National Library of Energy BETA

Sample records for intrusive assemblage sichuan

  1. A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage...

    Open Energy Info (EERE)

    A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal Article: A...

  2. A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand Dalton JumpProgram | OpenEnergy Information Of The(Sichuan, Sw

  3. Sichuan Earthquake: A New Participant Culture

    E-Print Network [OSTI]

    Hsiung, Ariel

    2011-01-01

    died in the Sichuan earthquake. Their parents blame corruptPolitics of Sichuan Earthquake. ” Journal of Contingencies7.8 Ji Dizhen (7.8 scale earthquake hits Sichuan Province) (

  4. Sichuan University | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe PowerQieshanSichuan

  5. Intrusive gravity currents

    E-Print Network [OSTI]

    Hang, Alice Thanh

    2009-01-01

    The front speed of intrusive gravity currents. J. FluidP.F. Linden. Intrusive gravity currents. J. Fluid Mechanics,of mesoscale variability of gravity waves. Part II: Frontal,

  6. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  7. Crustal structures in the area of the 2008 Sichuan earthquake from seismologic and gravimetric data

    E-Print Network [OSTI]

    Nicolas, Chamot-Rooke

    Supérieure, CNRS-UMR 8538, Paris, France b Chengdu University of Technology, Chengdu, China c Institut de the Sichuan Basin and the Tibetan plateau and a horizontal discontinuity at 15 km depth, which may connect on the western margin of the Sichuan Basin is arguably the largest intracontinental earthquake in western China

  8. Crustal structures in the area of the 2008 Sichuan earthquake from seismologic and gravimetric data

    E-Print Network [OSTI]

    Cattin, Rodolphe

    Supérieure, CNRS-UMR 8538, Paris, France b Chengdu University of Technology, Chengdu, China c Institut de between the Sichuan Basin and the Tibetan plateau and a horizontal discontinuity at 15 km depth, which may.9 the Wenchuan earthquake on the western margin of the Sichuan Basin is arguably the largest intracontinental

  9. Sichuan Apollo Solar Science Technology Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology Co LtdOhio:ZhangjiaduBhavaniSichuan Apollo Solar

  10. Sichuan Bahe Hydroelectric Development Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology Co LtdOhio:ZhangjiaduBhavaniSichuan Apollo

  11. Sichuan Baoxing Fengtongzhai Hydropower Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology Co LtdOhio:ZhangjiaduBhavaniSichuan ApolloBaoxing

  12. Sichuan Chaolei Industry Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology Co LtdOhio:ZhangjiaduBhavaniSichuan

  13. Sichuan Dachuan Power Generation Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology Co LtdOhio:ZhangjiaduBhavaniSichuanPower

  14. Sichuan Dingneng Power Development Group Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology Co LtdOhio:ZhangjiaduBhavaniSichuanPowerDingneng

  15. Acoustic emission intrusion detector

    DOE Patents [OSTI]

    Carver, Donald W. (Knoxville, TN); Whittaker, Jerry W. (Knoxville, TN)

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  16. Assessing intrusiveness of smartphone apps

    E-Print Network [OSTI]

    Zhang, Fan, M. Eng. Massachusetts Institute of Technology

    2012-01-01

    We tackle the challenge of improving transparency for smartphone apps by focusing on the intrusiveness component of assessing privacy risk. Specifically, we develop a framework for qualitatively assessing and quantitatively ...

  17. Gas intrusion into SPR caverns

    SciTech Connect (OSTI)

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

    1995-12-01

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  18. Gravity-driven intrusions in stratified fluids

    E-Print Network [OSTI]

    Maurer, Benjamin Dudley

    2011-01-01

    5.5.1 Five interleaving interfacial gravity currents 5.5.2Ten interleaving interfacial gravity currents . 5.6partial- depth intrusive gravity currents,” Atmosphere -

  19. Anomaly Intrusion Detection in Dynamic Execution Environments

    E-Print Network [OSTI]

    New Mexico, University of

    of Microsoft's .NET project [10]. These technologies will further decouple hardware and software, allowing intrusion detection with extremely low performance penal- ties. Because each virtual machine (VM to improve intrusion detection[27, 36, 3]. Several such systems have been constructed, many with the idea

  20. WATER INTRUSION POLICY Procedure: 6.22

    E-Print Network [OSTI]

    Jia, Songtao

    WATER INTRUSION POLICY Procedure: 6.22 Version: 2.0 Effective: 6/28/2013 1 A. Purpose: 1. To prevent microbial amplification from water damage affecting the safety and comfort of area occupants. 2 in affected areas. 3. To describe a unified set of procedures for addressing water intrusions. B

  1. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  2. Magnitude, Direction, and Interpretation: Formation Factors of Archaeological Assemblages

    E-Print Network [OSTI]

    Johnson, Ryan Jerald

    2012-05-31

    ........................................................................................ 35 Chapter 4: The Analogical Gap .................................................................................................................... 37 The Surface Assemblage as a Sand Pile...

  3. Gravity-Driven Intrusions in Stratified Fluids

    E-Print Network [OSTI]

    Maurer, Benjamin D.

    2011-01-01

    5.5.1 Five interleaving interfacial gravity currents 5.5.2Ten interleaving interfacial gravity currents . 5.6in Iceland showing multiple gravity-driven intrusions c ´

  4. Automated intrusion recovery for web applications

    E-Print Network [OSTI]

    Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology

    2013-01-01

    In this dissertation, we develop recovery techniques for web applications and demonstrate that automated recovery from intrusions and user mistakes is practical as well as effective. Web applications play a critical role ...

  5. Intrusion Detection 1 02/09/00 Computer System Intrusion Detection

    E-Print Network [OSTI]

    Lee, Ruby B.

    Intrusion Detection 1 02/09/00 Computer System Intrusion Detection: A Survey1 Anita K. Jones in computer systems increases in importance as computers are increasingly integrated into the systems that we detection as performed in software in the context of operating systems for a single computer, a distributed

  6. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect (OSTI)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  7. Vapor intrusion modeling : limitations, improvements, and value of information analyses

    E-Print Network [OSTI]

    Friscia, Jessica M. (Jessica Marie)

    2014-01-01

    Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

  8. Non-intrusive fault detection in reciprocating compressors

    E-Print Network [OSTI]

    Schantz, Christopher James

    2011-01-01

    This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

  9. Considering Attack Complexity: Layered Intrusion Tolerance

    E-Print Network [OSTI]

    Krings, Axel W.

    . Ubiquitous access translates to huge increases in the risk of external intrusion. Another factor contributing, design and test efforts are of- ten motivated by the probability of faults, e.g. Probability Risk. Automation: Any solution should re- quire the least amount of human in- tervention. Labor intensive solutions

  10. Asynchronous intrusion recovery for interconnected web services

    E-Print Network [OSTI]

    Sabatini, David M.

    Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, and tracking down and recovering from such an attack re- quires significant manual effort. Web services for such web services. Aire addresses several challenges, such as propagating repair across services when some

  11. Distributed fiber optic moisture intrusion sensing system

    DOE Patents [OSTI]

    Weiss, Jonathan D. (Albuquerque, NM)

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  12. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  13. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  14. Monitoring CO2 intrusion and associated geochemical transformations...

    Office of Scientific and Technical Information (OSTI)

    Monitoring CO2 intrusion and associated geochemical transformations in a shallow groundwater system using complex electrical methods Citation Details In-Document Search Title:...

  15. Impacts of past glaciation events on contemporary fish assemblages

    E-Print Network [OSTI]

    Pyron, Mark

    were characterized by Cyprinidae and Catostomidae assemblages with high abundances of tolerant fishes by Cyprinidae, Catostomidae, Centrarchidae and Percidae families with increased abundances of intolerant fishes

  16. Freshwater Flow, Saltwater Intrusion, Paper Mill Effluent, and Fish Assemblage Structure in the Lower Neches River, Texas 

    E-Print Network [OSTI]

    Pizano, Rebecca I

    2013-06-11

    during fall 2011 and summer 2012, after a season of rain. During fall 2011, sites surveyed above the barrier had lower salinity but similarly low dissolved oxygen (DO) levels compared with sites surveyed below the barrier. Salinity levels during fall 2011...

  17. Characterizing and Improving Distributed Intrusion Detection Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  18. Intrusion Detection, Diagnosis, and Recovery with SelfSecuring Storage

    E-Print Network [OSTI]

    Intrusion Detection, Diagnosis, and Recovery with Self­Securing Storage John Strunk, Garth Goodson Carnegie Mellon University Pittsburgh, 15213 Abstract Self­securing storage turns storage devices active parts of intrusion survival strategy. From behind storage interface (e.g., SCSI CIFS), a self

  19. Convective injection into stratospheric intrusions Cameron R. Homeyer,1

    E-Print Network [OSTI]

    Pan, Laura

    Convective injection into stratospheric intrusions Cameron R. Homeyer,1 Kenneth P. Bowman,1 Laura L, are not entirely understood. This study presents direct observations of moist convection penetrating into stratospheric intrusions. The characteristics of convective injection are shown by using in situ aircraft

  20. Flagging Aberrant Sites and Assemblages in Restoration Projects

    E-Print Network [OSTI]

    Pretoria, University of

    describe a technique to flag those sites and assemblages that tend to develop aberrantly. We use data on a chronosequence of rehabilitating dune forests. Using this technique, we show that a bird assemblage on one habitation. In essence, the technique uses a permutation test to identify ecological variables

  1. Intrusion recovery for database-backed web applications

    E-Print Network [OSTI]

    Chandra, Ramesh

    Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes. Warp repairs ...

  2. Shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Ramsey, Jack S

    2004-01-01

    The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM ...

  3. Bloom Filter Based Intrusion Detection for Smart Grid 

    E-Print Network [OSTI]

    Parthasarathy, Saranya

    2012-07-16

    This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n...

  4. Potential for radionuclide redistribution due to biotic intrusion...

    Office of Scientific and Technical Information (OSTI)

    potentially lead to the exposure to members of the public. The potential amount of contamination deposited on the ground surface, due to plant intrusion into buried waste, is a...

  5. Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks 

    E-Print Network [OSTI]

    Hassanzadeh, Amin

    2014-05-03

    The problem of intrusion detection in wireless mesh networks (WMN) is challenging, primarily because of lack of single vantage points where traffic can be analyzed and the limited resources available to participating nodes. Although the problem has...

  6. Harmonic approaches to non-intrusive load diagnostics

    E-Print Network [OSTI]

    Fuller, Ashley E. (Ashley Eliot)

    2008-01-01

    The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

  7. Minimally intrusive strategies for fault detection and energy monitoring

    E-Print Network [OSTI]

    Cox, Robert Williams, 1979-

    2006-01-01

    This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

  8. Improving shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

    2008-01-01

    The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

  9. Video Installation Design: Appropriation and Assemblage As Projection Surface Geometry 

    E-Print Network [OSTI]

    Weaver, Timothy A.

    2010-07-14

    This area of research focuses on the use of video projections in the context of fine art. Emphasis is placed on creating a unique video installation work that incorporates assemblage and appropriation as a means to develop multiple complex...

  10. Fish assemblages on coral reefs in Guanaja, Bay Islands, Honduras 

    E-Print Network [OSTI]

    Mahendran, Christopher Kandiah

    1999-01-01

    Species composition and relative abundance of ichthyofaunal assemblages on reefs surrounding Guanaja, Bay Islands, Honduras were censused from June through December 1996. Transect and random swim surveys were used to characterize community structure...

  11. Epifaunal Assemblages on Deep-water Corals in Roatan, Honduras 

    E-Print Network [OSTI]

    Lavelle, Katherine

    2012-10-30

    = Luna Beach, LWR= Lawson?s Rock, OLS= Old Loafer?s, SDM= Sueno del Mar, SDR= Sueno del Bahia). Table 2. Absolute abundance of epifaunal species at study sites (AKR= Anthony?s Key, GBB= Gibson Bight, HMB= Half Moon Bay, LBE= Luna Beach, LWR= Lawson...= Half Moon Bay, LBE= Luna Beach, LWR= Lawson?s Rock, OLS= Old Loafer?s, SDM= Sueno del Mar, SDR= Sueno del Bahia). Figure 4. MDS plot of epifaunal assemblages by depth zone (m). Figure 5. MDS plot of epifaunal assemblages by coral substrate. Figure...

  12. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    SciTech Connect (OSTI)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-11-14

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  13. Toward Cost-Sensitive Modeling for Intrusion Detection Computer Science Department

    E-Print Network [OSTI]

    Toward Cost-Sensitive Modeling for Intrusion Detection Wenke Lee Computer Science Department North,ezk,weaselg@cs.columbia.edu Abstract Intrusion detection systems need to maximize security while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion detection models. We examine the major cost

  14. Using Hidden Markov Models to Evaluate the Risks of Intrusions

    E-Print Network [OSTI]

    Vigna, Giovanni

    Using Hidden Markov Models to Evaluate the Risks of Intrusions System Architecture and Model limited to manual risk evaluations that are not suitable for real-time use. In this paper, we introduce and evaluate network and system risk. These approaches are generally limited to manual processes

  15. Evaluation of Non-intrusive Traffic Detection Technologies Phase III

    E-Print Network [OSTI]

    Minnesota, University of

    TPF-5(171) Evaluation of Non-intrusive Traffic Detection Technologies Ð Phase III #12 not intrude into pavement for installation. ·! Sensors above, below or to the side of the roadway qualify;Miovision #12;Miovision #12;Laser-based sensors #12;PEEK AxleLight #12;TIRTL #12;TIRTL #12;#12;#12;#12;

  16. Multi-Level Alert Clustering for Intrusion Detection Sensor Data*

    E-Print Network [OSTI]

    Siraj, Ambareen

    multiple, diverse sensors. Intelligent sensor fusion of runtime behavior data is critical for such systemsMulti-Level Alert Clustering for Intrusion Detection Sensor Data* Ambareen Siraj Rayford B. Vaughn sensors that monitor security violations throughout the network. The outputs of the sensors must be fused

  17. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect (OSTI)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  18. SchoolFEFLOW Exercise Salt Intrusion From Top

    E-Print Network [OSTI]

    Kornhuber, Ralf

    Summer SchoolFEFLOW® Exercise Salt Intrusion From Top Vertical cross section #12;Summer SchoolSalt refinement (via Rubberbox and Border Options) FEFLOW Mesh Generation Height approx. 100 m #12;Summer SchoolSalt time stepping, FE/BE time integration Final time: 36500 days (100 years) #12;Summer SchoolSalt

  19. Visual monitoring environments, such as intrusion detection systems, debugging

    E-Print Network [OSTI]

    Erbacher, Robert F.

    Abstract Visual monitoring environments, such as intrusion detection systems, debugging Database Visualization, On-Line Monitoring 1. Introduction Most environments developed by or with the aid environments, and feature extraction systems, require that a user familiar with the target domain examine, most

  20. Analysis and Application of Node Layout Algorithms for Intrusion Detection

    E-Print Network [OSTI]

    Erbacher, Robert F.

    monitoring environment aids system administrators in keeping track of the activities on such systems for complete analysis and monitoring of the environment. Developing an effective organization of the nodes or inconsequential. Our intrusion detection monitoring environment [6, 7] is geared towards aiding in this analysis

  1. LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED

    E-Print Network [OSTI]

    Smith, Sean W.

    challenge, since on top of the resource restrictions inherent to embedded devices, SCADA systems must to intrusion detection for SCADA systems, and are currently porting Autoscopy to actual power hardware to test operating as part of a SCADA system, where this logic applies to the control of potentially hazardous

  2. Artificial Intelligence and Intrusion Detection: Current and Future Jeremy Frank

    E-Print Network [OSTI]

    Yoo, S. J. Ben

    Artificial Intelligence and Intrusion Detection: Current and Future Directions Jeremy Frank frank. Artificial Intelligence techniques can reduce the human effort required to build these systems and can data. We survey uses of artificial intelligence methods in ID, and present an example using feature

  3. Substorm triggering by new plasma intrusion: THEMIS allsky imager observations

    E-Print Network [OSTI]

    Mende, Stephen B.

    Click Here for Full Article Substorm triggering by new plasma intrusion: THEMIS allsky imager) and followed by a northsouth (NS) arc moving equatorward toward the onset latitude. Because of the linkage by enhanced earthward plasma flows associated with enhanced reconnection near the preexisting openclosed field

  4. Minimizing Intrusiveness in Home Energy Measurement David Lachut

    E-Print Network [OSTI]

    Rollins, Sami

    home energy measurement systems exist, they are often intrusive--requiring several physical components of a system for compre- hensive home energy measurement and analyze the resource requirements of the basic techniques for reducing the resource require- ments of the system. Our techniques reduce the energy foot

  5. Special Publication 800-94 Guide to Intrusion Detection

    E-Print Network [OSTI]

    of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical) Recommendations of the National Institute of Standards and Technology KarenScarfone PeterMell #12;Guide to Intrusion Detection and Prevention Systems (IDPS) Recommendations of the National Institute of Standards

  6. PRIMARY RESEARCH PAPER Xanthophyceaen assemblages during winterspring flood

    E-Print Network [OSTI]

    PRIMARY RESEARCH PAPER Xanthophyceaen assemblages during winter­spring flood: autecology winter­spring flood. Our studies have shown that these species differ in their ecological requirements are frequently shallow and emerge only during winter­spring and summer flood events. They persist only

  7. Fossil evidence for serpentinization fluids fueling chemosynthetic assemblages

    E-Print Network [OSTI]

    Demouchy, Sylvie

    Fossil evidence for serpentinization fluids fueling chemosynthetic assemblages Franck Lartauda,b,1 years, Lost City on the Mid-Atlantic Ridge (MAR) is remarkable both for its alkaline fluids derived from these fluids. Despite high concentrations of reduced chemicals in the fluids, this unique example of a serpenti

  8. The analysis and conservation of the Belle footwear assemblage 

    E-Print Network [OSTI]

    Randolph, Anthony G., Jr

    2003-01-01

    , predominantly in the form of shoes. This thesis first proposes to analyze the Belle footwear assemblage both as a representation of seventeenth century French culture and as a facet of La Salle's final voyage. The harsh environment of the sea floor, however...

  9. Formalizing Sensitivity in Static Analysis for Intrusion Detection Henry Hanping Feng # , Jonathon T. Giffin + , Yong Huang # ,

    E-Print Network [OSTI]

    Miller, Barton P.

    of Electrical and Computer Engineering University of Massachusetts--Amherst {hfeng­based intrusion detection system (HIDS) monitors execution of a process to identify potentially mali­ cious

  10. Intrusion Margins and Associated Fractures | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8, 13Renewable PowerMismatch | OpenTechnology andIntrusion

  11. Non-Intrusive Cognitive Radio Networks based on Smart Antenna Technology

    E-Print Network [OSTI]

    Liu, Xin

    spectral efficiency. We investigate a flexible non-intrusive cognitive radio network based on smart antenna to the primary receiver (PR) is either minimized or constrained. Combined with transmission power controlNon-Intrusive Cognitive Radio Networks based on Smart Antenna Technology Senhua Huang, Zhi Ding

  12. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  13. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur for implementation across multiple resource constrained SCADA field devices in the smart grid. The predictable and regular nature of the SCADA communication patterns is exploited to detect intrusions in the field devices

  14. A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    1 A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding/intrusion-tolerant data storage scheme based on network coding and homomorphic fingerprinting in volatile WSNs (Sherman) Shen, Fellow, IEEE Abstract--Recently, distributed data storage has gained in- creasing

  15. Characterizing coal and mineral mines as a regional source of stress to stream fish assemblages

    E-Print Network [OSTI]

    Characterizing coal and mineral mines as a regional source of stress to stream fish assemblages, impervious surface or urban land use), mining had a more pronounced and consistent impact on fish assemblages biota to coal and mineral mines located in stream catchments have historically been conducted

  16. Fish Assemblages and Substrates in the Middle Wabash River, USA Robert Mueller, Jr.1,2

    E-Print Network [OSTI]

    Pyron, Mark

    Fish Assemblages and Substrates in the Middle Wabash River, USA Robert Mueller, Jr.1,2 and Mark Pyron1 We collected fishes at 28 sites of the middle Wabash River, Indiana, using a boat electrofisher for fish assemblage variation that was explained by variation in water depth and substrate frequency

  17. Composition and temporal dynamics of a temperate rocky cryptobenthic sh assemblage

    E-Print Network [OSTI]

    explained by the arrival of new recruits of some of the most abundant species in the assemblage. Assemblage). The ecological importance of cryptobenthic ¢sh, as energy mediators (Depczynski & Bellwood, 2003), justi¢es an increased e¡ort aimed at a deeper understanding of this overlooked component of the rocky coast ¢sh

  18. PLANT ASSEMBLAGE STRUCTURE ON BARRIER ISLAND `PIMPLE' DUNES AT THE VIRGINIA COAST RESERVE

    E-Print Network [OSTI]

    Lawrence, Deborah

    PLANT ASSEMBLAGE STRUCTURE ON BARRIER ISLAND `PIMPLE' DUNES AT THE VIRGINIA COAST RESERVE LONG ASSEMBLAGE STRUCTURE ON BARRIER ISLAND `PIMPLE' DUNES AT THE VIRGINIA COAST RESERVE LONG-TERM ECOLOGICAL', small, rounded dunes forming along main dune ridges of the barrier islands. There are distinct plant

  19. IKOS 101: 398410, 2003 Comparing species richness among assemblages using sample units

    E-Print Network [OSTI]

    Machado, Glauco

    IKOS 101: 398­410, 2003 Comparing species richness among assemblages using sample units: why, R. J. 2003. Comparing species richness among assemblages using sample units: why not use´ria Natural, Inst. de Biologia, Uni6. Estadual de Campinas, CP 6109, BR-13083-970 Campinas, SP, Brazil

  20. Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner

    E-Print Network [OSTI]

    Cheung, Steven

    Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong In a model-based intrusion detection approach for protecting SCADA networks, we construct models and a prototype implementation of them for monitoring Modbus TCP networks. Keywords: SCADA security, intrusion

  1. Diagnostic indicators for shipboard systems using non-intrusive load monitoring

    E-Print Network [OSTI]

    DeNucci, Thomas W

    2005-01-01

    Field studies have demonstrated that the Non-Intrusive Load monitor (NILM) can provide real-time indication of the condition of electro-mechanical systems on board naval vessels. Results from data collected from engineering ...

  2. Evaluation of Non-Intrusive Load Monitoring for shipboard cycling system diagnostics

    E-Print Network [OSTI]

    Mosman, James P. (James Paul)

    2006-01-01

    The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to determine the operating schedule of all of the major loads on an electrical service. Additionally, the NILM can use its ...

  3. Interpreting human activity from electrical consumption data through non-intrusive load monitoring

    E-Print Network [OSTI]

    Gillman, Mark Daniel

    2014-01-01

    Non-intrusive load monitoring (NILM) has three distinct advantages over today's smart meters. First, it offers accountability. Few people know where their kWh's are going. Second, it is a maintenance tool. Signs of wear ...

  4. An analog and digital data acquisition system for Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    Clifford, Zachary Alan

    2009-01-01

    Non-Intrusive Load Monitoring (NILM) is a method for characterizing and monitoring discrete loads connected to a power distribution system. This can include a ship, a car, or a utility distribution system. The entire concept ...

  5. Osmotic pressure effects upon intrusion of liquid electrolytes inside hydrophobic MOF's

    E-Print Network [OSTI]

    Michelin-Jamois, M; Charlaix, E; Vigier, G

    2014-01-01

    High pressure water intrusion in hydrophobic nanoporous media have been studied in relation with energy storage. It has already been showed that addition of electrolytes in water increases intrusion pressure of liquid leading to an enhancement of storing capacities. We demonstrate here that for a number of salt, a very simple van't Hoff law can explain intrusion and extrusion excess pressures compared with the pure water case. Our results suggest that only pure water can penetrate the pores, the ions being quartered in the bulk liquid around nanoporous medium. This selectivity explains very high pressures for very concentrated ions reported by Tzanis et al (2014). Finally, a partial intrusion of NaI and LiI is observed. This effect could be explained on the basis of particular behaviour or iodide ions over hydrophobic surfaces.

