrslag vid publicering i respektive Universitets/hgskolans webbsida.  

E-Print Network [OSTI]

and assessment of successfulness Build and establish a cyber intelligence and analysis capability for conducting focused operations to detect advanced intrusions, share alerts, and ensure sufficient network services

Zhao, Yuxiao

460

E-Print Network 3.0 - anonyms and pseudonyms Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and pseudonyms Page: << < 1 2 3 4 5 > >> 1 Ulrich Flegel, University of Dortmund, Germany Privacy-Respecting Intrusion Detection Summary: their privacy. A viable solution is...

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

--No Title--  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

law, such as the Freedom of Information Act. Security, Intrusion, and Detection For site security purposes, and to ensure this service remains available to all users, this...

462

United States Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

representative of a party can prepare and develop legal theories and strategies "with an eye toward litigation," free from unnecessary intrusion by their adversaries. Hickman, 329...

463

Call for Papers First International Baltic  

E-Print Network [OSTI]

and privacy in smart grids - Intellectual property protection - Security and privacy in wireless networks - Internet fraud - Security and privacy metrics - Intrusion detection and prevention - Trust management - Key

Rostock, Universität

464

Domestic Artifacts, Political Practices: An Archaeology of Women's Reform Efforts and the Home, 1854-1939  

E-Print Network [OSTI]

of Sale 1925). These utility lines were uncovered within thehighly disturbed by many utility line intrusions. Findingsheavily disturbed by utility lines and trenches. Although

Christensen, Kimberly E.

2012-01-01T23:59:59.000Z

465

automated border detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 63 Using Specification-Based Intrusion Detection for...

466

automated microarray detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 69 Using Specification-Based Intrusion Detection for...

467

automated fault detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 242 Using Specification-Based Intrusion Detection for...

468

automated snp detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 55 Using Specification-Based Intrusion Detection for...

469

Microsoft Word - 02-25-11_WCH_WeeklyReport  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in 94 VPUs. The VPUs were constructed by welding five bottomless drums together and buried vertically about 10 feet apart. In early September, WCH completed intrusive...

470

E-Print Network 3.0 - altered groundwater chemistry Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

groundwater chemistry Search Powered by Explorit Topic List Advanced Search Sample search results for: altered groundwater chemistry Page: << < 1 2 3 4 5 > >> 1 Seawater intrusion...

471

EIS-0026; Waste Isolation Pilot Plant Disposal Phase Final Supplementa...  

Office of Environmental Management (EM)

for protecting the site from inadvertent human intrusion (e.g., drilling for oilgas resources)." Response: The following language has been incorporated into Section 4.1.1:...

472

E-Print Network 3.0 - activation supports late Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

? Other Units Calcite veins (late Miocene) MIOCENE... INTRUSIONS Colluvial deposits Mine waste (recent) QUATERNARY DEPOSITS Tephra (late Miocene) Siltstone ... Source: Faulds,...

473

Journal of Paleolimnology 28: 297316, 2002. 2002 Kluwer Academic Publishers. Printed in the Netherlands.  

E-Print Network [OSTI]

-yield chemical fertilizers in the post World War II era, and the resultant eutrophication of the lake proxies, as indicated by the appearance of the algalphilic Eutrophication Assemblage. The arcellacean the European Deforestation and Eutrophication Assemblages, indicative of periods of ecological destabilization

Patterson, Timothy

474

Fish under influence: a macroecological analysis of relations between fish species richness and environmental gradients among European tidal estuaries  

E-Print Network [OSTI]

Fish under influence: a macroecological analysis of relations between fish species richness Estuarine fish assemblages are subject to a great environmental variability that largely depends on both a macroecological approach aiming to identify the main environmental factors that structure fish assemblages among

Paris-Sud XI, Université de

475

The Cleveland Museum of Natural History December 2007 Number 56:112120  

E-Print Network [OSTI]

of the postcranial remains suggests that this assemblage comprises a single population. A maxillary fragment of this assemblage indicates element preservation is density mediated, but fragmentation is limited and this suggests. at this locality and only the second record of Alilepus, or a closely allied, genus in Africa (Winkler 2003

Hlusko, Leslea J.

476

ORIGINAL ARTICLE Disturbance and temporal partitioning  

E-Print Network [OSTI]

.139 Introduction Mixed-culture microbial assemblages present in biological wastewater treatment systems-scale activated sludge wastewater treatment plant. The parameter solids retention time (SRT) was used and industrial wastewater treatment (Tchobanoglous et al., 2003; Seviour and Nielsen, 2010). These assemblages

477

Applicability of InSAR to tropical volcanoes: insights from Central America  

E-Print Network [OSTI]

. BIGGS2,3, T. A. MATHER1 & F. AMELUNG3 1 COMET+, Department of Earth Sciences, University of Oxford) or intrusive processes (e.g. dyke and sill intrusion: Hamling et al. 2009; Biggs et al. 2010), as well African Rift: Biggs et al. 2009) and at locations not obviou- sly associated with a particular volcanic

Amelung, Falk

478

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies  

E-Print Network [OSTI]

of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN the advances in the field of network security technologies, such as filtering of traffic, use of encrypted be exploited by unauthorized parties. The use of firewalls, NIDSs (network intrusion detection systems

Garcia-Alfaro, Joaquin

479

On the Limits of Payload-Oblivious Network Attack Detection  

E-Print Network [OSTI]

alarms in order to detect them consistently. Keywords: network intrusion detection, ROC curve, evaluation. 1 Introduction We address the problem of evaluating network intrusion detection systems to the form of log data, encryption or simply a high connection failure rate--methods for detecting