  6. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    SciTech Connect (OSTI)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems.

  7. Real-time processing of a long perimeter fiber optic intrusion system 

    E-Print Network [OSTI]

    Snider, William Timothy

    2009-09-30

    This thesis reports on recent advances made in real-time intruder detection for an intrusion system developed at Texas A&M University that utilizes a phase-sensitive optical time-domain reflectometer. The system uses light ...

  8. Non-intrusive water utility monitoring and free-space load monitoring

    E-Print Network [OSTI]

    Neuman, Sabrina M

    2011-01-01

    This work presents a non-intrusive, single-point sensing scheme to monitor the water usage for various loads on a water utility pipe network through the vibration of a pipe near the water intake source. Experiments with ...

  9. Effects of droplet size on intrusion of sub-surface oil spills

    E-Print Network [OSTI]

    Chan, Godine Kok Yan

    2013-01-01

    This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

  10. WIND: Workload-aware INtrusion Detection Sushant Sinha, Farnam Jahanian, and Jignesh M. Patel

    E-Print Network [OSTI]

    Jahanian, Farnam

    WIND: Workload-aware INtrusion Detection Sushant Sinha, Farnam Jahanian, and Jignesh M. Patel an adaptive algorithm that systematically profiles attack signatures and network traffic to generate a high

  11. Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    McKay, Thomas Duncan

    2006-01-01

    This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

  12. Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants

    E-Print Network [OSTI]

    Greene, William C. (William Calvin)

    2005-01-01

    The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

  13. The influence of littoral zone structural complexity on fish assemblages in Lake Conroe, TX 

    E-Print Network [OSTI]

    Trial, Perry Felix

    1999-01-01

    The littoral zone of an East Texas reservoir was surveyed to determine if any characteristic fish assemblages were associated with four different habitat types with varying levels of structural complexity. A stratified ...

  14. Play and tolerance : notions of looseness in social and material assemblages

    E-Print Network [OSTI]

    Voorhees, Jeremy, 1978-

    2004-01-01

    The material scenario provides the most illustrative of entry points into this collection of evidence embodying the difference between play and tolerance. In a material assemblage, the looseness in a joint (expansion, pin, ...

  15. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  16. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Patents [OSTI]

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  17. Analytical model of surface uplift above axisymmetric flat-lying magma intrusions: Implications for sill emplacement and geodesy

    E-Print Network [OSTI]

    Scheibert, Julien

    Analytical model of surface uplift above axisymmetric flat-lying magma intrusions: Implications model of surface uplift upon sills and laccoliths, based on the formulation of a thin bending plate formulation, our model accounts for (i) axi-symmetrical uplift, (ii) both upon and outside the intrusion

  18. 29.01.03. M1.11 Information Resources Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.11 Information Resources ­ Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.11 Information Resources ­ Intrusion Detection Approved July 18, 2005 Revised April 27 security policy. As information systems grow in complexity, effective security systems must evolve

  19. Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a

    E-Print Network [OSTI]

    Clement, Prabhakar

    of the major environmental issues faced by several coastal cit- ies in India, China, and Mexico [3Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a , T. Prabhakar Clement a and Environmental Science, Seoul National University, Seoul 151-742, Republic of Korea a r t i c l e i n f o Article

  20. doi:10.1038/nature04507 Uplift, Thermal Unrest, and Magma Intrusion at

    E-Print Network [OSTI]

    doi:10.1038/nature04507 1 Uplift, Thermal Unrest, and Magma Intrusion at Yellowstone Caldera the last eruption, Yellowstone has remained restless, with high seismicity, continuing uplift infer that the observed pattern of uplift and subsidence results from variations in the movement

  1. Sensing Danger: Innate Immunology for Intrusion Detection Uwe Aickelin and Julie Greensmith

    E-Print Network [OSTI]

    Aickelin, Uwe

    Sensing Danger: Innate Immunology for Intrusion Detection Uwe Aickelin and Julie Greensmith School years ago through the so called `Danger Project' (EPSRC GR/S47809/01). Our conclusion then was that AIS developed as part of the Danger Project - the Dendritic Cell Algorithm (DCA) and the Toll-like Receptor

  2. Learning Cost-Sensitve Classification Rules for Network Intrusion Detection using RIPPER

    E-Print Network [OSTI]

    Yang, Junfeng

    Report CUCS-035-1999 Advanced Intelligent Systems CS4721 Spring 1999 Final Project Matthew Miller which can be used to test live network stream input in order to detect intrusions. This is done connections to build a set of connection profile records that can be useful in detection [Lee 99

  3. Modeling and Verification of Leaders Agreement in the IntrusionTolerant Enclaves Using PVS

    E-Print Network [OSTI]

    Tahar, Sofiène

    Modeling and Verification of Leaders Agreement in the Intrusion­Tolerant Enclaves Using PVS Mohamed issue in formal verification. It arises the problem of how much power should be given to a Byzantine Layouni 1 , Jozef Hooman 2 , and Sofiâ?? ene Tahar 1 1 Department of Electrical and Computer Engineering

  4. Modeling and Verification of Leaders Agreement in the Intrusion-Tolerant Enclaves Using PVS

    E-Print Network [OSTI]

    Tahar, Sofiène

    Modeling and Verification of Leaders Agreement in the Intrusion-Tolerant Enclaves Using PVS Mohamed]. Modeling Byzantine behavior has been always a big issue in formal verification. It arises the problem of how much power should be given to a Byzantine fault and how general the model should be to

  5. Towards a non-Intrusive Recognition of Anomalous System Behavior in Data Centers

    E-Print Network [OSTI]

    Roma "La Sapienza", Università di

    Towards a non-Intrusive Recognition of Anomalous System Behavior in Data Centers Roberto Baldoni1 system of a data cen- ter that is able to infer when the data center is getting into an anoma- lous behavior by analyzing the power consumption at each server and the data center network traffic

  6. Federated Access Control and Intrusion Detection for Grid Computing Li Zhou Clifford Neuman

    E-Print Network [OSTI]

    Hwang, Kai

    , the management of access control and provision of intrusion detection is critical for grid services. Security a virtual #12;organization. Version 3 of Globus Toolkit (GT3) [8] and its accompanying Grid Security incorporate multiple grid security mechanisms and local security mechanisms together. The interrelation (AND

  7. Experimental and numerical investigation of saltwater intrusion dynamics in flux-controlled groundwater systems

    E-Print Network [OSTI]

    Clement, Prabhakar

    -controlled groundwater systems Sun Woo Chang1 and T. Prabhakar Clement1 Received 13 March 2012; revised 25 June 2012; accepted 12 July 2012; published 19 September 2012. [1] Sea level rise and reduction of groundwater fluxes change­induced hydrological variables, groundwater flux, on saltwater intrusion process. We have

  8. Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of a novel flow-based intrusion detection system. Based on the assumption that SCADA net- works are well facilities such as water distribution infrastructures, electricity generation plants and oil refineries need proposal to address the problem of intru- sion detection in SCADA networks. Based on the assumption

  9. Cognitive Radio Network as Wireless Sensor Network (III): Passive Target Intrusion Detection

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    --A Cognitive Radio Network (CRN) based Wireless Sensor Network (WSN), as an extension of CRN, is explored for radio frequency (RF) passive target intrusion detection. Compared to a cheap WSN, the CRN based WSN data col- lected by the CRN based WSN. Preliminary experimental results are quite encouraging

  10. Magnetic reconnection as a source of jets from a penumbral intrusion into a sunspot umbra

    E-Print Network [OSTI]

    Bharti, L; Hirzberger, J

    2015-01-01

    We present the results of high resolution co-temporal and co-spatial photospheric and chromospheric observations of sunspot penumbral intrusions. The data was taken with the Swedish Solar Telescope (SST) on the Canary Islands. Time series of Ca\\,II H images show a series of transient jets extending roughly 3000 km above a penumbral intrusion into the umbra. For most of the time series jets were seen along the whole length of the intruding bright filament. Some of these jets develop a clear $\\lambda$-shaped structure, with a small loop appearing at their footpoint and lasting for around a minute. In the framework of earlier studies, the observed transient $\\lambda$ shape of these jets strongly suggests that they are caused by magnetic reconnection between a curved arcade-like or flux-rope like field in the lower part of the penumbral intrusion and the more vertical umbral magnetic field forming a cusp-shaped structure above the penumbral intrusion.

  11. Design and Implementation of an Android Host-based Intrusion Prevention System

    E-Print Network [OSTI]

    Lui, John C.S.

    Design and Implementation of an Android Host-based Intrusion Prevention System Mingshen Sun , Min University {mssun, mzheng, cslui}@cse.cuhk.edu.hk, jiang@cs.ncsu.edu ABSTRACT Android has a dominating share in the mobile market and there is a significant rise of mobile malware targeting An- droid devices. Android

  12. A comparison of flooded forest and floating meadow fish assemblages in an upper Amazon floodplain

    E-Print Network [OSTI]

    Fussman, Gregor

    A comparison of flooded forest and floating meadow fish assemblages in an upper Amazon floodplain S of gillnets of different mesh-sizes were used to evaluate the degree to which contiguous and connected flooded forest and floating meadow habitats are characterized by distinct fish faunas during the flooding season

  13. Larval fish assemblages and mesoscale oceanographic structure along the Mesoamerican Barrier Reef System

    E-Print Network [OSTI]

    Larval fish assemblages and mesoscale oceanographic structure along the Mesoamerican Barrier Reef Caribbean region, and contains spawning sites for a number of reef fish species. Despite this, little is known of the distribution and transport of pelagic fish larvae in the area, and basic in situ

  14. Influence of mesoscale eddies on ichthyoplankton assemblages in the Gulf of Alaska

    E-Print Network [OSTI]

    Influence of mesoscale eddies on ichthyoplankton assemblages in the Gulf of Alaska ELIZABETH ATWOOD 98115, USA ABSTRACT Mesoscale eddies (100­200 km in diameter) propa- gating along the shelf in these eddies was examined using data from a cruise in 2005 that sampled three eastern Gulf of Alaska mesoscale

  15. THE INVERTEBRATE ASSEMBLAGE ASSOCIATED WITH THE GIANT KELP, MACROCYSTIS PYRIFERA, AT SANTA CATALINA

    E-Print Network [OSTI]

    . bottom (BII. The number of species collected from all zones was 114 and ranged from 51 to 75 for any the assemblage in numbers (341c]. 60 IMI. 51 % IBIl. biomass (34 IC!. 681MI. 67% IBIl. and number of species (20, copepods, mysids, and shrimps are presented. STUDY AREA The study area was Habitat Reef, located in Big

  16. NORTHEASTERN NATURALIST2006 13(3):353374 Local and Landscape Predictors of Fish-assemblage

    E-Print Network [OSTI]

    Dhindsa, Rajinder

    NORTHEASTERN NATURALIST2006 13(3):353­374 Local and Landscape Predictors of Fish,4 Abstract - We used local and landscape models to predict fish assemblages in the Great Swamp, NY, a region undergoing rapid development. Fish were surveyed across 17 sites. Fish-species richness, diversity, percent

  17. Phytolith assemblages and opal concentrations from modern soils differentiate temperate grasslands of controlled composition on

    E-Print Network [OSTI]

    Thomas, David D.

    Phytolith assemblages and opal concentrations from modern soils differentiate temperate grasslands on their silica record in topsoil in a controlled experiment. The differences in total biogenic opal concentration reserved. 1. Introduction Phytoliths are silica (opal) microfossils produced in tissues of higher plants

  18. Citizen Science System Assemblages: Toward Greater Understanding of Technologies to Support Crowdsourced

    E-Print Network [OSTI]

    Crowston, Kevin

    Citizen Science System Assemblages: Toward Greater Understanding of Technologies to Support crowston@syr.edu ABSTRACT We explore the nature of technologies to support citizen science, a method different citizen science platforms may be comprised of widely varying functionalities, yet still support

  19. Citizen Science System Assemblages: Understanding the Technologies that Support Crowdsourced Science

    E-Print Network [OSTI]

    Crowston, Kevin

    Citizen Science System Assemblages: Understanding the Technologies that Support Crowdsourced@syr.edu ABSTRACT We explore the nature of technologies to support citizen science, a method of inquiry citizen science platforms may be comprised of widely varying functionalities, yet still support relatively

  20. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  1. Optimal Three-Material Wheel Assemblage of Conducting and Elastic Composites

    E-Print Network [OSTI]

    Andrej Cherkaev

    2011-05-22

    We describe a new type of three material microstructures which we call wheel assemblages, that correspond to extremal conductivity and extremal bulk modulus for a composite made of two materials and an ideal material. The exact lower bounds for effective conductivity and matching laminates was found in (Cherkaev, 2009) and for anisotropic composites, in (Cherkaev, Zhang, 2011). Here, we show different optimal structures that generalize the classical Hashin-Shtrikman coated spheres (circles). They consist of circular inclusions which contain a solid central circle (hub) and radial spikes in a surrounding annulus, and (for larger volume fractions of the best material) an annulus filled with it. The same wheel assemblages are optimal for the pair of dual problems of minimal conductivity (resistivity) of a composite made from two materials and an ideal conductor (insulator), in the problem of maximal effective bulk modulus of elastic composites made from two linear elastic material and void, and the dual minimum problem.

  2. Abundance, diversity, and resource use in an assemblage of Conus species in Enewetak lagoon

    SciTech Connect (OSTI)

    Kohn, A.J.

    1980-10-01

    Eight species of the gastropod genus Conus co-occur in sand substrate and an adjacent meadow of Halimeda stuposa in Enewetak lagoon, an unusually diverse assemblage for this type of habitat. Population density is high, and large species predominate; they represent all major feeding groups in the genus: predators on polychaetes, enteropneusts, gastropods, and fishes. Although the two most common Conus species eat primarily the same prey species, they mainly take prey of different sizes in different microhabitats. The results suggest that sufficient microhabitat heterogeneity and prey diversity exist to permit spatial segregation and specialization on different prey resources by the different Conus species present. Between-species dissimilarity in resource use thus agrees with previous observations on more diverse Conus assemblages of subtidal coral reef platforms. Prey species diversity is inversely related to body size, confirming and extending a previously identified pattern among Conus species that prey on sedentary polychaetes.

  3. Assessing the Oceanographic Conditions and Distribution of Reef Fish Assemblages Throughout the Galápagos Islands Using Underwater Visual Survey Methods 

    E-Print Network [OSTI]

    Durkacz, Stephanie

    2014-12-12

    surrounding the archipelago that is divided into several zones based on the dispersal of fauna and marine resources. The goal of this thesis was to assess the distribution and abundance of reef fish assemblages throughout the GMR and to contribute...

  4. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application

    DOE Patents [OSTI]

    Piper, T.C.

    1980-09-24

    An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  5. Acculturation in the Upper Middle Missouri Valley as Reflected in Modified Bone Assemblages

    E-Print Network [OSTI]

    Weston, Timothy

    1986-05-01

    Gliders 207 Piercing Tools (Awls ) • 20 Tubes/Beads 208 Expedient Tools 211 Other Tool Categories 214 Horn Core/Frontal Tools. 21 Fleshing Tools 21 Cancellous Tools 7 Fish Hooks 8 Polished Fragments • • 221 Ochre-Stained Bone 22 Ornaments . • 22... Components 251 Big Hidatsa Original Components 4 Condensed Components 25 Lower Hidatsa 257 Sakakawea 260 Big Hidatsa 3 Other Measures of Change •. •. 266 Metal/Stone Modification 26 Predominant Method of Manufacture.... .. 271 Combined Site Assemblages...

  6. Revisiting Copano Bay, Texas: an exceptional long-term record of ecological communities and their associated death assemblages 

    E-Print Network [OSTI]

    Ebnother, Danielle Dawn

    2006-10-30

    -1 REVISITING COPANO BAY, TEXAS: AN EXCEPTIONAL LONG-TERM RECORD OF ECOLOGICAL COMMUNITIES AND THEIR ASSOCIATED DEATH ASSEMBLAGES A Thesis by DANIELLE DAWN EBNOTHER Submitted to the Office of Graduate Studies of Texas A&M University in partial... DEATH ASSEMBLAGES A Thesis by DANIELLE DAWN EBNOTHER Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair...

  7. Phylogenetic beta diversity in bacterial assemblages across ecosystems: deterministic versus stochastic processes

    SciTech Connect (OSTI)

    Wang, Jianjun; Shen, Jianhaua; Wu, Yucheng; Tu, Chen; Soininen , Janne; Stegen, James C.; He, Jizheng; Liu, Xingqi; Zhang, Lu; Zhang, Enlou

    2013-02-28

    Increasing evidence emerged for non-random spatial distributions for microbes, but the underlying processes resulting in microbial assemblage variation among and within Earth’s ecosystems is still lacking. For instance, some studies showed that the deterministic processes by habitat specialization are important, while other studies hold that bacterial communities are assembled by neutral forces. Here we examine the relative importance of deterministic and stochastic processes for bacterial communities from subsurface environments, as well as stream biofilm, lake water, lake sediment and soil using pyrosequencing of 16S rRNA gene. We show that there is a general pattern in phylogenetic signal in species niches across recent evolutionary time for all studied habitats, enabling us to infer the influences of community assembly processes from patterns of phylogenetic turnover in community composition. The phylogenetic dissimilarities among habitat types were significantly higher than within them, and the communities were clustered according to their original habitat types. For communities within habitat types, the highest phylogenetic turnover rate through space was observed in subsurface environments, followed by stream biofilm on mountainsides, whereas the sediment assemblages across regional scales showed the lowest turnover rate. Quantifying phylogenetic turnover as the deviation from a null expectation suggested that measured environmental variables imposed strong selection on bacterial communities for nearly all sample groups, and for three sample groups, that spatial distance reflects unmeasured environmental variables that impose selection, as opposed to spatial isolation. Such characterization of spatial and environmental variables proved essential for proper interpretation of partial mantel results based on observed beta diversity metrics. In summary, our results clearly indicate a dominant role of deterministic processes on bacterial assemblages and highlight that bacteria show strong habitat associations that have likely emerged through evolutionary adaptation.

  8. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    SciTech Connect (OSTI)

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  9. Hydrothermal formation of Clay-Carbonate alteration assemblages in the Nili Fossae region of Mars

    E-Print Network [OSTI]

    Brown, Adrian J; Baldridge, Alice M; Crowley, James K; Bridges, Nathan T; Thomson, Bradley J; Marion, Giles M; Filho, Carlos R de Souza; Bishop, Janice L

    2014-01-01

    The Compact Reconnaissance Imaging Spectrometer for Mars (CRISM) has returned observations of the Nili Fossae region indicating the presence of Mg- carbonate in small (characterize these carbonate-bearing units. We applied absorption band mapping techniques to investigate a range of possible phyllosilicate and carbonate minerals that could be present in the Nili Fossae region. We also describe a clay-carbonate hydrothermal alteration mineral assemblage in the Archean Warrawoona Group of Western Australia that is a potential Earth analog to the Nili Fossae carbonate-bearing rock units. We discuss the geological and biological implications for hydrothermal processes on Noachian Mars.

  10. Late Pleistocene Nannofossil Assemblages and Time-Averaging in the Fossil Record [IODP Site U1419] 

    E-Print Network [OSTI]

    Patrick, Amanda Kacy

    2014-09-21

    and quantified at 1cm resolution across the marine isotope stage (MIS) 2 to 3 glacial/interglacial transition (Figure 2) to determine two distinct results. First, the section was evaluated to determine the yearly variability of the nannofossil assemblage... to identify a one-meter interval of core that spans the MIS 2-3 boundary. During the formation of ice, oxygen isotope 16 (O16) is preferentially used instead of O18 (Benton and Harper, 2009). This chemical tendency is what allows for the interpretation...

  11. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect (OSTI)

    Chen, Yan [Northwesten University] [Northwesten University

    2013-12-05

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  12. Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars

    SciTech Connect (OSTI)

    Villa, Andrea; Mussi, Valerio; Strano, Matteo

    2011-05-04

    The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

  13. Update on intrusive characterization of mixed contact-handled transuranic waste at Argonne-West

    SciTech Connect (OSTI)

    Dwight, C.C.; Jensen, B.A.; Bryngelson, C.D.; Duncan, D.S.

    1997-02-03

    Argonne National Laboratory and Lockheed Martin Idaho Technologies Company have jointly participated in the Department of Energy`s (DOE) Waste Isolation Pilot Plant (WIPP) Transuranic Waste Characterization Program since 1990. Intrusive examinations have been conducted in the Waste Characterization Area, located at Argonne-West in Idaho Falls, Idaho, on over 200 drums of mixed contact-handled transuranic waste. This is double the number of drums characterized since the last update at the 1995 Waste Management Conference. These examinations have provided waste characterization information that supports performance assessment of WIPP and that supports Lockheed`s compliance with the Resource Conservation and Recovery Act. Operating philosophies and corresponding regulatory permits have been broadened to provide greater flexibility and capability for waste characterization, such as the provision for minor treatments like absorption, neutralization, stabilization, and amalgamation. This paper provides an update on Argonne`s intrusive characterization permits, procedures, results, and lessons learned. Other DOE sites that must deal with mixed contact-handled transuranic waste have initiated detailed planning for characterization of their own waste. The information presented herein could aid these other storage and generator sites in further development of their characterization efforts.

  14. The Dynamics of Steady, Partial-Depth Intrusive Gravity M. R. Flynn1,*, T. Boubarne2 and P. F. Linden2

    E-Print Network [OSTI]

    Flynn, Morris R.

    The Dynamics of Steady, Partial-Depth Intrusive Gravity Currents M. R. Flynn1,*, T. Boubarne2 and P] ABSTRACT Experiments of intrusive gravity currents generated by lock exchange offer insights into atmospher- ic and oceanic flows. However, whereas many previous investigations have considered the `full

  15. Abstract--Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. Port scanning is

    E-Print Network [OSTI]

    Aloul, Fadi

    precedence. Because, it is not feasible to build a secure system with no vulnerabilities, intrusion detection becomes an important area of research. An intrusion detection system (IDS) is an automated system designed Systems (IDS) is to protect the availability, confidentiality and integrity of critical networked

  16. Automatic intrusion recovery with system-wide history B.S., Korea Advanced Institute of Science and Technology (2009)

    E-Print Network [OSTI]

    2009-01-01

    Automatic intrusion recovery with system-wide history by Taesoo Kim B.S., Korea Advanced Institute of Science and Technology (2009) S.M., Massachusetts Institute of Technology (2011) Submitted for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2014 c Massachusetts

  17. Role of intrusion-induced salt mobility in controlling the formation of the enigmatic `Silverpit Crater', UK Southern North Sea

    E-Print Network [OSTI]

    Role of intrusion-induced salt mobility in controlling the formation of the enigmatic `Silverpit of several WNW­ESE-striking Cenozoic folds, including a buried salt withdrawal syncline in the axis of which-depositional diagenetic alteration and structural failure resulting from the geometry of their respective underlying salt

  18. WG Intrusion and Fraud Detection for Web Services Marc Dacir, Ulrich Flegel (chair), Ralph Holz, Norbert Luttenberger

    E-Print Network [OSTI]

    Flegel, Ulrich

    , among them e.g. value added service composition, Web 2.0-enhanced communication sys- tems (e.g. basedWG Intrusion and Fraud Detection for Web Services Marc Daciér, Ulrich Flegel (chair), Ralph Holz, Norbert Luttenberger Motivation Web services (WS) technology bears the promise to finally bring the power

  19. Numerical Model Investigation for Potential Methane Explosion and Benzene Vapor Intrusion Associated with High-Ethanol Blend

    E-Print Network [OSTI]

    Alvarez, Pedro J.

    Associated with High-Ethanol Blend Releases Jie Ma, Hong Luo, George E. DeVaull,§ William G. Rixey, and Pedro ABSTRACT: Ethanol-blended fuel releases usually stimulate methanogenesis in the subsurface, which could conditions exist. Ethanol- derived methane may also increase the vapor intrusion potential of toxic fuel

  20. There was no single characteristic fish assemblage that could be described for the oil platforms and natural

    E-Print Network [OSTI]

    Love, Milton

    .) fish assemblages residing on oil/gas production platforms and natural outcrops, and (2) describe platforms and natural outcrops of central and southern California. However, we identified a number partitioning in species composition, where northerly platforms show the influence of the Oregonian province

  1. Wave-swept rocky shores support a surprisingly diverse assemblage of organisms that includes members of virtually

    E-Print Network [OSTI]

    Denny, Mark

    Wave-swept rocky shores support a surprisingly diverse assemblage of organisms that includes members of virtually every animal phylum and both algae and vascular plants. In general, wave that hydrodynamic forces can play an important role in limiting the size of wave-swept plants and animals (Denny et

  2. Non intrusive sensors -- An answer to annulus pressure monitoring in subsea wellhead equipment

    SciTech Connect (OSTI)

    Adamek, F.C.; Jennings, C.; Aarskog, A.

    1995-12-01

    On offshore platform and jackup surface wellhead completions, there is the potential for leakage from the high pressure production tubing and casing strings into the low pressure outer casing string, or from poor cementing jobs. Historically, these completions maintain the capability of regularly monitoring wellhead annulus pressure so that appropriate action can be taken should a leak be detected. In the past, subsea completions have been oil producers, however, gas production, extreme reservoir pressures, and deeper waters are becoming common place. Although subsea wellhead technology and reliability have significantly improved with the introduction of the metal-to-metal sealing system, the potential for annulus pressure buildup still exists. Up to the present, the ability to monitor pressure beyond the first casing string has been virtually non-existent. This paper describes the design, development, testing, and application of non intrusive sensor technology for pressure measurement in subsea wellheads and production trees. The data and test results define and describe the phenomenon of ``inverse magnetostriction``. This phenomenon allows magnetic sensors to non intrusively penetrate three to four inches of steel in a subsea wellhead housing and measure annulus pressure from less than 30 psi to more than 15,000 psi. In addition, test data, charts, and graphs illustrate the sensor`s capability of differentiating between pressure, tension, compression, and bending stress imposed on the wellhead. The electronic interface description details how the data is obtained from the sensors, stored, and later transmitted to existing control systems or to the user interface at the surface via an ROV.

  3. Fluid-evaporation records preserved in salt assemblages in Meridiani rocks

    SciTech Connect (OSTI)

    Rao, M.N.; Nyquist, L.E.; Sutton, S.R.; Dreibus, G.; Garrison, D.H.; Herrin, J.

    2009-09-25

    We studied the inter-relationships between the major anions (SO{sub 3}, Cl, and Br) and cations (FeO, CaO and MgO) using elemental abundances determined by APXS in salt assemblages of RATted (abraded) rocks at Meridiani to characterize the behavior of fluids that infiltrated into this region on Mars. A plot of SO{sub 3} versus Cl for the abraded rocks yielded an unusual pattern, whereas the SO{sub 3}/Cl ratios versus Cl for the same rocks showed a monotonically decreasing trend represented by a hyperbola. The systematic behavior of the SO{sub 3} and Cl data in the documented rocks at Meridiani suggests that these anions behaved conservatively during fluid-rock interactions. These results further indicate that two kinds of fluids, referred to as SOL-I and SOL-II, infiltrated into Endurance/Eagle/Fram craters, where they underwent progressive evaporative concentration. SOL-I is a low pH fluid consisting of high SO{sub 3} and low Cl and high Br, (this fluid infiltrated all the way to the crater-top region), whereas SOL-II fluid of high pH with low SO{sub 3} and high Cl and low Br reached only an intermediary level known as the Whatanga contact at Endurance. Based on the FeO/MgO as well as CaO/MgO versus SO{sub 3}/Cl diagram for rocks above the Whatanga contact, the cation and anion relationships in this system suggest that the Fe{sup 2+}/SO{sub 4} and Ca{sup 2+}/SO{sub 4} ratios in SOL-I fluids at Meridiani were > 1 before the onset of evaporation based on the 'chemical divide' considerations. Below the Whatanga contact, relatively dilute SOL-II fluids seem to have infiltrated and dissolved/flushed away the easily soluble Mg-sulfate/chloride phases (along with Br) without significantly altering the SO{sub 3}/Cl ratios in the residual salt assemblages. Further, Cl/Br versus Br in rocks above the Whatanga contact show a hyperbolic trend suggesting that Cl and Br behaved conservatively similar to SO{sub 3} and Cl in the SOL-1 fluids at Meridiani. Our results are consistent with a scenario involving two episodes (SOL-I and SOL-II) of groundwater recharge at Meridiani Planum.

  4. Velocityconductivity relationships for mantle mineral assemblages in Archean cratonic lithosphere based on a review of laboratory data and HashinShtrikman

    E-Print Network [OSTI]

    Jones, Alan G.

    Velocity­conductivity relationships for mantle mineral assemblages in Archean cratonic lithosphere Mineral physics Extremal bounds Velocity­conductivity relationship Can mineral physics and mixing theories. Using phenomenologically-derived state equations for individual minerals coupled with multi

  5. Non-Intrusive Experiemental Investigation of Multi-Scale Flow Behavior in Rod Bundle with Spacer-Grids 

    E-Print Network [OSTI]

    Dominguez Ontiveros, Elvis Efren

    2011-08-08

    , Yassin A. Hassan Committee Members, Kalyan Annamalai William Marlow Victor Ugaz Head of Department, Dennis L. O?Neal May 2010 Major Subject: Mechanical Engineering iii ABSTRACT Non-Intrusive Experimental Investigation... where the correlation coefficient becomes zero D2 D Two dimensional form of the velocity tensor dP Pressure drop f Fraction of the mean velocity g Acceleration due to gravity Dh Hydraulic diameter Lij Integral length scale N Total number...

  6. Distribution and diversity of ostracode assemblages from the Hamlin Shale and the Americus Limestone (Permian, Wolfcampian) in northeastern Kansas

    E-Print Network [OSTI]

    Peterson, R. M.; Kaesler, R. L.

    1980-07-11

    by an ostracode algal lime mudstone with desiccation fractures partially filled with gyp- sum. W.L. Fisher (1980, personal communica- tion) postulated a carbonate beach or shoal in central Jackson County indicated by inter- bedded pelleted lime mudstones... numbers. Peterson & Kaesler—Ostracode Assemblages in Northeastern Kansas 7 pellet lime packstones to grainstones. Some of these rocks, especially at locality 12, contain abundant ooids and exhibit low-angle cross stratification. They also contain...

  7. Behavior of iron in (Mg,Fe)SiO3 post-perovskite assemblages at Mbar pressures

    E-Print Network [OSTI]

    Jackson, Jennifer M.

    Behavior of iron in (Mg,Fe)SiO3 post-perovskite assemblages at Mbar pressures Jennifer M. Jackson,1- perovskite (PPv) structured (57 Fe,Mg)SiO3 has been measured in-situ at 1.12 and 1.19 Mbar at room. Sturhahn, O. Tschauner, M. Lerche, and Y. Fei (2009), Behavior of iron in (Mg,Fe)SiO3 post-perovskite

  8. Character of the diatom assemblage spanning a depositional transition in the Eastern Equatorial Pacific Ocean at 6.6 Ma 

    E-Print Network [OSTI]

    Brookshire, Brian Neville, Jr.

    2005-02-17

    in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE December 2003 Major Subject: Oceanography CHARACTER OF THE DIATOM ASSEMBLAGE SPANNING A DEPOSITIONAL TRANSITION IN THE EASTERN EQUATORIAL PACIFIC OCEAN AT 6.6 Ma A Thesis... by BRIAN NEVILLE BROOKSHIRE JR. Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved as to style and content by...

  9. Major shifts in calcareous phytoplankton assemblages through the Eocene-Oligocene transition of Tanzania and their implications for low-latitude primary production 

    E-Print Network [OSTI]

    Jones, Tom Dunkley; Bown, Paul R.; Pearson, Paul N.; Wade, Bridget S.; Coxall, Helen K.; Lear, Caroline H.

    2008-01-01

    phytoplankton assemblages through the Eocene-Oligocene transition of Tanzania and their implications for low-latitude primary production Tom Dunkley Jones, 1 Paul R. Bown, 2 Paul N. Pearson, 3 Bridget S. Wade, 4 Helen K. Coxall, 3 and Caroline H. Lear 3 Received... 28 April 2008; revised 30 June 2008; accepted 18 July 2008; published 22 October 2008. [1] A high-resolution record of exceptionally well preserved calcareous nannofossil assemblages from Tanzania is marked by two key transitions closely related...

  10. Experiments using non-intrusive particle tracing techniques for granular chute flows. Final report

    SciTech Connect (OSTI)

    Rosato, A.D.; Dave, R.N.; Fischer, I.S.

    1998-12-31

    The objective of this contract was to develop a system capable of non-intrusively tracking the motion of an individual particle for the study of granular flows down inclined chutes. The result of the project is a system capable of following the three-dimensional translational and rotational motion of an individual particle embedded with a flowing granular material. The basic system consists of a sphere embedded with three orthogonal transmitters emitting at different frequencies which induce voltages in an antenna array surrounding the flow regime. Analysis of the induced voltage signals within the framework of a derived model yields both the position and orientation of the sphere. Tests were performed in a small scale model chute as well as in a cylindrical vibrated granular bed, which clearly demonstrates the capability of the system. As a result of discussions at meetings held semi-annually for the Granular Flow Advanced Research Objectives (GFARO) contractors, it was deemed necessary to pursue an additional experimental program as part of this contract related to the measurement of sphere collision properties. The outcome of the work (reported in Appendix C) is the determination of certain properties which are needed for use in computer simulations and theory.

  11. Intrusive sampling and testing of ferrocyanide tanks, Hanford Site, Richland, Washington: Environmental Assessment

    SciTech Connect (OSTI)

    Not Available

    1992-02-01

    The proposed action involves intrusive sampling and testing of 24 Hanford Site single-shell waste tanks that contain ferrocyanide-nitrate/nitrite mixtures to determine the physical and chemical properties of the waste material. The Department of Energy (DOE) needs to take this action to help define the required controls to prevent or mitigate the potential for an accident during future characterization and monitoring of these tanks. Given the Unreviewed Safety Question associated with the consequences of a potential ferrocyanide nitrate/nitrite reaction, two safety assessments and this environmental assessment (EA) have been prepared to help ensure that the proposed action is conducted in a safe and environmentally sound manner. Standard operating procedures for sampling high-level waste tanks have been revised to reflect the potential presence of flammable or explosive mixtures in the waste. The proposed action would be conducted using nonsparking materials, spark resistant tools, and a portable containment enclosure (greenhouse) and plastic ground cover. The proposed activities involving Hanford Site ferrocyanide-containing tanks would be on land dedicated to DOE waste management.

  12. THIS WEEK Sichuan quake levels science city

    E-Print Network [OSTI]

    .S. Department of Energy (DOE). This week, DOE terminated the National Compact Stellarator Experiment (NCSX million and a completion date of 2009. But inApril, a DOE review showed that the cost had ballooned sciences in DOE's Office of Science. Had it been completed, the NCSX might have served as the prototype

  13. Sichuan Giastar Group | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co Ltd Jump to:

  14. Uniaxial creep as a control on mercury intrusion capillary pressure in consolidating rock salt

    SciTech Connect (OSTI)

    Dewers, Thomas; Heath, Jason E.; Leigh, Christi D.

    2015-09-01

    The nature of geologic disposal of nuclear waste in salt formations requires validated and verified two - phase flow models of transport of brine and gas through intact, damaged, and consolidating crushed salt. Such models exist in oth er realms of subsurface engineering for other lithologic classes (oil and gas, carbon sequestration etc. for clastics and carbonates) but have never been experimentally validated and parameterized for salt repository scenarios or performance assessment. Mo dels for waste release scenarios in salt back - fill require phenomenological expressions for capillary pressure and relative permeability that are expected to change with degree of consolidation, and require experimental measurement to parameterize and vali date. This report describes a preliminary assessment of the influence of consolidation (i.e. volume strain or porosity) on capillary entry pressure in two phase systems using mercury injection capillary pressure (MICP). This is to both determine the potent ial usefulness of the mercury intrusion porosimetry method, but also to enable a better experimental design for these tests. Salt consolidation experiments are performed using novel titanium oedometers, or uniaxial compression cells often used in soil mech anics, using sieved run - of - mine salt from the Waste Isolation Pilot Plant (WIPP) as starting material. Twelve tests are performed with various starting amounts of brine pore saturation, with axial stresses up to 6.2 MPa (%7E900 psi) and temperatures to 90 o C. This corresponds to UFD Work Package 15SN08180211 milestone "FY:15 Transport Properties of Run - of - Mine Salt Backfill - Unconsolidated to Consolidated". Samples exposed to uniaxial compression undergo time - dependent consolidation, or creep, to various deg rees. Creep volume strain - time relations obey simple log - time behavior through the range of porosities (%7E50 to 2% as measured); creep strain rate increases with temperature and applied stress as expected. Mercury porosimetry is used to determine characteri stic capillary pressure curves from a series of consolidation tests and show characteristic saturation - capillary pressure curves that follow the common van Genuchten (1978, 1980) formulation at low stresses. Higher capillary pressure data are suspect due t o the large potential for sample damage, including fluid inclusion decrepitation and pore collapse. Data are supportive of use of the Leverett "J" function (Leverett, 1941) to use for scaling characteristic curves at different degrees of consolidation, but better permeability determinations are needed to support this hypothesis. Recommendations for further and refined testing are made with the goal of developing a self - consistent set of constitutive laws for granular salt consolidation and multiphase (brin e - air) flow.

  15. Extratropical Dry-Air Intrusions into the West African Monsoon Midtroposphere: An Important Factor for the Convective Activity over the Sahel

    E-Print Network [OSTI]

    Roca, Rémy

    Extratropical Dry-Air Intrusions into the West African Monsoon Midtroposphere: An Important Factor during July to August 1992. The approach documents both the moisture content and the origin of the air analysis reveals that very dry air patches (RH 5%) are located in the immediate midtropospheric environment

  16. LONG-TERM FISH ASSEMBLAGES OF INNER BENDS IN A LARGE RIVER M. PYRON,a* J. S. BEUGLY,a

    E-Print Network [OSTI]

    Pyron, Mark

    to an upstream­downstream pattern was present in 1977 and 2008, but not in 1997. A hydrologic analysis based and identified a longitudinal gradient in dominant substrate categories with gravel upstream and sand downstream in lower stability of fish assemblages. Downstream locations in larger rivers are suggested to have lower

  17. Scripta Fac. Sci. Nat. Univ. Masaryk. Brun., Volume 36, Geology. Brno, 2007. 57 The Early Miocene micromammalian assemblage from Mokr 1/2001 Turtle

    E-Print Network [OSTI]

    Horacek, Ivan

    Scripta Fac. Sci. Nat. Univ. Masaryk. Brun., Volume 36, Geology. Brno, 2007. 57 The Early Miocene Martin Sabol1 , Oldich Fejfar2 , Ivan Horácek3 , Stanislav Cermák2 1 Department of Geology of the site and its geological setting can be found in Ivanov et al. (2006). Faunal Assemblage of Micromammals

  18. A research tool for long-term and continuous analysis of fish assemblage in coral-reefs using underwater camera footage

    E-Print Network [OSTI]

    Fisher, Bob

    A research tool for long-term and continuous analysis of fish assemblage in coral-reefs using-term and continuous fish monitoring video content. The analysis can be used for instance to discover ecological phenomena such as changes in fish abundance and species composition over time and area. Two characteristics

  19. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

    2011-09-01

    Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

  20. Considerations Related To Human Intrusion In The Context Of Disposal Of Radioactive Waste-The IAEA HIDRA Project

    SciTech Connect (OSTI)

    Seitz, Roger; Kumano, Yumiko; Bailey, Lucy; Markley, Chris; Andersson, Eva; Beuth, Thomas

    2014-01-09

    The principal approaches for management of radioactive waste are commonly termed ‘delay and decay’, ‘concentrate and contain’ and ‘dilute and disperse’. Containing the waste and isolating it from the human environment, by burying it, is considered to increase safety and is generally accepted as the preferred approach for managing radioactive waste. However, this approach results in concentrated sources of radioactive waste contained in one location, which can pose hazards should the facility be disrupted by human action in the future. The International Commission on Radiological Protection (ICRP), International Atomic Energy Agency (IAEA), and Organization for Economic Cooperation and Development/Nuclear Energy Agency (OECD/NEA) agree that some form of inadvertent human intrusion (HI) needs to be considered to address the potential consequences in the case of loss of institutional control and loss of memory of the disposal facility. Requirements are reflected in national regulations governing radioactive waste disposal. However, in practice, these requirements are often different from country to country, which is then reflected in the actual implementation of HI as part of a safety case. The IAEA project on HI in the context of Disposal of RadioActive waste (HIDRA) has been started to identify potential areas for improved consistency in consideration of HI. The expected outcome is to provide recommendations on how to address human actions in the safety case in the future, and how the safety case may be used to demonstrate robustness and optimize siting, design and waste acceptance criteria within the context of a safety case.

  1. A non-intrusive screening methodology for environmental hazard assessment at waste disposal sites for water resources protection

    SciTech Connect (OSTI)

    Simons, B.A.; Woldt, W.E.; Jones, D.D. [Univ. of Nebraska, Lincoln, NE (United States). Dept. of Biological Systems Engineering

    1995-12-31

    The environmental and health risks posed by unregulated waste disposal sites are potential concerns of Pacific Rim regions and island ares because of the need to protect aquifers and other valuable water resources. A non-intrusive screening methodology to determine site characteristics including possible soil and/or groundwater contamination, areal extent of waste, etc. is being developed and tested at waste disposal sites in Nebraska. This type of methodology would be beneficial to Pacific Rim regions in investigating and/or locating unknown or poorly documented contamination areas for hazard assessment and groundwater protection. Traditional assessment methods are generally expensive, time consuming, and potentially exacerbate the problem. Ideally, a quick and inexpensive assessment method to reliably characterize these sites is desired. Electromagnetic (EM) conductivity surveying and soil-vapor sampling techniques, combined with innovative three-dimensional geostatistical methods are used to map the data to develop a site characterization of the subsurface and to aid in tracking any contaminant plumes. The EM data is analyzed to determine/estimate the extent and volume of waste and/or leachate. Soil-vapor data are analyzed to estimate a site`s volatile organic compound (VOC) emission rate to the atmosphere. The combined information could then be incorporated as one part of an overall hazard assessment system.

  2. The nature of Martian fluids based on mobile element studies in salt-assemblages from Martian meteorites

    SciTech Connect (OSTI)

    Rao, M.N.; Nyquist, L.E.; Wentworth, S.J.; Sutton, S.R.; Garrison, D.H.

    2008-08-04

    The S, Cl, and Br abundances determined in salt assemblages in Nakhla and Lafayette olivine fracture fillings and in gas-rich impact-melt (GRIM) glasses from Shergotty and EET79001 Lithologies A & B using EMPA/EDS/APS X-ray Microprobe techniques are compared with the S and Cl abundances determined by Gooding and coworkers in similar samples using quadrupole mass-spectrometric techniques. All the analytical methods yield relatively high Cl and low SO{sub 3} abundances in Nakhla indicating a SO{sub 3}/Cl ratio of {approx}0.2. The same ratio in Lafayette secondary salts seems to be {approx}2. In the case of GRIM glasses from Shergotty and EET79001 Lith A & Lith B, the SO{sub 3} abundance is found to be high whereas the Cl abundance is low yielding a SO{sub 3}/Cl ratio of {approx}5--300 (large errors are associated with these ratios because of low Cl signals). The salts found in Nakhla fracturefillings are inferred to have formed from Cl-rich fluids (high pH) near nakhlite source region on Mars, whereas the secondary minerals found in shergottite GRIM glasses seem to be associated with SO{sub 3}-rich fluids (low pH) near shergottite source region on Mars. The Cl-rich fluids seem to have infiltrated into the nakhlite source region {approx}600 Ma ago, whereas the SO{sub 3}-rich fluids likely percolated into the shergottite source region at {approx}180 Ma (or less) suggesting the possible existence of two types of fluid sources on Mars.

  3. Direct sequential system assemblage

    E-Print Network [OSTI]

    Sandomire, Daniel M. (Daniel Micah)

    1997-01-01

    Decisions made during the building process have the opportunity to both inform the next set of decisions and provide unexpected and possibly positive features in the final project. Thus, working beyond the minimum definition ...

  4. Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2007-06-01

    In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for extraction of groundwater from the deep carbonate aquifer. Grazing and hunting are unlikely to be potential causes for inadvertent human intrusion into waste areas because of vegetation characteristics and lack of significant game animal populations.

  5. Tracing the magmatic/hydrothermal transition in regional low-strain zones: The role of magma dynamics in strain localization at pluton roof, implications for intrusion-related gold

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    dynamics in strain localization at pluton roof, implications for intrusion-related gold deposits Eric features of a granite-pluton roof; large-scale dykes and a network of gold veins are intensively developed in this roof, recording a succession of mechanical instabilities. Our gravity survey underlines the presence

  6. A slightly modified version is to be published as: Sawyer, S, Wigand, R. and Crowston, K. (2014) "Digital Assemblages: Evidence and Theorizing from a Study of Residential Real Estate," New Technology, Work, and Employment, in press.