Reiter, Michael

480

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies  

E-Print Network [OSTI]

, such as firewalls, intrusion detection systems, and VPN routers. We review the two main functionalities embedded technologies, such as filter- ing of traffic, use of encrypted communications, and deployment of authentication of firewalls, NIDSs (network intrusion detection systems), and VPN (Virtual Private Network) routers, is still

Boyer, Edmond

Note: This page contains sample records for the topic "intrusive assemblage sichuan" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Reconciling Security Protection and Monitoring Requirements in Advanced Metering Infrastructures  

E-Print Network [OSTI]

, and intrusion detection. In particular, encrypted messages preclude the use of most intrusion detection between the confidentiality requirements for protecting sensitive AMI traffic through encryption, and the monitoring necessary for full inspection of this traffic. The way to reconcile those conflicting requirements

Sanders, William H.

482

Defend your data with broader, deeper server protection IBM ISS Threat Mitigation Services  

E-Print Network [OSTI]

protection delivers multilayered intrusion preven- tion and detection to help protect your servers from of attacks, including those tunneling through encrypted Web transactions Combines multiple inspection® Server Intrusion Prevention System (IPS) and IBM RealSecure® Server Sensor. Each supports a broad range

483

NetGator: Malware Detection Using Program Interactive Challenges  

E-Print Network [OSTI]

to an external party over an encrypted or plain text connection before the intrusion is detected. In this paper used for targeted exfiltration of data. Current intrusion detection systems cannot always keep hole that malware will increasingly cap- italize on. The use of encrypted traffic has been growing

Stavrou, Angelos

484

Imaging Gas Leaks using Schlieren Optics by Gary S. Settles  

E-Print Network [OSTI]

-intrusive, and capable of remote observation of leaks as small as milliliters/minute. For example, natural gas leaking. The schlieren technique is highly sensitive, non- intrusive, optical, and remote. However, since it needs only with a special schlieren arrangement that visualizes gas flows in color (Settles, International Journal of Heat

Settles, Gary S.

485

A Geostatistical Study of the Uranium Deposit at Kvanefjeld,  

E-Print Network [OSTI]

with the geology. It is also shown that, although anisotropy exists, the uranium variation has a secondRisa-R-468 A Geostatistical Study of the Uranium Deposit at Kvanefjeld, The Ilimaussaq Intrusion A GEOSTATISTICAL STUDY OF THE URANIUM DEPOSIT AT KVANEFJELD, THE ILIMAUSSAQ INTRUSION, SOUTH GREENLAND Flemming

486

Milking Song 4  

E-Print Network [OSTI]

milking song and discusses where and why such songs are sung. Genre or type (i.e. epic, song, ritual) Milking song Name of recorder (if different from collector) Zla ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo... Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Name(s), age, sex, place of birth of performer(s) Bo nyed. Female. Born 1954. Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

487

Plowing Speech  

E-Print Network [OSTI]

plowing speech and a discussion about the speech. Genre or type (i.e. epic, song, ritual) Plowing speech Name of recorder (if different from collector) Zla ba sgrol ma Date of recording November 10th 2009. Place of recording Ci jo Village, Phu... ma Township, Sde dge County, Dkar mdzes Tibetan Autonomous Prefecture, Sichuan Province, China. Name(s), age, sex, place of birth of performer(s) Bo nyed. Female. Born 1954. Ci jo Village, Phu ma Township, Sde dge County, Dkar mdzes Tibetan...

Zla ba sgrol ma

2009-11-10T23:59:59.000Z

488

Interview of Liang Bibo  

E-Print Network [OSTI]

Liang Bibo interviewed in Chengdu by Alan Macfarlane 28th July 2008 0:09:07 Born 1963 in Sichuan Province, China; father is an engineer and was working on an irrigation system and mother, a teacher, both now retired; I was very much influenced... 's life, Er Niang, who had to support her husband and three children who were incapacitated; she was a Han; I heard about her from my friends; as a news reporter I had many friends who would alert me about special stories; the film did help her as after...

Liang, Bibo

2009-02-17T23:59:59.000Z

489

A Core Hole in the Southwestern Moat of the Long Valley Caldera: Early  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Open EnergyResults |

490

A DOE-Funded Design Study for Pioneer Baseload Application Of an Advanced  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Open EnergyResults

491

A Deep Geothermal Exploration Well At Eastgate, Weardale, Uk- A Novel  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Open

492

A Demonstration System for Capturing Geothermal Energy from Mine Waters  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Openbeneath Butte, MT

493

A Distinction Technique Between Volcanic And Tectonic Depression Structures  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Openbeneath Butte,

494

A Flashing Binary Combined Cycle For Geothermal Power Generation | Open  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Openbeneath Butte,Energy

495

A Fluid-Inclusion Investigation Of The Tongonan Geothermal Field,  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Openbeneath

496

A Fossilized Opal A To Opal C-T Transformation On The Northeast Atlantic  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | OpenbeneathMargin-

497

A Geochemical Model Of The Platanares Geothermal System, Honduras | Open  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | OpenbeneathMargin-Energy

498

A Geochemical Reconnaissance Of The Alid Volcaniccenter And Geothermal  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) |System, Danakil

499

A Geological and Geophysical Study of Chena Hot Springs, Alaksa | Open  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) |System, DanakilEnergy

500

A Geological and Hydro-Geochemical Study of the Animas Geothermal Area,  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) |System,