    E-Print Network [OSTI]

    Crowston, Kevin

    2014-01-01

    ) "Digital Assemblages: Evidence and Theorizing from a Study of Residential Real Estate," New Technology OF THE U.S. RESIDENTIAL REAL ESTATE INDUSTRY 1 Steve Sawyer School of Information Studies Syracuse-00178, the National Center for Real Estate Research, the Office of the Dean of the School of Information Studies

  7. Sichuan Ebian Jinguang Baxi Electricity Development Co Ltd | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology Co

  8. Sichuan Ebian Wanping Hydropower Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co Ltd Jump to: navigation,

  9. Sichuan Gongga Electric Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co Ltd Jump to:Gongga

  10. Sichuan Gulin Minshu Hydropower Development Co Ltd | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co Ltd Jump

  11. Sichuan Hongchang Electric Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co Ltd JumpHongchang

  12. Sichuan Jiarong Dayu Hydropower Development Co Ltd | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co LtdInformation

  13. Sichuan Jiulong Hydropower Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co LtdInformationJiulong

  14. Sichuan Linhe Industry Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co

  15. Sichuan Mabian Tianhe Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe Power Co Ltd Jump

  16. Sichuan Minjiang Electrolyte Management Hydro Power Co Ltd | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe Power Co Ltd

  17. Sichuan Minjiang Hydropower Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe Power Co

  18. Sichuan Miyi Shixia Hydropower Development Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe Power CoShixia

  19. Sichuan Province Leshan City Mabian Gaozhuoying River Valley Development Co

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe Power CoShixiaLtd |

  20. Sichuan Provincial Hydro Power Investment Operation Group Co ltd | Open

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe Power CoShixiaLtd

  1. Sichuan Shuya Electric Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe Power

  2. Sichuan Tianquan Qieshan Hydro Generation Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe PowerQieshan Hydro

  3. Sichuan Tianquan Xiacun Hydro Generation Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe PowerQieshan

  4. Sichuan Weiyuan Investment Development Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianhe

  5. Sichuan Xingchen Hydro Investment Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianheXingchen Hydro

  6. Sichuan Xinguang Silicon Business Science Technology Co Ltd | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianheXingchen

  7. Sichuan Yongxiang Polysilicon Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping HydropowerYongxiang Polysilicon Co Ltd

  8. Sichuan Yuantong Baixi Hydropower Development Co Ltd | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping HydropowerYongxiang Polysilicon Co

  9. Sichuan Zhongxing Electric Power Development Co Ltd | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping HydropowerYongxiang Polysilicon

  10. Tianwei Sichuan Silicon Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeterInformation Policy andInstituteTedaTianquan County

  11. Monitoring CO 2 sequestration into deep saline aquifer and associated salt intrusion using coupled multiphase flow modeling and time lapse electrical resistivity tomography

    SciTech Connect (OSTI)

    Chuan Lu; CHI Zhang; Hai Hanag; Timothy C. Johnson

    2014-04-01

    Successful geological storage and sequestration of carbon dioxide (CO2) require efficient monitoring of the migration of CO2 plume during and after large-scale injection in order to verify the containment of the injected CO2 within the target formation and to evaluate potential leakage risk. Field studies have shown that surface and cross-borehole electrical resistivity tomography (ERT) can be a useful tool in imaging and characterizing solute transport in heterogeneous subsurface. In this synthetic study, we have coupled a 3-D multiphase flow model with a parallel 3-D time-lapse ERT inversion code to explore the feasibility of using time-lapse ERT for simultaneously monitoring the migration of CO2 plume in deep saline formation and potential brine intrusion into shallow fresh water aquifer. Direct comparisons of the inverted CO2 plumes resulting from ERT with multiphase flow simulation results indicate the ERT could be used to delineate the migration of CO2 plume. Detailed comparisons on the locations, sizes and shapes of CO2 plume and intruded brine plumes suggest that ERT inversion tends to underestimate the area review of the CO2 plume, but overestimate the thickness and total volume of the CO2 plume. The total volume of intruded brine plumes is overestimated as well. However, all discrepancies remain within reasonable ranges. Our study suggests that time-lapse ERT is a useful monitoring tool in characterizing the movement of injected CO2 into deep saline aquifer and detecting potential brine intrusion under large-scale field injection conditions.

  12. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    SciTech Connect (OSTI)

    Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu

    2008-10-01

    One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water standards might be exceeded was evaluated. A variety of scenarios and aquifer conditions was considered in a sensitivity evaluation. The scenarios and conditions simulated in Section 4, in particular those describing the geochemistry and mineralogy of potable aquifers, were selected based on the comprehensive geochemical model developed in Section 3.

  13. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    SciTech Connect (OSTI)

    Tolan, T.L. [Tolan, Beeson and Associates, Kennewick, WA (United States)

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system.

  14. Non-intrusive cooling system

    DOE Patents [OSTI]

    Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

    2001-05-22

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  15. Water intrusion in underground structures

    E-Print Network [OSTI]

    Nazarchuk, Alex

    2008-01-01

    This thesis presents a study of the permissible groundwater infiltration rates in underground structures, the consequences of this leakage and the effectiveness of mitigation measures. Design guides and codes do not restrict, ...

  16. Buried fiber optic intrusion sensor 

    E-Print Network [OSTI]

    Maier, Eric William

    2004-09-30

    piezoelectric transducer to produce a controllable optical phase shift at the 2 km point of a 12 km path length. Interrogation of the distributed sensor was accomplished by repetitively gating light pulses from the stable laser into the sensing fiber...

  17. Under the Gun: Nationalist Military Service and Society in Wartime Sichuan, 1938-1945

    E-Print Network [OSTI]

    Landdeck, Kevin Paul

    2011-01-01

    during the battle; Wan, “Wu Chuan bucheng jun,” p. 196. F.there is no army” (wu Chuan bucheng jun – Popular Sayingpp. 71-91; Wan Jinyu, “Wu Chuan bucheng jun,” pp. 195- 204

  18. The Epidemiology of Schistosomiasis Reinfection and Reemergence in Sichuan, China: Implications for Surveillance and Intervention

    E-Print Network [OSTI]

    Carlton, Elizabeth Jean

    2010-01-01

    energy co-benefits of anaerobic digesters in rural China.their household. If anaerobic biogas digesters were present,the effluent of anaerobic biogas digesters [23], a second

  19. The Epidemiology of Schistosomiasis Reinfection and Reemergence in Sichuan, China: Implications for Surveillance and Intervention

    E-Print Network [OSTI]

    Carlton, Elizabeth Jean

    2010-01-01

    5. Night soil from non-biogas sources (quartiles) Householdnight soil use, biogas adjusted No YesVillage night soil use, biogas adjusted‡ 6.1 - 25.7 buckets

  20. Pottery Production and Social Complexity of the Bronze Age Cultures on the Chengdu Plain, Sichuan, China

    E-Print Network [OSTI]

    Lin, Kuei-chen

    2013-01-01

    generally available raw materials in distinctive fashionsat different stages, from raw materials to the removal ofnot difficult and the raw material not rare, these vessels

  1. Under the Gun: Nationalist Military Service and Society in Wartime Sichuan, 1938-1945

    E-Print Network [OSTI]

    Landdeck, Kevin Paul

    2011-01-01

    McCord, The Power of the Gun, p. 21. 27. The classic accountMcCord, The Power of the Gun, p. 119-141; the quote is fromChapter Six Of Pen and Gun: Political Practice, Culture and

  2. Pottery Production and Social Complexity of the Bronze Age Cultures on the Chengdu Plain, Sichuan, China

    E-Print Network [OSTI]

    Lin, Kuei-chen

    2013-01-01

    Manufacture and Ceramic Petrography: A Case Study fromL. 2008 Thin-section Petrography of Stone and Ceramic031, 12-032c, 12-033c. Petrography Table IV-17: Samples used

  3. Under the Gun: Nationalist Military Service and Society in Wartime Sichuan, 1938-1945

    E-Print Network [OSTI]

    Landdeck, Kevin Paul

    2011-01-01

    pp. 57-9; Chongqing Garrison document dated 13 Decemberhad been passed onto the Garrison from the YC Central CadreCQMG; CQ YC branch; CQ Garrison Command; CQ Social Bureau;

  4. Pottery Production and Social Complexity of the Bronze Age Cultures on the Chengdu Plain, Sichuan, China

    E-Print Network [OSTI]

    Lin, Kuei-chen

    2013-01-01

    investigations of ceramic production and exchange: Can we gothe Evolution of Ceramic Production and Distribution in AStandardization. In Ceramic Production and Distribution: an

  5. Sichuan HuaYuan Power Development Co ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co Ltd JumpHongchangHuaYuan

  6. Sichuan Huidong County GuangYuan Power Development Co Ltd | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower Co Ltd

  7. Sichuan Ya an City Qingyuan Hydro energy Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower CoTianheXingchenQingyuan

  8. Sichuan Ya an Yuyuan Electric Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter Battery Technology CoWanping Hydropower

  9. Apparatuses, Globalities, Assemblages: Third Cinema, Now

    E-Print Network [OSTI]

    Benfield, Dalida Maria

    2011-01-01

    T. , & Heath, S. (Eds. ) The Cinematic Apparatus. New York:Beller, J. (2006). The Cinematic Mode of Production:Heath, S. (1995). “The Cinematic Apparatus: Technology as

  10. Apparatuses, Globalities, Assemblages: Third Cinema, Now

    E-Print Network [OSTI]

    Benfield, Dalida Maria

    2011-01-01

    2009). “The Dancer at the Lightbulb Factory: A Coincidentalseattle/the- dancer-at-the-lightbulb-factory/Content? oid=in China. Not only are the lightbulbs produced by Siemens in

  11. Apparatuses, Globalities, Assemblages: Third Cinema, Now

    E-Print Network [OSTI]

    Benfield, Dalida Maria

    2011-01-01

    information of digital culture. This is a transformation ofdigital and non-digital. In each instance, there is a new meaning and a new movement, another transformationdigital matter resounds with the description of the world as a territory to be colonized, with the transformation

  12. Apparatuses, Globalities, Assemblages: Third Cinema, Now

    E-Print Network [OSTI]

    Benfield, Dalida Maria

    2011-01-01

    P. (1989). War and Cinema: The Logistics of Perception (P.in the Interpretation of Cinema. Cambridge, MA and London,Burton-Carvajal, J. (1986). Cinema and Social Change in

  13. re.Assemblage Bridging Traditional Craft

    E-Print Network [OSTI]

    to the significanceofattentiontodetailsuchascraftandwoodqualities. #12; 4 Finally,FusedCraftsisacollectionofartifactsthatareparthandcraftedandpart3D printed

  14. Beyond Reactive Management of Network Intrusions

    E-Print Network [OSTI]

    in Information Security at a U.S. University · Charter Member, NSA Center of Academic Excellence in Information information security research center · NSA Center of Academic Excellence in Information Assurance Education · PhD in IT, CS, and EE with security concentration · MS in Information Security and Assurance

  15. Asynchronous intrusion recovery for interconnected web services

    E-Print Network [OSTI]

    Chandra, Ramesh

    2013-01-01

    Recovering from attacks in an interconnected system is difficult, because an adversary that gains access to one part of the system may propagate to many others, and tracking down and recovering from such an attack requires ...

  16. Analysis and Management of Intrusion Data Collection

    E-Print Network [OSTI]

    Erbacher, Robert F.

    of monitoring for a given environment or system. The goal is to identify information that must be collected and the monitoring environment will in essence creates its own misuse of the available network accessible resources;environment it would be counter productive to reduce available network resources for monitoring purposes

  17. Gravity-Driven Intrusions in Stratified Fluids

    E-Print Network [OSTI]

    Maurer, Benjamin D.

    2011-01-01

    between the kinetic and potential energy ?elds for allof available potential energy to kinetic energy, and thatof available potential energy to kinetic energy of the

  18. Gravity-driven intrusions in stratified fluids

    E-Print Network [OSTI]

    Maurer, Benjamin Dudley

    2011-01-01

    between the kinetic and potential energy fields for allof available potential energy to kinetic energy, and thatof available potential energy to kinetic energy of the

  19. An Intrusion Detection Game with Limited Observations

    E-Print Network [OSTI]

    Alpcan, Tansu

    is with the Deutsche Telekom Laboratories, Technische Universit¨at Berlin, Ernst-Reuter-Platz 7, 10587 Berlin, Germany¸ar is with the Coordinated Science Laboratory, University of Illinois, 1308 West Main Street, Urbana, IL 61801 USA. E

  20. Online Display Advertising: Targeting and Intrusiveness

    E-Print Network [OSTI]

    Tucker, Catherine Elizabeth

    We use data from a large-scale field experiment to explore what influences the effectiveness of online advertising. We find that matching an ad to website content and increasing an ad's obtrusiveness independently increase ...

  1. Intrusion detection and monitoring for wireless networks.

    SciTech Connect (OSTI)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda; Tabriz, Parisa; Pelon, Kristen; McCoy, Damon (University of Colorado, Boulder); Lodato, Mark; Hemingway, Franklin; Custer, Ryan P.; Averin, Dimitry; Franklin, Jason; Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  2. Intrusion Management Using Configurable Architecture Models

    E-Print Network [OSTI]

    Wolf, Alexander L.

    . The key aspect of this trend is that these models accompany the software system and provide the basis of the software system. These models are coming out of the software engineering community and are being used Heimbigner and Alexander L. Wolf ABSTRACT Software is increasingly being constructed using the component

  3. Disruptive event analysis: volcanism and igneous intrusion

    SciTech Connect (OSTI)

    Crowe, B.M.

    1980-08-01

    An evaluation is made of the disruptive effects of volcanic activity with respect to long term isolation of radioactive waste through deep geologic storage. Three major questions are considered. First, what is the range of disruption effects of a radioactive waste repository by volcanic activity. Second, is it possible, by selective siting of a repository, to reduce the risk of disruption by future volcanic activity. And third, can the probability of repository disruption by volcanic activity be quantified. The main variables involved in the evaluation of the consequences of repository disruption by volcanic activity are the geometry of the magma-repository intersection (partly controlled by depth of burial) and the nature of volcanism. Potential radionuclide dispersal by volcanic transport within the biosphere ranges in distance from several kilometers to global. Risk from the most catastrophic types of eruptions can be reduced by careful site selection to maximize lag time prior to the onset of activity. Certain areas or volcanic provinces within the western United States have been sites of significant volcanism and should be avoided as potential sites for a radioactive waste repository. Examples of projection of future sites of active volcanism are discussed for three areas of the western United States. Probability calculations require two types of data: a numerical rate or frequency of volcanic activity and a numerical evaluation of the areal extent of volcanic disruption for a designated region. The former is clearly beyond the current state of art in volcanology. The latter can be approximated with a reasonable degree of satisfaction. In this report, simplified probability calculations are attempted for areas of past volcanic activity.

  4. Gravity-driven intrusions in stratified fluids

    E-Print Network [OSTI]

    Maurer, Benjamin Dudley

    2011-01-01

    in upstream kinetic wave energy against the level of neutralincrease in upstream total wave energy against the level ofin upstream potential wave energy against the level of

  5. Cybersecurity Intrusion Detection and Security Monitoring for...

    Office of Environmental Management (EM)

    tools to provide visibility into wireless FAN communications. Project Description This project conducts research to accelerate development of a utility monitoring system to...

  6. Guide to Intrusion Detection and Prevention Systems

    E-Print Network [OSTI]

    's responsibilities include the development of management, administrative, technical, and physical standards Institute of Standards and Technology KarenScarfone PeterMell Special Publication 800-94 Revision 1 (Draft Systems (IDPS) (Draft) Recommendations of the National Institute of Standards and Technology Karen

  7. Gravity-Driven Intrusions in Stratified Fluids

    E-Print Network [OSTI]

    Maurer, Benjamin D.

    2011-01-01

    in upstream kinetic wave energy against the level of neutralincrease in upstream total wave energy against the level ofin upstream potential wave energy against the level of

  8. Effect on Speed Distribution due to Intrusive and Non-Intrusive Portable Speed Measurement Devices

    E-Print Network [OSTI]

    Jasrotia, Romika

    2011-06-02

    with pneumatic tubes, Smartsensor, Autoscope with camera trailer and Lidar gun were compared. Results showed that drivers did not react to pneumatic tubes and continued driving at the same speed; there was no significant difference in speeds at different...

  9. The making of modern Chinese politics : political culture, protest repertoires, and nationalism in the Sichuan Railway Protection Movement

    E-Print Network [OSTI]

    Zheng, Xiaowei

    2009-01-01

    Three. The Project. The Chuan-Han Railway Company and theBeijing: Sanlian shudian, 1997. Chuan-Han tielu gaijinhui [Association in improving the Chuan-Han Railway], ed. Chuanlu

  10. The making of modern Chinese politics : political culture, protest repertoires, and nationalism in the Sichuan Railway Protection Movement

    E-Print Network [OSTI]

    Zheng, Xiaowei

    2009-01-01

    complete nation” (wanquan zhi guo). Lamenting the fact thatwould rule the state (guo shuiyu zhi)? If all the people arequanguo ren zhi zuiren). 32 Thus, the notion of guo now

  11. Choreographic assemblages : an archaeology of movement and space

    E-Print Network [OSTI]

    Can, Chiu-Fai, 1974-

    2003-01-01

    Time and movement always played a vital role in architecture, and it also takes significance in my work. This interest leads me to the investigation of choreography and dance notation in relation to space. By using notation, ...

  12. A Diverse Assemblage of Late Cretaceous Dinosaur and Bird

    E-Print Network [OSTI]

    Machel, Hans

    are preserved in greater detail, but they are rare. Late Cretaceous coal-rich strata from western Canada provide, Edmonton, Alberta T6G 2E3, Canada. 2 Department of Biological Sciences, University of Alberta, Edmonton, Alberta T6G 2E9, Canada. *To whom correspondence should be addressed. E-mail: rcm1@ualberta.ca Fig. 1

  13. ORIGINAL PAPER Seasonal progression of diatom assemblages in surface waters

    E-Print Network [OSTI]

    relative to other periods of the study, although carbon export was relatively low. Melt water flux the Palmer Long Term Ecological Research (Pal-LTER) project have documented a 40% decrease in mean duration Bordeaux 1, Av. Des Facultes, 33405 Talence Cedex, France A. Clarke British Antarctic Survey, High Cross

  14. ORIGINAL ARTICLE Diatom assemblages promote ice formation in large

    E-Print Network [OSTI]

    Lee Jr., Richard E.

    (Oyserman et al., 2012; Twiss et al., 2012). Conducted during times of expansive ice cover, these surveys (Saxton et al., 2012; Twiss et al., 2012). The physical processes involved in the develop- ment of diatom demonstrated the presence of viable diatoms in meltwater from lake ice (Twiss et al., 2012), consistent

  15. EARLY PENNSYLVANIAN (LANGSETTIAN) FISH ASSEMBLAGES FROM THE JOGGINS FORMATION,

    E-Print Network [OSTI]

    Benton, Michael

    of Fundy, were one of the first places in North America where coal was mined (Falcon-Lang 2009; Quann et al Site famous for its Pennsylvanian coal measures and associated tropical biota (Falcon-Lang and Calder with lycopsid trees pre- served in growth position, which demonstrated that most Pennsylvanian coal seams

  16. Analysis of the Pass Cavallo shipwreck assemblage, Matagorda Bay, Texas 

    E-Print Network [OSTI]

    Borgens, Amy Anne

    2004-09-30

    Guns in New Spain ............................ 17 Mexican Arms .......................................................................... 18 Texas Arms... of 1818, an additional 100 guns (specifics not indicated) were sent from the Rio Grande though they were not new nor in good condition, as advertised.38 Occasionally firearms were gained from encounters with the native tribes. These 17...

  17. Light-Dependant Biostabilisation of Sediments by Stromatolite Assemblages

    E-Print Network [OSTI]

    Decho, Alan

    an important advance for the niche construction activity of microbial systems and the formation and persistence of the stromatolites which came to dominate shallow coastal environments for 80% of the biotic history of the earth unrestricted use, distribution, and reproduction in any medium, provided the original author and source

  18. Multispecies diel transcriptional oscillations in open ocean heterotrophic bacterial assemblages

    E-Print Network [OSTI]

    Marin, R.

    Oscillating diurnal rhythms of gene transcription, metabolic activity, and behavior are found in all three domains of life. However, diel cycles in naturally occurring heterotrophic bacteria and archaea have rarely been ...

  19. Trait diversity enhances yield in algal biofuel assemblages

    E-Print Network [OSTI]

    Shurin, JB; Mandal, S; Abbott, RL

    2014-01-01

    bioenergy production and competitive interactions, including minimum resource requirements, growth rates, asymptotic densitybioenergy crops. The species that achieved the fast- est growth reached the highest biomass density

  20. A Multiple Model Cost-Sensitive Approach for Intrusion Detection

    E-Print Network [OSTI]

    Lee, Wenke

    that are optimized for user-de#12;ned cost metrics. Empirical experiments in o#11;- line analysis show a reduction of approximately 97% in operational cost over a single model approach, and a reduction of approximately 30 the initial results of our current research in extending our data mining framework to build cost

  1. Non-intrusive characterization of heat transfer fluid aerosol formation 

    E-Print Network [OSTI]

    Krishna, Kiran

    2001-01-01

    in process equipment. Predictive models relating the aerosol formation distances, aerosol droplet size, and volume concentrations to bulk liquid pressure, temperature, fluid properties, leak size and ambient conditions are developed. These models will be used...

  2. Substorm onset by new plasma intrusion: THEMIS spacecraft observations

    E-Print Network [OSTI]

    California at Berkeley, University of

    based data sets [e.g., McPherron et al., 1973; Lyons, 1995; Angelopoulos et al., 2008; Lui, 2008 be missed in earlier studies. They surveyed the 2008 THEMIS tail season data and found that more than 80 Department of Atmospheric and Oceanic Science, University of California, Los Angeles, Los Angeles, California

  3. Pasture and Soil Management Following Tidal Saltwater Intrusion 

    E-Print Network [OSTI]

    Provin, Tony; Redmon, Larry; McFarland, Mark L.; Feagley, Sam E.

    2009-05-26

    When land is flooded by saltwater, as after a hurricane tidal surge, it can long-term effects on soil productivity and fertility. This publication explains how to reclaim flooded pasture land. Having soil tested for salinity is an important step....

  4. Automatic compilation framework for Bloom filter based intrusion detection

    E-Print Network [OSTI]

    Najjar, Walid A.

    8% of the FPGA area. 1. Introduction Studies on economic impact of computer viruses have shown On Applied Reconfigurable Computing (ARC 2006)· Delft, The Netherlands, March 1-3, 2006. #12;for virus*, Betul Buyukkurt and Walid A. Najjar Department of Computer Science and Engineering *Department

  5. Resilient Control and Intrusion Detection for SCADA Systems

    E-Print Network [OSTI]

    Zhu, Xia Bonnie

    2011-01-01

    California iso wind generation forecast- ing service designto obtain accurate forecasts. Advancements in wind and solar

  6. Improving shipboard maintenance practices using non-intrusive load monitoring

    E-Print Network [OSTI]

    Piber, Mark A. (Mark Augustin)

    2007-01-01

    (cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

  7. Resilient Control and Intrusion Detection for SCADA Systems

    E-Print Network [OSTI]

    Zhu, Xia Bonnie

    2011-01-01

    Sets – Real Wind Power Data . . . . . . . . . . . . . . .to the anomaly size N Wind Power Hourly Measurements: (Up)short-term prediction of wind power: A literature overview.

  8. Methods for non-intrusive sensing and system monitoring

    E-Print Network [OSTI]

    Schantz, Christopher James

    2014-01-01

    Improving the efficiency of collection, transmission, and consumption of resources is the focus of a wide swath of engineering research. Current technological solutions for capturing or mitigating energy and resource waste ...

  9. Distributed fiber optic intrusion sensor system for monitoring long perimeters 

    E-Print Network [OSTI]

    Juarez, Juan C.

    2009-06-02

    A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from...

  10. Non-Intrusive Electric Load Monitoring in Commercial Buildings 

    E-Print Network [OSTI]

    Norford, L. K.; Mabey, N.

    1992-01-01

    W'S) Figure 2. Electric power at the building HVAC service entrance, July 23, 1991. A chiller and associated pumps were turned on at 7 am. To quantify the resolution that can be obtained with a 5 kW standard deviation, we apply statistics appropriate..., heuristic identification Table 3 Changes in electrical power due to turning fans on and off, as determined by application of three different filters. Summary statistics are for the first two trials, which involved the same fan. Trial 1 2 3 Average...

  11. Intrusion Detection using Sequences of System Calls Steven A. Hofmeyr

    E-Print Network [OSTI]

    New Mexico, University of

    Somayaji Dept. of Computer Science University of New Mexico Albuquerque, NM 87131-1386 steveah buffer overflow or bug in Microsoft Internet Explorer, our applications and operating systems are full

  12. Shipboard fluid system diagnostics using non-intrusive load monitoring

    E-Print Network [OSTI]

    Mitchell, Gregory R. (Gregory Reed)

    2007-01-01

    Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

  13. Analysis of Computer Intrusions Using Sequences of Function Calls

    E-Print Network [OSTI]

    Peisert, Sean; Bishop, Matt; Karin, Sidney; Marzullo, Keith

    2007-01-01

    Planning Study,” Technical Report ESD-TR-73-51, vol. II,Systems (RISOS),” technical report, Lawrence Liver- moreFinal Report (PA),” technical report, Information Sciences

  14. Episodic dike intrusions in the northwestern Sierra Nevada, California...

    Office of Scientific and Technical Information (OSTI)

    of a Jurassic arc terrane, are tectonically juxtaposed against ophiolitic and marine rocks that represent late Paleozoic-early Mesozoic oceanic basement. This oceanic...

  15. ccsd00000575 Intrusion and extrusion of water in hydrophobic mesopores

    E-Print Network [OSTI]

    , France d Laboratoire de Physique de la Mati#18;ere Condens#19;ee et Nanostructures, Universit#19;e Claude, devoted to the storage or dissipation of mechanical energy, has begun to develop [3]. This ap- plication as de#12;ned by IUPAC, and the energetic characteristics of devices based on this process are directly

  16. Cybersecurity Intrusion Detection and Security Monitoring for Field Area Networks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department of Energy Whole-HomeCutting Edge Building5

  17. CV-1b: Magmatic - Intrusive | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmentalBowerbank, Maine:Kansas: Energy Resources JumpCIA-TheCSC/UND TeamCV-1:

  18. August 18, 2015 Webinar - Probabilistic Analysis of Inadvertent Intrusion

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p uBUS SERVICE SUBSIDIES AT THE IDAHO1997 AUDITTribalP.

  19. Episodic dike intrusions in the northwestern Sierra Nevada, California:

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing(Journal Article) | SciTech(Journal(Patent) |(JournalArticle) |Implications for

  20. Monitoring CO2 intrusion and associated geochemical transformations in a

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing(JournalspectroscopyReport)Fermentative ActivitySciTechComplementary6 (Journal

  1. Monitoring CO2 intrusion and associated geochemical transformations in a

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing(JournalspectroscopyReport)Fermentative ActivitySciTechComplementary6 (Journalshallow

  2. Potential for radionuclide redistribution due to biotic intrusion:

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTech ConnectSpeeding accessusers'(x≤2) surface: A combined scanning

  3. Intrusion Detecting Using Secure Signatures - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATIONIntroducing the Richard P. Feynman CenterSafetyTwoElectricity

  4. Conferenza Nazionale ASITA, L'Aquila, 21 24 ottobre 2008 Stima di movimenti superficiali del terreno e di mappe digitali di

    E-Print Network [OSTI]

    Perissin, Daniele

    riportano i risultati relativi al terremoto del 12 maggio 2008 nella provincia del Sichuan, ricavati dall

  5. Quantifying scales of spatial variability in algal turf assemblages on coral reefs

    E-Print Network [OSTI]

    Harris, Jennifer L

    2015-01-01

    reefs, the ubiquitous turf algae are the primary food sourcefor space with corals. Turf algae will likely increase inaccounted for 9 taxa and 40% of algae by cover. Seven of the

  6. Panel assemblage for housing : some form and construction explorations for small buildings

    E-Print Network [OSTI]

    Borenstein, David Reed

    1984-01-01

    This thesis examines the consequences of building homes in a factory and explores viable construction alternatives using factory-made panels. The exploration considers panelized systems of dwelling construction and its ...

  7. Seasonal analysis of abiotic factors impacting phytoplankton assemblages in Offatts Bayou, Galveston, Texas 

    E-Print Network [OSTI]

    Roehrborn, Linda Rae

    2009-05-15

    stations in Lake Madeline. While the results of this study support the importance of temperature, dissolved oxygen and pH as the critical controlling factors (p < 0.05) of phytoplankton biomass and diversity, it is clear that phytoplankton dynamics...

  8. The analysis of the Conde de Tolosa and the Nuestra Senora de Guadalupe olive jar assemblage 

    E-Print Network [OSTI]

    James, Stephen Robert

    1985-01-01

    the chronological and typological framework of the olive jar and answers previous hypothesis pertaining to intended sizes and capacities, contents, and rim attributes and glazing frequencies employed as temporal indicators. ACKNOWLEDGEMENTS The following.... Methodology Form I. Form II. Form III. Form IV. IV. TYPOLOGICAL REVIEW. V. GLAZE, SHAPE AND CONTENT CORRELATIONS. . . VI. RIM AND BODY SHAPE CORRELATIONS. VII. CONCLUSION. REFERENCES. APPENDIX I. APPENDIX II. APPENDIX III. APPENDIX IV. VITA...

  9. The effects of limnological features on fish assemblages of 14 Spanish reservoirs

    E-Print Network [OSTI]

    García-Berthou, Emili

    (Paxton et al. 1999; Gassner et al. 2003; Perga & Gerdeaux 2003), there are few studies directly relating. The implementation of the EU Water Framework Directive (Directive 2000/60/EC of the European Parliament and of the Council) urges to understand the response of ecological communities to degradation of water quality

  10. Ecology of the predator assemblage affecting nest success of passerines in Sierra Nevada, California 

    E-Print Network [OSTI]

    Cocimano, Maria C.

    2010-07-14

    The endangered willow flycatcher (Empidonax traillii) breeds in mountain meadows in the Sierra Nevada, which have been intensively modified, especially reducing meadow wetness, which favors easy access for mammalian predators to reach nesting areas...

  11. Nutrient enrichment increased species richness of leaf litter fungal assemblages in a tropical forest

    E-Print Network [OSTI]

    functioning, but the determinates of their diversity and functional interactions are not well known) food webs (Kaspari et al. 2008). While litter decomposition is mediated by both biotic and abiotic

  12. Quantifying scales of spatial variability in algal turf assemblages on coral reefs

    E-Print Network [OSTI]

    Harris, Jennifer L

    2015-01-01

    s stand what proportion of total variation was due tothe largest proportion of the total variation (Fig. 6).of variation; Anderson et al. 2008) and as a proportion of

  13. Effects of Grassland Restoration on Avian Assemblage Characteristics and Dickcissel Nesting Success in Texas 

    E-Print Network [OSTI]

    Lituma, Christopher M.

    2010-07-14

    Naturalist 110: 1?13. Stake, M. M., F. R. Thompson, J. Faaborg, and D. E. Burhans. 2005. Patterns of snake predation at songbird nests in Missouri and Texas. Journal of Herpetology 39: 215?222. Van Horne, B. 1983. Density as a misleading indicator...?2008. C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s W a s h i n g t on 34 0 0. 81 W a s h i n g t on 29 0. 43 0. 69 N a v a r r o 34 0. 13 0. 82 C ol or a do 29 0. 3 0. 8 N a...

  14. Terrestrial and Aquatic Macroinvertebrate Assemblages as a Function of Wetland Type across a Mountain Landscape

    E-Print Network [OSTI]

    Holmquist, Jeffrey G; Jones, Jennifer R; Schmidt-Gengenbach, Jutta; Pierotti, Lyra F; Love, Jason P

    2011-01-01

    the spatial complexity of mountain habitats. Global Ecologyof Wetland Type across a Mountain Landscape Jeffrey G.Jason P. Love* *White Mountain Research Station, University

  15. Evaluation of the paraphyletic assemblages within Lonchophyllinae, with description of a new tribe and genus

    E-Print Network [OSTI]

    Parlos, Julie A.; Timm, Robert M.; Swier, Vicki J.; Zeballos, Horacio; Baker, Robert J.

    2014-01-28

    it was not possible to determine which of two lineages the type specimen of H. thomasi is actually a member. Until additional genetic and/or morphologic data are available, resolution of all paraphyletic relationships is not possible. Future studies that focus...

  16. Benthic Assemblage Variability in the Upper San Francisco Estuary: A 27-Year Retrospective

    E-Print Network [OSTI]

    Peterson, Heather A; Vayssieres, Marc

    2010-01-01

    California State Water Resources Control Board. 78 p. PrepasCalifornia State Water resources Control Board. Open FileCalifornia State Water Resources Control Board. Open File

  17. Climate-and eustasy-driven cyclicity in Pennsylvanian fusulinid assemblages, Donets Basin (Ukraine)

    E-Print Network [OSTI]

    Montañez, Isabel Patricia

    to the formation of economically productive coal seams in the Donets Basin, western Europe, North America

  18. Small-scale spatial variation of benthic algal assemblages in a peat bog Katerina Cerna n

    E-Print Network [OSTI]

    - dispersal factors (Soininen et al., 2004). On a mesoscale (tens of meters or greater), spatial heterogeneity

  19. Citizen Science System Assemblages: Understanding the Technologies that Support Crowdsourced Science

    E-Print Network [OSTI]

    Crowston, Kevin

    that leverages the power of crowds to collect and analyze scientific data. We evaluate these technologies for ornithological research, or plant sunflowers and observe bee pollination at various times during the day or year-house developers to build custom platforms. Supporting scientific goals is critical for virtually all citizen

  20. Citizen Science System Assemblages: Toward Greater Understanding of Technologies to Support Crowdsourced

    E-Print Network [OSTI]

    Crowston, Kevin

    of inquiry that leverages the power of crowds to collect and analyze scientific data. We evaluate for ornithological research, or plant sunflowers and observe bee pollination at various times during the day visualizations. Supporting scientific goals is critical for virtually all citizen science projects, but some

  1. Fonctions, formes 3D, assemblages et animation Session du club Sofia Kovaleskaa

    E-Print Network [OSTI]

    Barthe, Loïc

    subdivision, surfaces paramétriques, ... ­ Définissent explicitement l'ensemble des points de l'espace paramétriques, ... ­ Définissent explicitement l'ensemble des points de l'espace appartenant à la surface ­ N f 1(p) f 2( p) Espace 2 del' opérateur g Espace 3 demodélisation pour f =g(f 1 ,f 2) #12

  2. The copper artifact assemblage from an Ottoman period shipwreck in the Red Sea 

    E-Print Network [OSTI]

    Willis, Kathryn Ewalt

    2002-01-01

    European travelers are examined. These accounts are unique descriptions of seafaring, trade, and travel during this time. The excavation of the shipwreck by the Institute of Nautical Archaeology (INA-Egypt) is discussed followed by a catalogue...

  3. Fish assemblage structure along environmental gradients in a coastal plain drainage: influences from a reservoir 

    E-Print Network [OSTI]

    Herbert, Matthew Earl

    1999-01-01

    &0. 1-0. 4 0-0. 01 0-27 0- I 0 0-61 0-2. 5 0-0. 4 0-0. 5 0-0. 1 0 98-151 38-52 122-152 2. 6-2. 9 0. 8-0. 8 0. 5-0. 5 (0. 01-0. 02 0-78 0-15 0-51 3. 7-4. 2 0. 6-0. 6 0-0. 4 0-0. 22 56-139 15-23 64-77 3. 7-5. 0 0. 6-0. 7 0. 5...

  4. Aquatic Vertebrate Assemblages in the Middle Trinity River Basin, with Emphasis on Turtles 

    E-Print Network [OSTI]

    Riedle, Jimmy

    2014-05-03

    -2009 ........................................................................................... 71 4.3 Species accumulation curves for (A) small fyke nets, (B) large fyke nets, (C) mini-hoop traps, and (D) large hoop traps at Gus Engeling WMA, Anderson County, Texas 2006... from Memphis Net and Twine (www.memphisnet.net). The mini catfish hoop net had four 47-cm diameter fiberglass hoops, two 27-cm diameter stretchable funnels, and an overall length of 155 cm. Square mesh size was 2.5cm. Small box traps were 59 cm x 43...

  5. Quantifying scales of spatial variability in algal turf assemblages on coral reefs

    E-Print Network [OSTI]

    Harris, Jennifer L

    2015-01-01

    1994): MIC: single-celled microalgae and cyano- bacteria;in subtropical intertidal microalgae (Christofoletti et al.

  6. Benthic Assemblage Variability in the Upper San Francisco Estuary: A 27-Year Retrospective

    E-Print Network [OSTI]

    Peterson, Heather A; Vayssieres, Marc

    2010-01-01

    Special thanks go to Ted Sommer for his support of thisFishes Feyrer F, Nobriga ML, Sommer TR. 2007. Multi- decadalEstuaries 20(3):504–520. Sommer T, Armor C, Baxter R, Breuer

  7. Discordance between living and death assemblages as evidence for anthropogenic ecological change

    E-Print Network [OSTI]

    . ecological baseline eutrophication marine communities paleoecology Human activities affect living systems

  8. A report on late Quaternary vertebrate fossil assemblages from the eastern San Francisco Bay region, California

    E-Print Network [OSTI]

    2011-01-01

    H.G. 1996. Biogeography and paleoecology of ground sloths inmorphometrics informs the paleoecology of Pacific- coastpp. Wolff, R.G. 1971. Paleoecology of a Late Pleistocene (

  9. Analysis of the Black-capped Vireo and White-eyed Vireo Nest Predator assemblages 

    E-Print Network [OSTI]

    Conkling, Tara J.

    2011-08-08

    Predation is the leading cause of nest failure in songbirds. My study identified nest predators of black-capped vireos and white-eyed vireos, quantified the activity of potential predator species, examined the relationships between vegetation...

  10. Authenticity, Authority, and Assemblage Masculinity: Geek Identity and Hardware Production in Networked Spaces

    E-Print Network [OSTI]

    Ross, Ian W.

    2014-01-01

    announcement of Occulus Rift’s buyout by Facebook, we arecontention in the wake of the buyout announcement was one ofthe system following the buyout. The fear expressed by Lucky

  11. Quantifying scales of spatial variability in algal turf assemblages on coral reefs

    E-Print Network [OSTI]

    Harris, Jennifer L

    2015-01-01

    colonization in Sargassum muticum (Yendo) Fensholt. J Exp MarMar Ecol Prog Ser 258: 87?95 Kelaher BP (2005) Does colonizationcolonization in spatio-temporal patchiness of microgastropods in coralline turf habitat. J Exp Mar

  12. Assemblage of deep-sea sharks on Chatham Rise, New Zealand

    E-Print Network [OSTI]

    collected as bycatch in two deep-water trawl fisheries at a total of 390 stations, which ranged in depth targeted in deep-water trawls. Sharks are common bycatch in deep water fisheries around the world, forming., 1990; Clark and King1). Most sharks captured in the New Zealand and Australian deep- water fisheries

  13. Benthic Assemblage Variability in the Upper San Francisco Estuary: A 27-Year Retrospective

    E-Print Network [OSTI]

    Peterson, Heather A; Vayssieres, Marc

    2010-01-01

    Bay/Delta Estuary. Technical Report 38. 68 p. Jassby AD.San Joaquin Estuary. Technical Report 12. 56 p. McLusky DS.

  14. The diversity and abundance of North American bird assemblages fail to track changing productivity

    E-Print Network [OSTI]

    Dobson, LL; La Sorte, FA; Manne, LL; Hawkins, BA

    2015-01-01

    species richness and energy availability in the Northand K. J. Gaston. 2005. Species– energy relationships at theA. H. 2004. Species–energy relationships and habitat

  15. Effects Of Sea Otter Colonization On Soft-Sediment Intertidal Prey Assemblages In Glacier Bay, Alaska

    E-Print Network [OSTI]

    Weitzman, Benjamin Phillip

    2013-01-01

    S. B. Yamada. 1994. The keystone species concept: variationChallenges in the quest for keystones. BioScience 46:609-a single high-level, or “keystone” species (Paine 1966) can

  16. The diversity and abundance of North American bird assemblages fail to track changing productivity

    E-Print Network [OSTI]

    Dobson, LL; La Sorte, FA; Manne, LL; Hawkins, BA

    2015-01-01

    and predicted impacts of climate change on winter birdContemporary climate change, however, is providing a naturalshifts in response to climate change. To date, most tests of

  17. c 2013 David Raymond Grochocki Jr DEPLOYMENT CONSIDERATIONS FOR INTRUSION DETECTION SYSTEMS IN

    E-Print Network [OSTI]

    Sanders, William H.

    detect attacks. Using the information taken from the failure scenarios and knowledge of how encrypted Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security

  18. Recent Approaches to Non-intrusive Load Monitoring Techniques in Residential Settings

    E-Print Network [OSTI]

    Sekercioglu, Y. Ahmet

    to inaccurate decisions on what should be turned off to save energy [2] [3]. In addition, the value of end the effectiveness of their existing energy policies and devise new energy saving programs with better efficacy [4 Y. Ahmet S¸ekercioglu Tom Drummond Voon Siong Wong Department of Electrical and Computer Systems

  19. Load Identification of Non-intrusive Load-monitoring System in Smart HSUEH-HSIEN CHANG

    E-Print Network [OSTI]

    Fernandez, Thomas

    for the management of entrance guard, health care, saving energy and reducing CO2, and comfortable life. Intelligent of saving energy and reducing CO2 of residence using some new techniques. Health care of residence of electric power are also raised. In energy demands, the amount of residence is increasing 5.93% every year

  20. Evaluating impacts of CO2 gas intrusion into a confined sandstone aquifer: Experimental results

    SciTech Connect (OSTI)

    Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

    2014-12-31

    Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnership Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

  1. Initial Experiences with occampi Simulations of Blood Clotting on the Minimum Intrusion Grid

    E-Print Network [OSTI]

    Kent, University of

    automatically across a set of processing nodes. Index Terms---grid, simulation, occam­pi, blood­clot, nanite I Nanite Assemblers) [6]. Current models contain tens of thousands of concur­ rent processes; however, we properties of systems containing millions of interacting agents --- nanites or biological organelles (such

  2. An experimental investigation of the sensitivity of a buried fiber optic intrusion sensor 

    E-Print Network [OSTI]

    Kuppuswamy, Harini

    2006-04-12

    line at a distance of 40 ft from it. A car moving at a speed of 30 mph on a rough road could be consistently detected up to a distance of 480 ft from the sensor, while a car driven on a smooth road 200 ft from the sensor could be detected only when...

  3. Non-intrusive vibration monitoring in US Naval and US Coast Guard ships

    E-Print Network [OSTI]

    Gerhard, Katherine Leigh

    2013-01-01

    In 2011, the Laboratory for Electromagnetic and Electronic Systems proposed a new type of vibration monitoring system, entitled vibration assessment monitoring point with integrated recovery of energy or VAMPRIE, in their ...

  4. Comparison of Two Intrusion Detection Schemes for Sparsely Connected Ad Hoc Networks M. Chuah, P. Yang

    E-Print Network [OSTI]

    Chuah, Mooi-Choo "Mooi"

    ] uses a variant of Telsa [8] to provide source authentication for DSR. All the above approaches suggest

  5. Non-intrusive remote sleep monitoring & event detection system using audio-visual recording

    E-Print Network [OSTI]

    Nakanishi, Hideyuki

    ;25 3 50 1 2 GeoNLP 6-2 6-1 5-3 The CO2 reduction effect of eco-friendly the environmental impact of "ubiquitous" eco- driving, where the majority is driving eco-friendly

  6. Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System

    E-Print Network [OSTI]

    Sanyal, Sugata

    Department of Computer Science, University of Mumbai, India 2 Department of Mathematics, Guru Nanak Khalsa College, University of Mumbai, India 3 Norwegian center Of Excellence, Q2S, Norwegian University Research, Mumbai, India 5 University Department of Computer Science, University of Mumbai, India divyata

  7. Evaluating Impacts of CO2 Gas Intrusion Into a Confined Sandstone aquifer: Experimental Results

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

    2014-12-31

    Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnershipmore »Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.« less

  8. Monitoring CO2 Intrusion and Associated Geochemical Transformations in a Shallow Groundwater System Using Complex

    E-Print Network [OSTI]

    Hubbard, Susan

    Geologic carbon sequestration, which aims to capture and inject carbon dioxide (CO2) into deep subsurface Using Complex Electrical Methods Baptiste Dafflon,, * Yuxin Wu, Susan S. Hubbard, Jens T. Birkholzer: The risk of CO2 leakage from a properly permitted deep geologic storage facility is expected to be very low

  9. CAIA Technical Report 060707A July 2006 page 1 of 9 Minimally Intrusive Round Trip Time

    E-Print Network [OSTI]

    Zander, Sebastian

    for a range of highly interactive real-time applications. Active probing techniques are possible but problematic. The extra packet traffic imposed by active probes along a network path can modify the behaviour is running. One common approach involves actively probing the path. Extra packets are injected

  10. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    E-Print Network [OSTI]

    Tierney, Brian L

    2008-01-01

    a similar problem with Bro’s IRC analyzer, which tracks asigni?cant amount of state for each IRC user encountered.campus network, the share of IRC tra?c is relatively large,

  11. Chemical and petrological characteristics of the intrusive rocks of the Quitman Mountains, Texas 

    E-Print Network [OSTI]

    Seay, Christopher Sidney

    1973-01-01

    ) on stained rock slabs. The procedure of staining by sodium cobalti-nitrate and amaranth dye (Laniz and others, 1964) proved to be ideal for these medium- and coarse-grained rocks. 14 Before modal analysis was made, the rock was ' examined in thin... activation methods. For X-ray spectrographic analyses the stan- dards used were USGS Rock Standards W-l, G-2, and GSP-1, supplemented by National Bureau of Stan- dard's Mineral 70a (potassium feldspar) and Min- eral 99a (sodium feldspar) (Appendix 1...

  12. Intrusion-Tolerant Group Management in Enclaves DSN'01, Goteborg, Sweden, July 2001

    E-Print Network [OSTI]

    Dutertre, Bruno

    , Hassen Sa¨idi, and Victoria Stavridou System Design Laboratory, SRI International 333 Ravenswood Avenue, Menlo Park, CA 94025, USA bruno,saidi,victoria @sdl.sri.com Abstract Groupware applications require

  13. A comprehensive system for non-intrusive load monitoring and diagnostics

    E-Print Network [OSTI]

    Paris, James, Ph. D. Massachusetts Institute of Technology

    2013-01-01

    Energy monitoring and smart grid applications have rapidly developed into a multi-billion dollar market. The continued growth and utility of monitoring technologies is predicated upon the ability to economically extract ...

  14. ccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores

    E-Print Network [OSTI]

    Boyer, Edmond

    Laboratoire de Physique de la Mati`ere Condens´ee et Nanostructures, Universit´e Claude Bernard, 6 rue Amp to the storage or dissipation of mechanical energy, has begun to develop [3]. This ap- plication is based as defined by IUPAC, and the energetic characteristics of devices based on this process are directly related

  15. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    SciTech Connect (OSTI)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  16. NON-INTRUSIVE SENSOR FOR GAS FILL VERIFICATION OF INSULATED GLASS WINDOWS

    SciTech Connect (OSTI)

    Andrew Freedman; Paul L. Kebabian; Richard R. Romano; James Woodroffe

    2003-10-01

    A sensor capable of measuring the amount of oxygen (an unwanted component that is only present because of improper filling or seal failure) within an argon-filled insulated glass window has been designed, built and successfully tested. It operates by using the optical absorption of oxygen in the atmospheric A-band centered at 762 nm. Light emitted by an argon-filled surface glow discharge lamp is Zeeman-tuned on and off an oxygen absorption line using an AC-modulated electromagnet. In the presence of oxygen, the change in the measured intensity of the lamp, obtained using standard demodulation techniques, is proportional to the oxygen column density. Measurements using an industry-standard insulated glass window indicate that the sensor can measure the amount of oxygen in a nominally argon-filled IG window (with a window gap of 10 mm) with a precision of 0.50% oxygen using a 16 second integration time. This level of precision is well within the limits required by the IG window manufacturing industry for proper monitoring of newly manufactured window units.

  17. Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications

    E-Print Network [OSTI]

    Johnson, Chris

    , G12 8RZ. Johnson@dcs.gla.ac.uk, http://www.dcs.gla.ac.uk/~johnson Keywords: SCADA, Industrial for protective monitoring over Supervisory Control and Data Acquisition (SCADA) sys- tems SCADA implementations. This paper identifies a range of theoretical and practical

  18. Intrusion Response as a Resource Allocation Problem Michael Bloem, Tansu Alpcan, and Tamer Basar

    E-Print Network [OSTI]

    Alpcan, Tansu

    of Illinois, 1308 West Main Street, Urbana, IL 61801 USA. (mbloem2, tbasar)@control.csl.uiuc.edu T. Alpcan, Ernst-Reuter-Platz 7, 10587 Berlin, Germany. tansu.alpcan@telekom.de security problems [2]. Many IDSs

  19. Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks

    DOE Patents [OSTI]

    Goranson, Craig A.; Burnette, John R.; Greitzer, Frank L.; McMillan, Bryan H.

    2013-10-15

    A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data stream is interrogated to determine the presence of predetermined characteristics associated with at least one of the portions of data within the data stream. At least one of the portions of data is then characterized, based upon the portion of data exhibiting a predetermined combination of characteristics, wherein the predetermined combination of characteristics is related to the sensitivity of the portion of data. The portions of the data stream are then distributed into a plurality of different channels, each of the channels associated with different level of sensitivity.

  20. Using the non-intrusive load monitor for shipboard supervisory control

    E-Print Network [OSTI]

    Bennett, Patrick Lawrence

    2007-01-01

    Field studies have demonstrated that it is possible to evaluate the state of many shipboard systems by analyzing the power drawn by electromechanical actuators [1], [2], [3], [4], [5]. One device that can perform such an ...

  1. An Outcrop Example of Large-scale Conglomeratic Intrusions Sourced from

    E-Print Network [OSTI]

    and Environmental Sciences, Stanford University, Stanford, California, U.S.A. Brian W. Romans Department, a seismic event trigger asso- ciated with the uplift of the Patagonian Andes. 17 Hubbard, S. M., B. W. 199­207. 199 Copyright n2007 by The American Association of Petroleum Geologists. DOI:10.1306/1209863M

  2. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems

    E-Print Network [OSTI]

    Chen, Ing-Ray

    within radio range Na b (t) Attacker strength detected at time t in Beta(, ) in Beta(, ) Number of ranging operations per node per TIDS Et Energy for transmission per node Er Energy for reception per node Ea Energy for analyzing data per node Es Energy for sensing per node Eo Initial system energy TIDS

  3. Evaluating Impacts of CO2 Intrusion into an Unconsolidated Aquifer. I. Experimental Data

    SciTech Connect (OSTI)

    Lawter, Amanda R.; Qafoku, Nikolla; Wang, Guohui; Shao, Hongbo; Brown, Christopher F.

    2015-08-04

    Capture and deep subsurface sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Batch and column experiments combined with wet chemical extractions were conducted to evaluate these risks to groundwater quality and to understand effects of CO2 leakage on aquifer chemistry and mineralogy. Sediments from the High Plains aquifer in Kansas, a confined sandstone aquifer, were used to study time-dependent release of major, minor and trace elements when exposed to CO2 gas. Results showed that Ca, Ba, Si, Mg, Sr, Na, and K increased either instantaneously or followed nonlinear increasing trends with time, indicating dissolution and/or desorption reactions controlled their release. Other elements, such as Mn and Fe, were also released from all sediments, creating a potential for redox reactions to occur. Results from acid extractions confirmed sediments had appreciable amounts of contaminants that may potentially be released into the aqueous phase. However, results from the batch and column experiments demonstrated that only a few trace elements (e.g., As, Cu, Cr, Pb) were released, indicating the risk of groundwater quality degradation due to exposure to leakage of sequestered CO2 is low. Concentrations of Mo were consistently higher in the control experiments (absence of CO2) and were below detection in the presence of CO2 indicating a possible benefit of CO2 in groundwater aquifers. These investigations will provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

  4. Evaluating Impacts of CO2 Intrusion into an Unconsolidated Aquifer: II. Modeling Results

    SciTech Connect (OSTI)

    Zheng, Liange; Qafoku, Nikolla; Lawter, Amanda R.; Wang, Guohui; Shao, Hongbo; Brown, Christopher F.

    2015-08-04

    Large scale deployment of CO2 geological sequestration requires the assessment of the risks. One of the potential risks is the impact of CO2 leakage on shallow groundwater overlying the sequestration site.The understanding of the key chemical processes and parameters are critical for building numerical models for risk assessment. Model interpretation of laboratory and field tests is an effective way to enhance such understanding. Column experiments in which CO2 charged synthetic groundwater flowed through a column packed with material from High Plains aquifer was conducted and concentration of several constituents in the effluent water was analyzed. In this paper, reactive transport model was developed to interpret the observed concentration changes, attempting to shed light on the chemical reactions and key parameters that control the concentration changes of these constituents. The reactive transport model catches the concentration changes of pH, Ca, Mg, Ba, Sr, Cs, As and Pb fairly well. Calcite dissolution and Ca-driven cation exchange reactions are the major drivers for the concentration changes of Ca, Ba, Sr, and Cs. The pH-driven adsorption/desorption reactions lead to a concentration increase of As and Pb. The volume fraction and reactive surface area of calcite, CEC and sorption capacity are key parameters in determining the magnitude of concentration increase. Model results also show that the dissolution of calcite with Ba impurity could be an alternative explanation of the increase in Ba concentration.

  5. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions

    E-Print Network [OSTI]

    Lee, Wenke

    , Rahul A. Nimbalkar 1 , Kam K. Yee 1 , Sunil B. Patil 1 , Pragneshkumar H. Desai 1 , Thuan T. Tran 1

  6. A Survey of Intrusion Detection in Wireless Network Applications Robert Mitchell and Ing-Ray Chen

    E-Print Network [OSTI]

    Cao, Yong

    these systems increases. Because of lower installation and maintenance costs, many of these systems are largely on insulin pumps [3] and cardiac de- vices [4], the DoS attack on a German power grid operator [5

  7. A survey of intrusion detection in wireless network applications Robert Mitchell, Ing-Ray Chen

    E-Print Network [OSTI]

    Chen, Ing-Ray

    and maintenance costs, many of these systems are largely networked by wireless means. In order to identify gaps area or critical resource (power substation, water treat- ment plant, center of government). Malicious

  8. Electric load information system based on non-intrusive power monitoring

    E-Print Network [OSTI]

    Lee, Kwangduk Douglas, 1970-

    2003-01-01

    Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

  9. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect (OSTI)

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  10. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    E-Print Network [OSTI]

    Tierney, Brian L

    2008-01-01

    Mai, M. , Paxson, V. , Sommer, R. : Dynamic Application-24) (1999) 2435–2463 3. Sommer, R. , Paxson, V. : ExploitingA. , Paxson, V. , Sommer, R. : Operational Experiences with

  11. Evaluating Impacts of CO2 Gas Intrusion Into a Confined Sandstone aquifer: Experimental Results

    SciTech Connect (OSTI)

    Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

    2014-12-31

    Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnership Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

  12. Model-Based Validation of an Intrusion-Tolerant Information System Fabrice Stevens

    E-Print Network [OSTI]

    Sanders, William H.

    , we describe a model-based validation effort that was undertaken as part of a unified approach was supported by DARPA contract number F30602-02-C- 0134. as mentioned above, it is practically impossible a se- cure system would have to represent, among other things, the attacker's behavior. Since some

  13. Buoyancy and stratification in Boussinesq flow with applications to natural ventilation and intrusive gravity currents

    E-Print Network [OSTI]

    Flynn, Morris R.

    2006-01-01

    Hybrid buildings combine passive summer-time cooling by natural venti- lation with active winter-time heating by conventional HVAC systems.

  14. Non-Intrusive Monitoring and Service Adaptation for Oliver Moser, Florian Rosenberg and Schahram Dustdar

    E-Print Network [OSTI]

    Dustdar, Schahram

    , Microsoft and IBM. Finally, WS-BPEL 2.0 is now standardized by OASIS. When leveraging BPEL as a process Vienna, Austria lastname@infosys.tuwien.ac.at ABSTRACT Web service processes currently lack monitoring-cost composition of distributed applica- tions [22]. Recently, Web services are one popular technol- ogy

  15. Formalizing Sensitivity in Static Analysis for Intrusion Detection Henry Hanping Feng

    E-Print Network [OSTI]

    Jha, Somesh

    . Giffin , Yong Huang , Somesh Jha , Wenke Lee , and Barton P. Miller Department of Electrical of a process to identify potentially mali- cious behavior. An anomaly detection HIDS identifies vari- ations

  16. Design and testing of a non-intrusive torque measurement system 

    E-Print Network [OSTI]

    Wilson, Edwin Ernest

    1998-01-01

    design with a temporary mount connected to the shaft and transmitting the response signal via radio frequency telemetry could decrease the effects of vibration on the system....

  17. Tolerating Intrusions in Grid Systems Luis Sardinha Nuno Ferreira Neves Paulo Verissimo

    E-Print Network [OSTI]

    Neves, Nuno

    spread through several organi- zations. These resources can be very tempting for a hacker because- come a target for the hacker community. For ex- ample, the considerable computing power can be used to break passwords, the storage devices can save hacker tools and other information, and the large

  18. Study of Kinematics of Extreme Waves Impacting Offshore and Coastal Structures by Non Intrusive Measurement Techniques 

    E-Print Network [OSTI]

    Song, Youn Kyung

    2013-11-07

    as 1.56pC^(2) at x = L/2. Correlations between wave kinematic energy and dynamic pressure were examined to determine the impact coefficients ci'. ci' varied within relatively narrow ranges 0.29 ? ci' ? 1.56. In the present large scale experiments...

  19. SMIT: Uma Arquitetura Tolerante a Intrus~oes Baseada em Virtualizac~ao

    E-Print Network [OSTI]

    Correia, Miguel

    . Sistemas financeiros, de controle de gerac¸~ao e distribuic¸~ao de energia, de controle de dispositivos a necessidade de, no m´inimo, 3f + 1 r´eplicas para tolerar faltas bizantinas [Lamport et al. 1982

  20. Worm-IT A wormhole-based intrusion-tolerant group communication system

    E-Print Network [OSTI]

    Neves, Nuno

    , Departamento de Informa´tica, Campo Grande, Bloco C6, Piso 3, 1749-016 Lisboa, Portugal b Programa de Po´s-Graduac¸a~o em Informa´tica Aplicada, Pontifi´cia Universidade Cato´lica do Parana´, Rua Imaculada Conceic

  1. Intrusion Experiments to Measure Territory Size: Development of the Method, Tests through Simulations,

    E-Print Network [OSTI]

    Ringler, Eva

    .pone.0025844 Editor: Brock Fenton, University of Western Ontario, Canada Received June 17, 2011; Accepted unrestricted use, distribution, and reproduction in any medium, provided the original author and source exclusive use, which is announced and delimited by visual, acoustic, chemical and/or electric cues. In most

  2. A retrot current sensor for non-intrusive power monitoring at the circuit breaker

    E-Print Network [OSTI]

    Vickery, Daniel Robert

    2011-01-01

    This thesis presents a new sensor for power monitoring that measures current flow in a circuit breaker without permanent modification of the breaker panel or the circuit breaker itself. At the breaker panel, an inductive ...

  3. Modeling and Optimization of Seawater Intrusion Barriers in Southern California Coastal Plain

    E-Print Network [OSTI]

    Yeh, William W-G.; Bray, Ben

    2006-01-01

    measurements of hydraulic conductivity as well as head andexisting injection wells, or designated for hydraulic targetmaintain hydraulic head targets while one well is shut off

  4. Development of real time non-intrusive load monitor for shipboard fluid systems

    E-Print Network [OSTI]

    Branch, Perry L. (Perry Lamar)

    2008-01-01

    Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

  5. A non-intrusive fault tolerant framework for mission critical real-time systems

    E-Print Network [OSTI]

    Gorelov, Sébastien

    2005-01-01

    The need for dependable real-time systems for embedded application is growing, and, at the same time, so does the amount of functionality required from these systems. As testing can only show the presence of errors, not ...

  6. Non-intrusive beam power monitor for high power pulsed or continuous wave lasers

    DOE Patents [OSTI]

    Hawsey, Robert A. (Oak Ridge, TN); Scudiere, Matthew B. (Oak Ridge, TN)

    1993-01-01

    A system and method for monitoring the output of a laser is provided in which the output of a photodiode disposed in the cavity of the laser is used to provide a correlated indication of the laser power. The photodiode is disposed out of the laser beam to view the extraneous light generated in the laser cavity whose intensity has been found to be a direct correlation of the laser beam output power level. Further, the system provides means for monitoring the phase of the laser output beam relative to a modulated control signal through the photodiode monitor.

  7. Cyber-Intrusion Auto-Response Policy and Management System (CAPMS)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department of Energy Whole-HomeCutting Edge Building5 by1 I N S P E C

  8. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartmentService

  9. LONG-TERM CHANGES IN FLOW REGIME AND FISH ASSEMBLAGE COMPOSITION IN THE GUADALUPE AND SAN MARCOS RIVERS OF TEXAS

    E-Print Network [OSTI]

    Upchurch, Gary - Department of Biology, Texas State University

    ). Low-head dams and deep storage reservoirs are common practices for securing adequate year-round water

  10. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    Principles of Sequence Stratigraphy. Amsterdam, Elsevier,Driscoll, N.W. , 1995. Sequence stratigraphy. Annual Review1999. Siliciclastic sequence stratigraphy: concepts and

  11. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    Principles of Sequence Stratigraphy. Amsterdam, Elsevier,Driscoll, N.W. , 1995. Sequence stratigraphy. Annual Review1999. Siliciclastic sequence stratigraphy: concepts and

  12. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    the engineering, soil mechanics and physics communities (such arches. As defined in soil mechanics, arching normallydiscussed. Other standard soil mechanics models exist that

  13. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    the engineering, soil mechanics and physics communities (such arches. As defined in soil mechanics, arching normallydiscussed. Other standard soil mechanics models exist that

  14. thesis abstract: On the biogeography of vertebrate body size: ecological and evolutionary insights from assemblage-level patterns

    E-Print Network [OSTI]

    Olalla-Tárraga, Miguel Ángel

    2010-01-01

    by Núria Roura-Pascual thesis abstract On the biogeographyand motivation to my PhD thesis. I also specially appreciateA. Hawkins to this thesis. References Ashton, K.G. , Tracy,

  15. THE INFLUENCE OF ENVIRONMENTAL FACTORS ON SPATIAL AND TEMPORAL VARIATION OF FISH ASSEMBLAGES IN THE LOWER BRAZOS RIVER, TEXAS 

    E-Print Network [OSTI]

    LI, RAYMOND Y.

    2003-01-01

    of willow Salix sp., eastern cottonwood Populus deltoides, and sycamore Platanus occidentalis extended along both banks for most of the reach. This river segment was selected because it contained representative habitats of the lower Brazos River...

  16. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    seismic data and swath bathymetry, highlights the control of the structural framework on the observed stratigraphy and

  17. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    seismic data and swath bathymetry, highlights the control of the structural framework on the observed stratigraphy and

  18. 1 NORDREGIO NEWS PUBLICATION ISSUE 1, FEBRUARY 2014 Cities are complex assemblages of people, houses, roads, bridges,

    E-Print Network [OSTI]

    Guillas, Serge

    of Neighbourhoods: Experience from DGNB New Urban Districts in Denmark, Jesper Ole Jensen, discusses the Danish Certifica- tion of Neighbourhoods: Experience from DGNB New Urban Districts in Denmark By Jesper Ole Jensen ............................................ 7 Urban Planning and Big Data ­ Taking LUTi Models to the Next Level? By Joan Serras, Melanie

  19. Patterns in Functional Structure and Diversity of Stream Fish Assemblages Related to Environmental Factors at Multiple Scales 

    E-Print Network [OSTI]

    Pease, Allison Ann

    2011-02-22

    Members, Gil G. Rosenthal Mariana Mateos Thomas J. DeWitt Head of Department, Thomas E. Lacher December 2010 Major Subject: Wildlife and Fisheries Sciences iii ABSTRACT Patterns in Functional Structure and Diversity of Stream Fish... of his indispensible insight, advice, patience, and encouragement throughout my time at Texas A&M. Drs. Gil Rosenthal, Mariana Mateos, and Thom DeWitt provided very valuable assistance along the way as members of my dissertation committee. I owe...

  20. Evaluating Flake Assemblage and Stone Tool Distributions at a Large Western Stemmed Tradition Site Near Yucca Mountain, Nevada

    E-Print Network [OSTI]

    Haynes, Gregory M

    1996-01-01

    investigations at Yucca Mountain for the U. S. Department ofTRADITION SITE NEAR YUCCA MOUNTAIN lo: Special PublicationsLithic Quarry Near Yucca Mountain, Nye Coimty, Nevada. Las

  1. Reconstructing the Assemblage of Iron Artifacts from the Late Hellenistic Shipwreck at K?z?lburun, Turkey 

    E-Print Network [OSTI]

    Rash, Kimberly 1981-

    2012-11-27

    , the conservation of each iron object is detailed, and a discussion of the implements enhances the understanding of their use aboard a seagoing vessel. Further research into similar objects and the development of each tool type offers insight into their value...

  2. Fish Assemblage and Food Web Structure in Whedos (Shallow Floodplain Habitats) of the Oueme River, West Africa 

    E-Print Network [OSTI]

    Jackson, Andrew

    2012-10-19

    In the Oueme River, a lowland river in Benin, Africa, artificial ponds constructed in the floodplain (whedos) are colonized during the high-water period by a presumably random sample of fishes from the river channel. As ...

  3. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    Bathymetry and seismic profile have vertical exaggeration ofBathymetry and seismic profile have vertical exaggeration ofinset CHIRP seismic profiles have a vertical exaggeration of

  4. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    Bathymetry and seismic profile have vertical exaggeration ofBathymetry and seismic profile have vertical exaggeration ofinset CHIRP seismic profiles have a vertical exaggeration of

  5. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    1964. Mass transport of sediment in the heads of ScrippsCalifornia: implications for sediment provenance. Thesis (M.1976. The unconsolidated sediment distribution on the San

  6. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01

    1964. Mass transport of sediment in the heads of ScrippsCalifornia: implications for sediment provenance. Thesis (M.1976. The unconsolidated sediment distribution on the San

  7. Preservation of exceptional vertebrate assemblages in Middle Permian fluviolacustrine mudstones of Kotel'nich, Russia: stratigraphy, sedimentology,

    E-Print Network [OSTI]

    Benton, Michael

    of Kotel'nich, Russia: stratigraphy, sedimentology, and taphonomy Michael J. Benton a, , Andrew J. Newell b

  8. Deteco Cooperativa de Intruses em Redes Carrier Ethernet Pan Jieke1, Joo Redol1, Miguel Correia2

    E-Print Network [OSTI]

    Correia, Miguel

    Contexto e motivação Em resposta aos requisitos crescentes de uma economia glob- alizada, a indústria das facto deste tipo de rede ser actualmente adoptada em larga escala pelos fornecedores de serviço Internet

  9. Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development

    E-Print Network [OSTI]

    Balakrishnan, Vikram

    2013-01-01

    3 Power Line Communication . . . . . . . . . . .Power . . . . . . . . . . . . . . . . . . . . . . . . . . .The Power Capture Board. . . . . . . . . . .

  10. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01

    J.M, 1977, Seismic stratigraphic interpretation of clasticvia integrated interpretation of seismic, magnetic andand Interpretations .. 2.4.1 Seismic

  11. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01

    facies, pp.165-184 of Seismic Stratigraphy - applications toon sediment delivery, seismic stratigraphy, and changes inSeismic Stratigraphy ..

  12. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01

    A study based on exploration 3D seismic data. Marine andSeismic Stratigraphy - applications to hydrocarbon exploration,In: 3D Seismic Technology: Application to the Exploration of

  13. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01

    via integrated interpretation of seismic, magnetic andInterpretations .. 2.4.1 Seismic2.4 RESULTS AND INTERPRETATIONS 2.4.1 Seismic Stratigraphy

  14. A Revised Interpretation of 3D Seismic Data, Hawthorne Army Depot, Nevada: FaultedBasin Reflections or Sill Intrusions?

    E-Print Network [OSTI]

    of the Great Basin containing numerous extensional geothermal systems (Surpless, 2008; Oldow, 2003). A 3d to possible controlling structures within an extensional geothermal system. In areas of extensional geothermal systems, fluid flow is commonly controlled by faults and crustal thinning provides heat

  15. Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis

    E-Print Network [OSTI]

    Luo, Dong, 1966-

    2001-01-01

    Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

  16. Parental magma of the Skaergaard intrusion: constraints from melt inclusions in primitive troctolite blocks and FG-1 dykes

    E-Print Network [OSTI]

    2010-01-01

    We ?rst describe the petrography, mineral chemistry, andWe then describe the petrography and major and trace element1998) Field relations and petrography Dykes in the Home Bay

  17. DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information via

    E-Print Network [OSTI]

    Reber, Paul J.

    via unconscious priming in anxiety Wen Li, Ken A. Paller, and Richard E. Zinbarg Northwestern, unconscious priming was greater for threat than for neutral words in the high-trait-anxiety group, and for neutral than for threat words in the low-trait-anxiety group. Enhanced unconscious priming of threat

  18. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2012 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; McDonald, Benjamin S.; Robinson, Sean M.; Gilbert, Andrew J.; White, Timothy A.; Pitts, W. Karl; Misner, Alex C.; Seifert, Allen

    2012-11-01

    Progress in the second year of this project is described by the series of technical reports and manuscripts that make up the content of this report. These documents summarize successes in our goals to develop our robust image-hash templating and material-discrimination techniques and apply them to test image data.

  19. Monitoring CO2 intrusion and associated geochemical transformations in a shallow groundwater system using complex electrical methods

    E-Print Network [OSTI]

    Dafflon, B.

    2013-01-01

    L. ; Lesmes, D. P. , Electrical-hydraulic relationshipsA new method of calculating electrical conductivity withwith three-dimensional electrical resistivity tomography:

  20. Evaluating Impacts of CO2 and CH4 Gas Intrusion into an Unconsolidated Aquifer: Fate of As and Cd

    SciTech Connect (OSTI)

    Lawter, Amanda R.; Qafoku, Nikolla; Shao, Hongbo; Bacon, Diana H.; Brown, Christopher F.

    2015-07-10

    Abstract The sequestration of carbon dioxide (CO2) in deep underground reservoirs has been identified as an important strategy to decrease atmospheric CO2 levels and mitigate global warming, but potential risks on overlying aquifers currently lack a complete evaluation. In addition to CO2, other gases such as methane (CH4) may be present in storage reservoirs. This paper explores for the first time the combined effect of leaking CO2 and CH4 gasses on the fate of major, minor and trace elements in an aquifer overlying a potential sequestration site. Emphasis is placed on the fate of arsenic (As) and cadmium (Cd) released from the sediments or present as soluble constituents in the leaking brine. Results from macroscopic batch and column experiments show that the presence of CH4 (at a concentration of 1 % in the mixture CO2/CH4) does not have a significant effect on solution pH or the concentrations of most major elements (such as Ca, Ba, and Mg). However, the concentrations of Mn, Mo, Si and Na are inconsistently affected by the presence of CH4 (i.e., in at least one sediment tested in this study). Cd is not released from the sediments and spiked Cd is mostly removed from the aqueous phase most likely via adsorption. The fate of sediment associated As [mainly sorbed arsenite or As(III) in minerals] and spiked As [i.e., As5+] is complex. Possible mechanisms that control the As behavior in this system are discussed in this paper. Results are significant for CO2 sequestration risk evaluation and site selection and demonstrate the importance of evaluating reservoir brine and gas stream composition during site selection to ensure the safest site is being chosen.

  1. Contact metamorphic devolatilization of shales in the Karoo Basin, South Africa, and the effects of multiple sill intrusions

    E-Print Network [OSTI]

    Svensen, Henrik

    ) sills have a gas production potential of several gigatons of methane (CH4) if emplaced over a N1000 km2 to quantify fluid production from both inorganic and organic reactions during contact metamorphism influence on the gas generation potential. When two sills are emplaced with a vertical spacing of ~7 times

  2. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01

    Bouma, A.H. , 1962, Sedimentology of some flysch deposits: aGulf of California: sedimentology, mass physical properties

  3. Hercynitequartz-bearing granulites from Brejes Dome area, Jequi Block, Bahia, Brazil: Influence of charnockite intrusion on

    E-Print Network [OSTI]

    Nicollet, Christian

    Kessler, 63038 Clermont-Ferrand, France c PETROBRAS S.A/UN-BA/ATEX/ LG, Avenida Antônio Carlos Magalhães@cpgg.ufba.br (J. Barbosa), nicollet@opgc.univ.bpclermont.fr (C. Nicollet), cmml@petrobras.com.br, cmml@ufba.br (C

  4. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01

    drilling results found extensive evidence of sill-driven fluid-Drilling results confirmed (Kastner, 1982) that vertical discharge hydrothermal fluids

  5. Parental responses of hispid cotton rats (Sigmodon hispidus) to intrusion by red imported fire ants (Solenopsis invicta) into simulated nests 

    E-Print Network [OSTI]

    Ferris, Kathleen Patricia

    1994-01-01

    modon hispidus were observed in simulated nests at 24, 72, and 120 hours of offspring age in the presence (5 different litters observed at each age, n = 15) and absence (6 unique litters observed at each age, n = 6) of fire ants (Solenopsis Lnvicta...

  6. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01

    seismic reflection profiles as seismically blank or chaotic near-verticalProfile shows three pockmarks and acoustic blanking below that linkup with near vertical zones of seismicvertical zones of seismic disturbance interpreted as pipe-like fluid-flow conduits. Above: Analog 3.5 kHz profile

  7. Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development

    E-Print Network [OSTI]

    Balakrishnan, Vikram

    2013-01-01

    I. Pressman. Switching Power Supply Design (2nd ed. ).switching-mode power supplies (SMPS) for their more compact design

  8. Intrusion Tolerance 18 PublishedbytheieeeComPutersoCiety1540-7993/08/$25.002008ieeeieeeseCurity&PrivaCy

    E-Print Network [OSTI]

    Neves, Nuno

    - structures such as power, water, gas, oil, and trans- portation. Therefore, the threat is no longer against of security, essentially by obscurity. However, critical infrastructure companies are now using stan- dard protocols are normally encapsulated on top of UdP- TCP/IP. The common defense, "the hackers don't know our

  9. Boiling heat transfer in a vertical microchannel: Local estimation during flow boiling with a non intrusive method

    E-Print Network [OSTI]

    Boiling heat transfer in a vertical microchannel: Local estimation during flow boiling with a non the results of experimental and numerical studies concerning boiling heat transfer inside vertical in minichannels for several gravity levels (µg, 1g, 2g). To fully understand the high heat transfer potential

  10. Probabilistic Validation of Intrusion Tolerance William H. Sanders*, Michel Cukier**, Franklin Webber***, Partha Pal***, and Ronald Watro***

    E-Print Network [OSTI]

    Sanders, William H.

    be followed during the design of a system (e.g., the Security Evaluation Criteria [DOD85, ISO99]). When quan {fwebber, ppal, rwatro}@bbn.com **Center for Reliability Engineering Department of Materials and Nuclear

  11. Single-cell genomics reveal metabolic strategies for microbial growth and survival in an oligotrophic aquifer

    SciTech Connect (OSTI)

    Wilkins, Michael J.; Kennedy, David W.; Castelle, Cindy; Field, Erin; Stepanauskas, Ramunas; Fredrickson, Jim K.; Konopka, Allan

    2014-02-01

    Bacteria from the genus Pedobacter are a major component of microbial assemblages at Hanford Site and have been shown to significantly change in abundance in response to the subsurface intrusion of Columbia River water. Here we employed single cell genomics techniques to shed light on the physiological niche of these microorganisms. Analysis of four Pedobacter single amplified genomes (SAGs) from Hanford Site sediments revealed a chemoheterotrophic lifestyle, with the potential to exist under both aerobic and microaerophilic conditions via expression of both aa3­?type and cbb3-type cytochrome c oxidases. These SAGs encoded a wide-range of both intra-and extra­-cellular carbohydrate-active enzymes, potentially enabling the degradation of recalcitrant substrates such as xylan and chitin, and the utilization of more labile sugars such as mannose and fucose. Coupled to these enzymes, a diversity of transporters and sugar-binding molecules were involved in the uptake of carbon from the extracellular local environment. The SAGs were enriched in TonB-dependent receptors (TBDRs), which play a key role in uptake of substrates resulting from degradation of recalcitrant carbon. CRISPR-Cas mechanisms for resisting viral infections were identified in all SAGs. These data demonstrate the potential mechanisms utilized for persistence by heterotrophic microorganisms in a carbon-limited aquifer, and hint at potential linkages between observed Pedobacter abundance shifts within the 300 Area subsurface and biogeochemical shifts associated with Columbia River water intrusion.

  12. A Bi-Criteria Measure to Assess Supply Chain Network Performance for Critical Needs Under

    E-Print Network [OSTI]

    Nagurney, Anna

    ; 88,117 of them lost their lives because of natural disasters (Braine 2006). Some deadliest examples Asia in 2004; Hurricane Katrina in 2005; Cyclone Nargis in 2008; and The earthquakes in Sichuan, China

  13. A Bi-Criteria Measure to Assess Supply Chain Network Performance for Critical Needs Under

    E-Print Network [OSTI]

    Nagurney, Anna

    ,117 of them lost their lives because of natural disasters (Braine 2006). Some deadliest examples of disasters in 2004; Hurricane Katrina in 2005; Cyclone Nargis in 2008; and The earthquakes in Sichuan, China in 2008

  14. Adaptable Group-Oriented Signature , Dake He***

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Security and National Computing Grid, Southwest Jiaotong University, Chengdu, Sichuan 610031,P. R. China the signature security. In many applications, the signer should sign a same message for lots of members, and how

  15. The influence of physicochemical factors and wind-induced resuspension on microalgal and zooplankton community assemblages in a shallow coastal embayment, South Bay, TX, USA 

    E-Print Network [OSTI]

    Stone, Jennifer Sue

    2006-08-16

    in the Mediterranean, the Mar Menor, resulted in strong seasonal trends in the taxonomic composition of the phytoplankton and zooplankton communities (Gilabert, 2001). Microalgal biomass and productivity have been shown to be higher in the warmer summer seasons...

  16. Diatom species composition and abundance in water column assemblages from five drill sites in Prydz Bay, Antarctica, Ocean Drilling Program Leg 119: distributional patterns 

    E-Print Network [OSTI]

    Kang, Sung-Ho

    1989-01-01

    , 1958; Frenguelli and Orlando, 1958; Manguin, 1960; Cassie, 1963, Hargraves, 1968; Hasle, 1969; Fenner e! al. , 1976). Quantitative diatom studies have become numemus, but there are still few available for the Antarctic region. Although phytoplankton... studies have covered extensive areas of the Southern Ocean (Hart, 1942; Boden, 1949; Hasle, 1956, 1969; Marumo, 1957; Kozlova, 1966; Zernova, 1970; Steyaert, 1973a, b, 1974; and Jacques er al. , 1979), while very few are related to inshore waters. Only...

  17. Tuna-Dolphin-Bird Feeding Assemblages in the Galapagos Islands and Their Response to the Physical Characteristics of the Upper Water Column 

    E-Print Network [OSTI]

    Johnston, Michelle

    2012-10-19

    , offered helpful comments and help in writing this manuscript. I would also like to thank Dr. Steve DiMarco for his help in analyzing the physical data and Dr. Bernd Würsig for his helpful comments on my thesis proposal. Julia O’Hern and Roxanne Duncan...

  18. Explorations in additive, associative design : an assemblage of collective use of forms for part of the M.I.T. West Campus

    E-Print Network [OSTI]

    Fung, Vivian

    1985-01-01

    My thesis is an attempt at synthesizing a series of observations of built and unbuilt environments which exemplify the elusive physical qualities of harmonic diversity - unity with variety. This synthesis will be the basis ...

  19. Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils

    E-Print Network [OSTI]

    Blazewicz, Steven Joseph

    2012-01-01

    community information and ecosystem characteristics.population information with ecosystem characteristics.inform about ecosystem functions and this information would

  20. Climate-linked mechanisms driving spatial and temporal variation in eelgrass (Zostera marina L.) growth and assemblage structure in Pacific Northwest estuaries, USA

    SciTech Connect (OSTI)

    Thom, Ronald M.; Southard, Susan L.; Borde, Amy B.

    2014-11-01

    Using laboratory experiments on temperature and leaf metabolism, and field data sets from Washington, between 1991 and 2013, we developed lines of evidence showing that variations in water temperature, mean sea level, and desiccation stress appear to drive spatial and temporal variations in eelgrass (Zostera marina).

  1. Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils

    E-Print Network [OSTI]

    Blazewicz, Steven Joseph

    2012-01-01

    total CH 4 produced in these soils was oxidized under anoxicAlaskan and Puerto Rican soils), this process is importantFollowing Wet-up of Dry Soil Revealed by H 218 O Stable

  2. Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves

    E-Print Network [OSTI]

    Neves, Nuno

    composition of several in- frastructures [6, 7, 8]: (1) the operational network, usually called SCADA or PCS2 access the SCADA/PCS systems through ad-hoc interconnections; (3) the Internet, through which CI users. The interconnection of these three infrastructures leads to an undesirable link between the Internet and the SCADA

  3. International Journal of Network Security, Vol.1, No.2, PP.84102, Sep. 2005 (http://isrc.nchu.edu.tw/ijns/) 84 Research on Intrusion Detection and Response

    E-Print Network [OSTI]

    Ghorbani, Ali

    Network (LAN) and Wide Area Network (WAN) application areas in business, financial, industry, security this nightmare to become a reality. In addition to the hacking, new entities like worms, Trojans and viruses

  4. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    Esdaile, J.D. (1966), The lead oxide-lead sulfate system. J.1958), The structure of lead oxide monohydrate. Vestn.of formation of lead(II) oxide carbonates by scanning

  5. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    coexistence of pyrite and goethite, using a selected set ofof lead sepecies on goethite. Colloids and Surfaces A:Constraints Eh defined by goethite saturation and total

  6. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    6- HAs 3 Se 6-2 HAsS 2 (aq) AsSe(OH)(HSe) AsS(OH)(HS) Total= 3H 2 AsO 4- + 6HSe - + 7H + AsSe(OH)(SeH) - + 0.5O 2 (g) +

  7. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    uranium in carbonaceous uranium deposits: Characterizationfluid inclusions in three uranium deposits. Geochimica etreducing agent in some uranium deposits. Canadian Journal of

  8. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect (OSTI)

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  9. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    of more than 35,000 groundwater analyses selected from the1994), Geochemistry, Groundwater and Pollution. A.A.Balkema,1995), Estimating 14C groundwater ages in a methanogenic

  10. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    chemical equilibria of acid mine drainage: The FeSO 4 -H 2W. Stumm (1970), Acid mine drainage: The rate-determiningrelevant to acid mine drainage. American Mineralogist; 92(

  11. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    springs, gas vents, and sinkholes, many of which poseon groundwater chemistry and sinkhole formation, NASCENT (with the locations of sinkholes. Gas bubbles in springs,

  12. Non-Intrusive Scheduling of TCP Flows U. Ayestaa,b,c,d, L. Bertauxa,d, D. Carvina,d

    E-Print Network [OSTI]

    Ayesta, Urtzi

    as a consequence of HTTP 1.1, Web 2.0 applications using AJAX (Google Maps etc.), Split TCP, Parallel Sockets definitely improve the efficiency locally, there is little understanding as to what would be the impact

  13. GEOPHYSICAL RESEARCH LETTERS, VOL. 27, NO. 23, PAGES 3857-3860, DECEMBER 1, 2000 Climatology of Intrusions into the Tropical Upper

    E-Print Network [OSTI]

    Polvani, Lorenzo M.

    winds, observed over the Pacific and Atlantic Oceans during northern fall to spring, are important westerlies over the Pa- cific and Atlantic Oceans. These "westerly ducts" are im- portant for extratropical]. Because of their penetration deep into the tropics, intru- sion events can potentially have a large impact

  14. Reducing booster-pump-induced contaminant intrusion in Indian water systems with a self-actuated, back-pressure regulating valve

    E-Print Network [OSTI]

    Taylor, David Donald James

    2014-01-01

    Intermittently-operated water systems struggle to equitably and effectively distribute clean water to customers. One common customer response to intermittency is to supplement the water system's pressure by using a household, ...

  15. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    Changes in Response to CO2 Leakage from Deep Geologicalstudy mineral trapping for CO2 disposal in deep arenaceousconstituents as function of P(CO2)? function of P(CO2)? – –

  16. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01

    368. Pitman. A.L. , M. Pourbaix, and N. de Zoubov (1957),through an Eh–pH, or Pourbaix diagram, at a specified pH.

  17. Wetland Plant Influence on Sediment Ecosystem Structure and Trophic Function

    E-Print Network [OSTI]

    Whitcraft, Christine R.

    2007-01-01

    nodosa meadow in the Canary Islands: assemblage structure,of polychaete species Bay (Canary Islands) Brito et al. 4nodosa meadow in the Canary Islands: assemblage structure,

  18. Wetland plant influence on sediment ecosystem structure and trophic function

    E-Print Network [OSTI]

    Whitcraft, Christine René

    2007-01-01

    nodosa meadow in the Canary Islands: assemblage structure,nodosa meadow in the Canary Islands: assemblage structure,Griffen et al. Bay (Canary Islands) Lagoon (Mexico)

  19. ER-12-1 completion report

    SciTech Connect (OSTI)

    Russell, C.E.; Gillespie, D.; Cole, J.C.; Drellack, S.L.

    1996-12-01

    The objective of drillhole ER-12-1 was to determine the hydrogeology of paleozoic carbonate rocks and of the Eleana Formation, a regional aquitard, in an area potentially downgradient from underground nuclear testing conducted in nearby Rainier Mesa. This objective was addressed through the drilling of well ER-12-1 at N886,640.26 E640,538.85 Nevada Central Coordinates. Drilling of the 1094 m (3588 ft) well began on July 19, 1991 and was completed on October 17, 1991. Drilling problems included hole deviation and hole instability that prevented the timely completion of this borehole. Drilling methods used include rotary tri-cone and rotary hammer drilling with conventional and reverse circulation using air/water, air/foam (Davis mix), and bentonite mud. Geologic cuttings and geophysical logs were obtained from the well. The rocks penetrated by the ER-12-1 drillhole are a complex assemblage of Silurian, Devonian, and Mississippian sedimentary rocks that are bounded by numerous faults that show substantial stratigraphic offset. The final 7.3 m (24 ft) of this hole penetrated an unusual intrusive rock of Cretaceous age. The geology of this borehole was substantially different from that expected, with the Tongue Wash Fault encountered at a much shallower depth, paleozoic rocks shuffled out of stratigraphic sequence, and the presence of an altered biotite-rich microporphyritic igneous rock at the bottom of the borehole. Conodont CAI analyses and rock pyrolysis analyses indicate that the carbonate rocks in ER-12-1, as well as the intervening sheets of Eleana siltstone, have been thermally overprinted following movement on the faults that separate them. The probable source of heat for this thermal disturbance is the microporphyritic intrusion encountered at the bottom of the hole, and its age establishes that the major fault activity must have occurred prior to 102.3+0.5 Ma (middle Cretaceous).

  20. Petrology and geochemistry of Alto Peak, a vapor-cored hydrothermal system, Leyte Province, Philippines

    SciTech Connect (OSTI)

    Reyes, A.G.; Giggenbach, W.F.; Saleras, J.R.M.; Salonga, N.D.; Vergara, M.C.

    1993-10-01

    Based on detailed petrological information on secondary mineral assemblages and the composition of fluids trapped in inclusions and discharged from five wells, the Alto Peak geothermal field was found to represent a combined vapor and liquid-dominated system. A central core or chimney, with a diameter of about 1 km, a height of some 3 km and occupied by a high gas vapor (1.1 to 5.6 molal CO{sub 2}), is surrounded by an envelope of intermediate salinity water (7,000 mg/kg Cl) with temperatures between 250 and 350 C. The transition from purely vapor-dominated to liquid-dominated zones takes place via two-phase zones occupied by fluid mixtures of highly variable compositions. Much of the lower temperature, mature neutral pH Cl water is likely to have formed during an earlier stage in the evolution of the system. High temperatures of > 300 C, and associated alteration, are limited to wells AP-1D and the lower parts of AP-2D and are ascribed to re-heating by recent magmatic intrusions. The isotopic composition of the well discharges suggests that they contain some 40 to 50% of magmatic water. Alto Peak is considered a typical example of hydrothermal systems associated with many dormant volcanoes.

  1. Changes in Native Aquatic Vegetation, Associated Fish Assemblages, and Food Habits of Largemouth Bass (Micropterus salmoides) Following the Addition of Triploid Grass Carp to Manage Hydrilla (Hydrilla Verticillata) in Lake Conroe, TX 

    E-Print Network [OSTI]

    Ireland, Patrick Alexander

    2011-10-21

    Nuisance aquatic vegetation (mainly Hydrilla Verticillata ) has become problematic in Lake Conroe, TX. Consequently, triploid grass carp (Ctenopharynogodon idella) were stocked at densities sufficient to completely denude ...

  2. Page 1 of 6 Curriculum Vitae

    E-Print Network [OSTI]

    Scheiber, Laura L.

    in Western Sichuan Province),(Southern Ethnoarchaeology) Vol. 7: 1­58. 2006 Hung, Ling-yu and Chuan kun Ho Journal 21(6): 591­624. 2003 Ho, Chuan kun and Ling-yu Hung. (Preliminary Report on Archaeological Science. 2002 Ho, Chuan kun and Ling-yu Hung.(The Origin of the Cou), for (Digital Museum of Mt. Ali

  3. Effects of Natural Disasters on Conservation Policies: The Case of the 2008 Wenchuan Earthquake, China

    E-Print Network [OSTI]

    Earthquake, China Andre´s Vin~a, Xiaodong Chen, William J. McConnell, Wei Liu, Weihua Xu, Zhiyun Ouyang the impacts of a devastating earthquake on forest recovery and avoided forest loss estimated to have been% of the forests in Wenchuan County, Sichuan province, China were imme- diately affected by the 2008 earthquake

  4. Natural recovery and restoration in giant panda habitat after the Wenchuan earthquake

    E-Print Network [OSTI]

    Natural recovery and restoration in giant panda habitat after the Wenchuan earthquake Jindong Zhang in revised form 20 January 2014 Accepted 21 January 2014 Keywords: Earthquake Restoration Natural recovery Reserve in Sichuan, China after the catastrophic Wenchuan earthquake (magnitude 8.0) in 2008, which caused

  5. SOUTHWEST CHINA JOURNAL OF AGRICULTURAL 1999 12 Vol.12 1999

    E-Print Network [OSTI]

    Yu, Genong "Eugene"

    situation of wetland resources (swamp land and peat land ) in the Northwest Plateau of Sichuan province.8×104ha 20.9×104ha15.4×108t Analysisutilization and protection of wetland resources in the Northwest of peat land and 15.4 hundred million tons prospective reserves of peat in the study area. On the basis

  6. BioOne sees sustainable scholarly publishing as an inherently collaborative enterprise connecting authors, nonprofit publishers, academic institutions, research libraries, and research funders in the common goal of maximizing access to critical research.

    E-Print Network [OSTI]

    Downie, Stephen R.

    BioOne sees sustainable scholarly publishing as an inherently collaborative enterprise connecting. BioOne provides a sustainable online platform for over 170 journals and books published by nonprofit of Life Sciences, Sichuan University, Chengdu 610064, China. 2 Present address: College of Architecture

  7. Spectral Decomposition Using S-transform for Hydrocarbon Detection and Filtering 

    E-Print Network [OSTI]

    Zhang, Zhao

    2012-10-19

    the feasibility and efficiency of using S-transform for hydrocarbon detection and time-varying surface wave filtering. S-transform was first applied to two seismic data sets from a clastic reservoir in the North Sea and a deep carbonate reservoir in the Sichuan...

  8. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 26, NO. 5, JUNE 2008 809 Cross-Layer Protocol Design and Optimization for

    E-Print Network [OSTI]

    Wu, Hongyi

    naturally calls for merging Layer 3 and Layer 2 protocols in order to reduce overhead and improve network delivery protocol for DFT-MSN achieves a high message delivery ratio with low energy consumption of Software, Sichuan University, China (email:lf1975@gmail.com). Digital Object Identifier 10.1109/JSAC.2008

  9. Interaction of an oblique shock wave with a pair of parallel vortices: Shock dynamics and mechanism of sound generation

    E-Print Network [OSTI]

    Zhang, Yong-Tao

    and the mechanism of sound generation in the interaction between an oblique shock wave and a pair of vortices. WeInteraction of an oblique shock wave with a pair of parallel vortices: Shock dynamics and mechanism of sound generation Shuhai Zhanga China Aerodynamics Research and Development Center, Mianyang, Sichuan

  10. Accountability of Perfect Concurrent Signature Li Yunfeng, He Dake, Lu Xianhui

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . Security & National Computing Grid Southwest Jiaotong University Chengdu 610031, Sichuan, China forwardlyf of the security properties of (perfect) concurrent signature and we give the definition of accountability on this observation, we propose that accountability [12] should be one of the security properties of (perfect

  11. Ya ri a bsod Collection 4

    E-Print Network [OSTI]

    Sha bo don 'grub rdo rje; Skal dbang skyid

    ????????????????????????? Genre or type (i.e. epic, song, ritual) Persuade Song ??? ??????????????? Name of recorder (if different from collector) Date of recording February 2007 ????? ?????????????????????????? Place of recording A skyid Village, A skyid Township... of performer(s) E kho, 72, female, A skyid Township, Mdzo dge County, Rnga ba Tibetan and Qiang Autonomous Prefecture, Sichuan Province. ??,?????????????????????????? ?? ?????? ???? ??? ??????????????????????????????????...

  12. Stress evolution and fault interactions before and after the 2008 Great Wenchuan earthquake

    E-Print Network [OSTI]

    Liu, Mian

    Stress evolution and fault interactions before and after the 2008 Great Wenchuan earthquake Gang Keywords: Wenchuan earthquake Coulomb stress Fault interaction Viscoelastoplastic Finite element modeling,000 lives and devastating many cities in the Sichuan province, China. The coseismic stress changes due

  13. A Novel Design Method of Stream Ciphers Table-Element Permutation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Novel Design Method of Stream Ciphers Based on Table-Element Permutation Hongbo Zou Neijiang Local Tax Bureau, Sichuan, China scnjds@163.com Abstract. In this paper, a new stream ciphers design. The approach is efficient to design stream ciphers. Key words: stream cipher, combining function, LFSR

  14. Atmos. Chem. Phys., 11, 79757990, 2011 www.atmos-chem-phys.net/11/7975/2011/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    and seasonal cycles of aerosols in India and China seen in global climate-aerosol model S. V. Henriksson1, A aerosol concentrations found in Kolkata and elsewhere in the Ganges basin in India and on the northern part of the east coast and in the Sichuan basin in China. In India, natural aerosols have a maximum

  15. The effects of double-diffusion on a baroclinic vortex

    E-Print Network [OSTI]

    Smith, Wendy Marie

    1987-01-01

    Laboratory experiments were performed to study the combined effects of double-diffusion and rotation on an oceanic intrusion. Intrusions are driven across density-compensated fronts by the divergence of the double-diffusive ...

  16. Intimacy for Sale: Masculinity, Entrepreneurship, and Commodity Self in Japan's Neoliberal Situation

    E-Print Network [OSTI]

    Takeyama, Akiko

    2010-09-01

    call this assemblage a neoliberal situation. Li Zhang and Aihwa Ong similarly treat neoliberalism as a situation and assemblage; see Zhang and Ong, ‘Introduction’, 16. Also see Hoffman, ‘Autonomous Choices’; Ong, Neoliberalism as Exception; Rofel...

  17. Stoichiometry and grazer community composition over gradients of light, nutrients, and predation risk

    E-Print Network [OSTI]

    Hall, Spencer R.; Leibold, Mathew A.; Lytle, David A.; Smith, Val H.

    2004-08-01

    mesocosms (cattle tanks) by creating gradients of resource supply and predation risk, to which we added diverse assemblages of algal producer and zooplankton grazer species. We then characterized the end-point composition of grazer assemblages and quantity...

  18. Stoichiometry and planktonic grazer composition over gradients of light, nutrients, and predation risk

    E-Print Network [OSTI]

    Hall, Spencer R.; Leibold, Mathew A.; Lytle, David A.; Smith, Val H.

    2004-01-01

    mesocosms (cattle tanks) by creating gradients of resource supply and predation risk, to which we added diverse assemblages of algal producer and zooplankton grazer species. We then characterized the end-point composition of grazer assemblages and quantity...

  19. Published at the fourth meeting of the European Concerted Action on Process Tomography (ECAPT). Bergen, Norway, April 1995.

    E-Print Network [OSTI]

    ­contact and non­intrusive optical measurement technique. This approach can be used to optimize industrial burners

  20. Geologic carbon sequestration as a global strategy to mitigate CO2 emissions: Sustainability and environmental risk

    E-Print Network [OSTI]

    Oldenburg, C.M.

    2012-01-01

    natural gas or mineral resources such as potash Saline water intrusion into potable water degrades water quality

  1. 86 Water Resources and the Urban Environment Review of Analytical Studies of Tidal Groundwater Flow in Coastal

    E-Print Network [OSTI]

    Jiao, Jiu Jimmy

    . For example, Carr (1969) investigated the tide-related salt-water intrusion in Prince Edward Island; Lanyon et

  2. Layered rocks beneath the Phanerozoic platform of the US midcontinent

    SciTech Connect (OSTI)

    Hauser, E.C. (Cornell Univ., Ithaca, NY (United States))

    1991-03-01

    A thick sequence of layered rocks lies hidden beneath the Phanerozoic cover of the central US over large regions. A thick sequence of Precambrian layered rocks in imaged on the COCORP transect across southern Illinois and Indiana. The thickness of this layered sequence varies from 1-3 times the thickness of the overlying Phanerozoic section of the Illinois basin. The layered sequence is observed for close to 200 km in an east-west direction. Similar layered reflections are seen on the COCORP data from Hardeman Co., TX, and neighboring southwest Oklahoma. Both of these known occurrences lie within the region of the middle Proterozoic Granite/Rhyolite province of the US midcontinent, an area within which scattered wells to basement commonly encounter 1.3-1.5 Ga undeformed granite and/or compositionally similar rhyolite. Therefore, these layered assemblages may comprise a thick sequence of silicic volcanic and sedimentary rocks (perhaps also injected by mafic sills) between scattered volcanic-intrusive centers, such as exposed in the St. Francois Mountains of southeast Missouri. However, in places such as Illinois and Indiana, the near absence of deep wells leaves the possibility that the upper portion of these layered rocks may locally be of late Proterozoic or earliest Paleozoic age. The reprocessing of available industry data, analyzed in conjunction with the existing COCORP data, includes extended vibroseis correlation. These industry data are invaluable in the author's effort to expand the known distribution of these layered rocks (e.g., into north-central Illinois) and to map their structures.

  3. 1018 BioScience December 2001 / Vol. 51 No. 12 The 21st century is an exciting time for biological

    E-Print Network [OSTI]

    ,and unraveling functional genomics at scales ranging from organisms to community assemblages--to pro- vide just

  4. A New Enigmatic, Tubular Organism From the Ediacara Member, Rawnsley Quartzite, South Australia

    E-Print Network [OSTI]

    Joel, Lucas

    2013-01-01

    2006. Assemblage paleoecology of the Ediacara biota: thePaleoecology.cm-thick event beds. PALEOECOLOGY Plexus ricei, “Aulozoon,”

  5. Experimental Assessment of CO2Mineral-Toxic Ion Interactions in a Simplified Freshwater Aquifer: Implications for CO2 Leakage from

    E-Print Network [OSTI]

    that remobilization of trace elements by CO2 intrusion is not a universal physicochemical effect. In fact goethite, a decrease in pH resulting from CO2 intrusion could reactivate the adsorption of Se(IV) and As(V) if goethite, arsenite As(III) is significantly adsorbed on goethite, but is partially remobilized by CO2 intrusion

  6. JC3 Incident Reporting | Department of Energy

    Office of Environmental Management (EM)

    attempted intrusion is an exploit that stands out above the daily activity or noise level, as determined by the system owner, and would result in unauthorized access...

  7. Magnetic Modeling Of The Phlegraean Volcanic District With Extension...

    Open Energy Info (EERE)

    structures associated with CFc and Ischia, Procida-Vivara, Ventotene and Santo Stefano islands, have been interpreted as igneous bodies that may be solidified intrusions or...

  8. Emplacement and dewatering of the world's largest exposed sand injectite complex

    E-Print Network [OSTI]

    Sherry, Timothy J.; Rowe, Christie D.; Kirkpatrick, James D.; Brodsky, Emily E.

    2012-01-01

    intrusions primed by silica diagenesis, Geology, 34, 917–R. E. Garrison (1990), Silica diagenesis in the Santa Cruzto the west. Silica diagenesis in the diatomaceous Monterey

  9. Sustaining Sherman Island: A Water Management and Agricultural Diversification System

    E-Print Network [OSTI]

    Fischer, Richard

    2011-01-01

    intrusion, and ongoing subsidence are current threats todisasters by reversing subsidence and stabilizing levees,must be made to reverse subsidence, stabilize the fragile

  10. LBNL REPORT NUMBER 53776; OCTOBER 2003 ASHRAE &Residential Ventilation

    E-Print Network [OSTI]

    .........................................................10 11. Water Intrusion Control.............................................................10 What control and ventilation are key control means. People spend, on average, nearly 90% of their time indoors

  11. The Mechanics of Unrest at Long Valley Caldera, California. 2...

    Open Energy Info (EERE)

    gravity change determinations are used to estimate the intrusion geometry, assuming a vertical prolate ellipsoidal source. The U.S. Geological Survey occupied the Long Valley...

  12. An Oxygen Isotope Study Of Hydrothermal Alteration In The Lake...

    Open Energy Info (EERE)

    resurgent intrusions, fluid flow was again directed upward where resurgence-related, near-vertical fractures intersect the megabreccia units. Authors Peter B. Larson and Hugh P....

  13. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  14. in High Performance Computing Computer System, Cluster, and Networking...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    iSSH v. Auditd: Intrusion Detection in High Performance Computing Computer System, Cluster, and Networking Summer Institute David Karns, New Mexico State University Katy Protin,...

  15. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  16. PROJECT MANGEMENT PLAN EXAMPLES Prepare Project Support Plans...

    Energy Savers [EERE]

    excess facility buildings will be inspected for safety, security, deterioration, and weather and animal intrusion (2) Any 420-D building DW plant towers with passive draining...

  17. "Open access to America from abroad."

    E-Print Network [OSTI]

    dominated by news of war, disease and dark threats of bioterrorism and nuclear proliferation without the intrusion of politics or bureaucracy, the community's wish list provides an insightful

  18. August 18, 2015 Webinar - Probabilistic Analysis of Inadvertent...

    Broader source: Energy.gov (indexed) [DOE]

    Performance & RIsk Assessment (P&RA) Community of Practice (CoP) Webinar - August 18, 2015 - Probabilistic Analysis of Inadvertent Intrusion and the International Atomic Energy...

  19. Licensing Opportunity Announcements | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Modeling of Human Perceptual Similarity Opinions Rapid, Portable Viral Diagnostic Wireless Power Transfer In-situ Trainable Intrusion Detection System Parallel Coordinate Plot...

  20. Application of Metagenomics for Identification of Novel Petroleum Hydrocarbon Degrading Enzymes in Natural Asphalts from the Rancho La Brea Tar Pits

    E-Print Network [OSTI]

    Baquiran, Jean-Paul Mendoza

    2010-01-01

    and characterization of long-chain-alkane degrading Bacillus thermoleovorans from deep subterranean petroleum reservoirs.characterization of microbial assemblages associated with high- temperature petroleum reservoirs.

  1. Interactions of cadmium, zinc, and phosphorus in marine Synechococcus : field uptake, physiological and proteomic studies

    E-Print Network [OSTI]

    Cox, Alysia Danielle

    2011-01-01

    A combination of uptake field studies on natural phytoplankton assemblages and laboratory proteomic and physiological experiments on cyanobacterial isolates were conducted investigating the interactions of cadmium (Cd), ...

  2. Ostracodes and Gastropods of the Waucobi Lake Beds: Significance for Pliocene Environmental and Climate Conditions in the Eastern Sierra Nevada, California

    E-Print Network [OSTI]

    Oseguera, Joanna Rosalie

    2012-01-01

    and Wilkinson I. P. 2011, Diagenesis of fossil ostracods:of biostratinomy and diagenesis, it affects degree ofthe live assemblages. Diagenesis Diagenesis includes the

  3. Gastropods and their habitats from the northern Red Sea (Egypt: Safaga)

    E-Print Network [OSTI]

    Zuschin, Martin

    Gastropods and their habitats from the northern Red Sea (Egypt: Safaga) Part 1: Patellogastropoda. Keywords: Mollusca, biodiversity, Red Sea, Indian Ocean, Egypt, assemblages Zusammenfassung Mehr als 2100

  4. Wetland Plant Influence on Sediment Ecosystem Structure and Trophic Function

    E-Print Network [OSTI]

    Whitcraft, Christine R.

    2007-01-01

    alterniflora and benthic microalgae in salt marsh food webs:assemblages of marine wetland microalgae and photosyntheticalternijlora and benthic microalgae in salt marsh food webs:

  5. Wetland plant influence on sediment ecosystem structure and trophic function

    E-Print Network [OSTI]

    Whitcraft, Christine René

    2007-01-01

    alterniflora and benthic microalgae in salt marsh food webs:assemblages of marine wetland microalgae and photosyntheticalterniflora and benthic microalgae in salt marsh food webs:

  6. Deep Water Mixing Prevents Harmful Algal Bloom Formation: Implications for Managed Fisheries Refugia 

    E-Print Network [OSTI]

    Hayden, Natanya Jeanne

    2012-10-19

    phytoplankton groups through CHEMTAX, a matrix factorization program (Mackey et al. 1996; Wright et al. 1996). Aggregated assemblage composition accounted for included: cyanobacteria, euglenophytes, chlorophytes, haptophytes, cryptophytes, diatoms...

  7. DOE Funds 21 Research, Development and Demonstration Projects...

    Energy Savers [EERE]

    (Anchorage, Alaska): to identify open fracture systems by their Fluid Inclusion Stratigraphy (FIS) chemical signature; differences based on the mineral assemblages and geology...

  8. Real-time analysis of aggregate network traffic for anomaly detection 

    E-Print Network [OSTI]

    Kim, Seong Soo

    2005-08-29

    .........................................................................82 2. Identification of Attackers? and Victims? Entire IP Address..........84 F. Comparison with IDS .............................................................................86 1. Intrusion Detection System and Snort... resources. Attack propagation could be slowed through early detection of attacks. Traditionally, Intrusion detection system (IDS) tools that rely upon operating system logs, process behaviors and firewall logs have been employed to monitor the network...

  9. SEISMIC IMAGING TO HELP UNDERSTAND AND MANAGE WATER QUALITY IN COASTAL BENIN, WEST AFRICA

    E-Print Network [OSTI]

    Barrash, Warren

    SEISMIC IMAGING TO HELP UNDERSTAND AND MANAGE WATER QUALITY IN COASTAL BENIN, WEST AFRICA WHERE mitigate saltwater intrusion. WHO: Boise State University; Gonzaga University; l'Université d intrusion and this problem is likely to worsen without significant steps to improve management

  10. www.elsevier.com/locate/ijcip Available online at www.sciencedirect.com

    E-Print Network [OSTI]

    Wool, Avishai

    /TCP for intrusion detection in SCADA systems Niv Goldenberg, Avishai Wooln School of Electrical Engineering, Tel 2013 Accepted 24 April 2013 Available online 4 May 2013 Keywords: SCADA systems Modbus/TCP Network intrusion detection system a b s t r a c t The Modbus/TCP protocol is commonly used in SCADA systems

  11. DOCKET: A-98-49 Item: II-B1-27

    E-Print Network [OSTI]

    Intrusion TSD iii SC&A ­ June 24, 2010 LBRE Low Background Radiation Experiment LWA Land Withdrawal Act LWB FOR SECTIONS 194.32 AND 194.33: 2009 COMPLIANCE RECERTIFICATION APPLICATION RE- EVALUATION OF SELECT HUMAN INTRUSION ACTIVITIES REVISION 3 Prepared for: U. S. Environmental Protection Agency Office of Radiation

  12. (This is a sample cover image for this issue. The actual cover is not yet available at this time.) This article appeared in a journal published by Elsevier. The attached

    E-Print Network [OSTI]

    Galland, Olivier

    and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing and the shape of the underlying intrusion are monitored. The models consisted of a molten vegetable oil upper crust; oil injection resulted is sheet intrusions (dykes, sills and cone sheets). The initial

  13. Adaptive Network Management for Countering Selective Capture in Wireless Sensor Networks

    E-Print Network [OSTI]

    Chen, Ing-Ray

    station in a wireless sensor network (WSN) to block data delivery. We consider 3 countermeasures and the intrusion invocation interval used for intrusion detection under which the lifetime of a WSN is maximized to limited resources, a WSN must minimize energy consumption to prolong the system useful lifetime, while

  14. Minimizing Private Data Disclosures in the Smart Grid Weining Yang

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    known bat- tery privacy algorithms, Best Effort (BE) and Non-Intrusive Load Leveling (NILL that can record minute- or second-level profiles of energy usage. In tandem with Non-Intrusive Load Monitor access to their energy usage. Such concerns have caused public outcry, and let to smart meters being

  15. Gas-path leakage seal for a gas turbine

    DOE Patents [OSTI]

    Wolfe, C.E.; Dinc, O.S.; Bagepalli, B.S.; Correia, V.H.; Aksit, M.F.

    1996-04-23

    A gas-path leakage seal is described for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a gas turbine (such as combustor casing segments). The seal includes a generally imperforate foil-layer assemblage which is generally impervious to gas and is located in the leakage-gap. The seal also includes a cloth-layer assemblage generally enclosingly contacting the foil-layer assemblage. In one seal, the first edge of the foil-layer assemblage is left exposed, and the foil-layer assemblage resiliently contacts the first member near the first edge to reduce leakage in the ``plane`` of the cloth-layer assemblage under conditions which include differential thermal growth of the two members. In another seal, such leakage is reduced by having a first weld-bead which permeates the cloth-layer assemblage, is attached to the metal-foil-layer assemblage near the first edge, and unattachedly contacts the first member. 4 figs.

  16. POND CONSERVATION Inter-and intra-annual variations of macroinvertebrate

    E-Print Network [OSTI]

    Murcia, Universidad de

    POND CONSERVATION Inter- and intra-annual variations of macroinvertebrate assemblages are related to the hydroperiod in Mediterranean temporary ponds Margarita Florencio Æ Laura Serrano Æ Carola Go´mez-Rodri´guez Æ+Business Media B.V. 2009 Abstract Macroinvertebrate assemblages of 22 tem- porary ponds with different

  17. The influence of Cr on the garnetspinel transition in the Earth's mantle: experiments in the system MgOCr2O3SiO2 and

    E-Print Network [OSTI]

    the garnet-in reaction to much higher pressures than previously anticipated. Moreover, in Cr-bearing systems main minerals such as olivine, clinopyroxene, orthopyrox- ene and spinel. At higher pressures, however, the spinel bearing assemblage converts into a garnet bearing mineral assemblage. Among others, the tran

  18. A Core Hole in the Southwestern Moat of the Long Valley Caldera: Early

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand Dalton JumpProgram | OpenEnergy Information Of The(Sichuan,

  19. CX-009096: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    U.S. Customs and Border Protection Non-Intrusive Inspection Tests CX(s) Applied: B3.10, B3.11 Date: 05/18/2012 Location(s): Washington Offices(s): Pacific Northwest Site Office

  20. ITL Bulletins are published by the Information Technology Laboratory

    E-Print Network [OSTI]

    Intrusion Detection Systems, July 2003 IT Security Metrics, August 2003 Information Technology Security Security Considerations in the Information System Development Life Cycle, December 2003 Computer Security Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems

  1. Location of Leaks in Pressure Testable Direct Burial Steam Distribution Conduits 

    E-Print Network [OSTI]

    Sittel, M. G.; Messock, R. K.

    1993-01-01

    Central steam is commonly distributed through direct burial lines protected by an outer conduit. These underground conduit systems are subject to electrolytic corrosion. Failure of the outer casing permits water intrusion and damage to insulation...

  2. Study of granular temperature in dense fluidized beds by diffusing wave spectroscopy 

    E-Print Network [OSTI]

    Zivkovic, Vladimir

    2009-01-01

    Diffusing wave spectroscopy (DWS), a non-intrusive multiple scattering technique, can be used to study the fundamentals of particle motion in dynamic dense granular media and measure the mean of the square of the particle ...

  3. The Influence of Basalt Layers on Seismic Wave Propagation 

    E-Print Network [OSTI]

    Hanssen, Peter

    Large areas of the Earth are covered by intrusive and extrusive lavas, forming high velocity basalts, which are often opaque to cinventional seismicreflection surveys. On the North East Atlantic margin these basalts cover ...

  4. Coordinated Variable Structure Switching Attacks for Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11

    attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

  5. EXTENSION WATER SUMMIT PRIORITY: WATER CONSERVATION

    E-Print Network [OSTI]

    Slatton, Clint

    EXTENSION WATER SUMMIT PRIORITY: WATER CONSERVATION Leadership Team Subcommittee: Joan Bradshaw Michael Dukes Pierce Jones Kati Migliaccio #12;Water Conservation - Situation · Florida water supplies are used for agriculture, natural resources, salt water intrusion protection, drinking water, industry

  6. Laboratory simulation of subsurface airflow beneath a building

    E-Print Network [OSTI]

    Corsello, Joseph William

    2014-01-01

    Vapor intrusion is the vapor-phase migration of volatile organic compounds (VOCs) into buildings due to subsurface soil or groundwater contamination. Oxygen replenishment rates beneath a building are significant for ...

  7. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    potentially lead to the exposure to members of the public. The potential amount of contamination deposited on the ground surface,more due to plant intrusion into buried waste,...

  8. This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research

    E-Print Network [OSTI]

    Alvarez, Pedro J.

    -standing and emerging water contaminants, as well as enabling tech- nologies such as desalination of seawater away a large fraction of already scarce fresh water resource due to seawater intrusion; municipal

  9. Glyph-Based Generic Network Visualization Robert F. Erbacher

    E-Print Network [OSTI]

    Erbacher, Robert F.

    for constant real-time monitoring of the network environment. Keywords: Information Visualization, Computer monitoring environment. The need for intrusion detection monitoring should be clear. Traffic monitoring network for their livelihood. Network managers and system administrators must monitor activity

  10. 2012 University of California Prepublication Data March 2012 Berkeley Sensor & Actuator Center Spring 2012

    E-Print Network [OSTI]

    California at Irvine, University of

    Spring 2012 6/12 Smart Fence - Continuation · Solar energy scavenging · Enclosure redesign · Air quality & Actuator Center Spring 2012 12/12 Project Outlook · Large fence deployment (Intrusion + gas sensing) · On

  11. Evaluation of Advanced Safety Perimeter Systems for Kansas Temporary Work Zones

    E-Print Network [OSTI]

    Novosel, Christopher

    2014-12-31

    Every year approximately 120 workers die in work zones, with approximately 60 percent of them as a result of intrusion accidents. Temporary work zones have a critical safety gap due to the expense and time needed to deploy ...

  12. Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans University thermal management alternative. Keywords: storage systems, security, thermal management, denial shut-down. Our new thermal attack on future storage systems is unrecognized by current Intrusion

  13. Residence times and source ages of deep crustal fluids: interpretation of 129

    E-Print Network [OSTI]

    Fehn, Udo

    suggest residence times of 10 Ma or more for the fluids in formations with uranium concentrations of 1 ppm, such as in the exchange of elements, cooling of intrusions, formation of ore deposits or mineral formation. From recent

  14. Toxic hazards of underground excavation

    SciTech Connect (OSTI)

    Smith, R.; Chitnis, V.; Damasian, M.; Lemm, M.; Popplesdorf, N.; Ryan, T.; Saban, C.; Cohen, J.; Smith, C.; Ciminesi, F.

    1982-09-01

    Inadvertent intrusion into natural or man-made toxic or hazardous material deposits as a consequence of activities such as mining, excavation or tunnelling has resulted in numerous deaths and injuries in this country. This study is a preliminary investigation to identify and document instances of such fatal or injurious intrusion. An objective is to provide useful insights and information related to potential hazards due to future intrusion into underground radioactive-waste-disposal facilities. The methodology used in this study includes literature review and correspondence with appropriate government agencies and organizations. Key categories of intrusion hazards are asphyxiation, methane, hydrogen sulfide, silica and asbestos, naturally occurring radionuclides, and various mine or waste dump related hazards.

  15. Diagnosis and Isolation of Air Gap Eccentricities in Closed-loop Controlled Doubly-Fed Induction Generators 

    E-Print Network [OSTI]

    Meenakshi Sundaram, Vivek

    2012-07-16

    With the widespread use of doubly-fed induction generators (DFIG) in wind energy conversion systems, condition monitoring is being given importance. Non-intrusive techniques like motor current signature analysis (MCSA), which involves looking...

  16. vapor transition of the capillary pore water, as well as that bound in the cement paste component of the concrete. An

    E-Print Network [OSTI]

    Bentz, Dale P.

    than that of their component cement pastes.10 Simulation stud- ies and experimental evaluation using for this percolation of ITZs in conventional concretes has been provided by Wood's metal intrusion, and subsequent

  17. A quantitative man-machine model for cyber security efficiency analysis 

    E-Print Network [OSTI]

    Jung, Sung-Oh

    2007-04-25

    Quality (TWQ). The machine component is composed of variables such as traffic volume and the amount of downtime. M3 enables the analysis of intrusion detection and incident response process efficiency, i.e., security defense team performance. With data...

  18. Automated classification of power signals

    E-Print Network [OSTI]

    Proper, Ethan R. (Ethan Richard)

    2008-01-01

    The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to monitor an entire system from a single reference point. The NILM and associated software convert the V/I signal to spectral ...

  19. Smart Grid Solutions That Pay You

    SciTech Connect (OSTI)

    Dizy, Ron

    2011-10-26

    Describes technologies for mature demand-side asset market. Bi-directional DR; less intrusive to customers; challenges: regulatory, ISO and utility focus, engagement of loads, and effective pilots.

  20. Monitoring Fine Sediment; Grande Ronde and John Day Rivers, 1999 Annual Report.

    SciTech Connect (OSTI)

    Rhodes, Jonathan J.; Greene, M. Jonas; Purser, Michael D.

    2000-01-01

    This project was initiated to monitor surface fine sediment levels and overwinter intrusion of fine sediment in spring chinook salmon spawning habitat in the North Folk John Day and Grande Ronde Rivers, for five years.