Powered by Deep Web Technologies
Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage...  

Open Energy Info (EERE)

icon A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A...

2

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage  

Open Energy Info (EERE)

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Details Activities (0) Areas (0) Regions (0) Abstract: Lengshuiqing is part of the late Proterozoic igneous province from the western margin of the Yangtze craton. The Lengshuiqing area comprises five ultramafic-mafic intrusions, emplaced in the late Proterozoic Yanbian Group. The intrusions from Lengshuiqing contain cumulate ultramafic zones (peridotite + olivine pyroxenite), with cumulus olivine and Cr-spinel, and intercumulus pyroxenes, hornblende, phlogopite and plagioclase. Ni-Cu ore (pyrrhotite + pentlandite + chalcopyrite) is

3

Intrusive gravity currents  

E-Print Network (OSTI)

The front speed of intrusive gravity currents. J. FluidP.F. Linden. Intrusive gravity currents. J. Fluid Mechanics,of mesoscale variability of gravity waves. Part II: Frontal,

Hang, Alice Thanh

2009-01-01T23:59:59.000Z

4

Intrusion Detection: Characterising intrusion detection sensors  

Science Conference Proceedings (OSTI)

An intrusion detection sensor is defined as a device that collects and analyses network traffic for the purpose of identifying suspicious events. Too often the value of a sensor is associated with its data collection and analysis features. Experience ...

Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen

2008-09-01T23:59:59.000Z

5

Intrusions: What Drives Them?  

Science Conference Proceedings (OSTI)

The driving mechanism for the observed interleaving of water masses is generally assumed to be double-diffusive mixing. However, some observations of intrusions have been made in regions where the mean stratification is stable to double-diffusive ...

Dave Hebert

1999-06-01T23:59:59.000Z

6

Salinity Intrusion in Estuaries  

Science Conference Proceedings (OSTI)

One dimensional time-averaged solutions are examined for salinity intrusion in estuaries with a breadth variation BL(X/?)n and a depth variation H(X/?)m, where X is the distance from the head of the estuary. These solutions emphasize the ...

D. Prandle

1981-10-01T23:59:59.000Z

7

ASSEMBLAGES ON WASTE ROCK  

E-Print Network (OSTI)

Abstract: Natural regeneration on waste rock was investigated at the old Wangaloa coal mine, south-east Otago. A 450-m long waste rock stack had been created 40–50 years ago, and has had little anthropogenic intervention since. The stack is made up of a gradient of three main waste rock types, defined as ‘silt-rich’, ‘mixed’, and ‘quartz-rich’, which reflect different proportions of loess siltstone and quartz gravel conglomerate. Plant species assemblages were quantified in four 5-m 2 quadrats in each waste rock type. Invertebrates were heat extracted from substrate cores (7 cm diameter; depth 5 cm) collected from quadrats over an eight-week period in spring 2003. Ordination analysis showed statistically distinct plant and invertebrate assemblages had arisen on each waste rock type. Revegetation patterns were dominated by native, woody individuals on all waste rock types, particularly manuka (Leptospermum scoparium) and kanuka (Kunzea ericoides). Plant cover on ‘silt-rich ’ waste rock was four-fold that on ‘quartz-rich ’ waste rock. Total numbers of invertebrates were highest on ‘quartz-rich’ waste rock, but richness greatest on ‘silt-rich ’ waste rock. Collembola dominated the fauna but their numbers were proportionally greatest in poorly vegetated areas. Further work is required to explain the absence of plants and invertebrates from local areas of waste rock. ___________________________________________________________________________________________________________________________________

C. G. Rufaut; S. Hammit; D. Craw; S. G. Clearwater

2006-01-01T23:59:59.000Z

8

An Intrusion-Detection Model  

Science Conference Proceedings (OSTI)

A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's ... Keywords: statistical measures, Abnormal behavior, auditing, intrusions, monitoring, profiles, security

Dorothy E. Denning

1987-02-01T23:59:59.000Z

9

Gas intrusion into SPR caverns  

Science Conference Proceedings (OSTI)

The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

1995-12-01T23:59:59.000Z

10

KIDS: keyed intrusion detection system  

Science Conference Proceedings (OSTI)

Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method ... Keywords: Kerckhoffs' principle, anomaly detection, keyed IDS, network intrusion detection, word model

Sasa Mrdovic; Branislava Drazenovic

2010-07-01T23:59:59.000Z

11

Buried fiber optic intrusion sensor  

E-Print Network (OSTI)

A distributed fiber optic intrusion sensor capable of detecting intruders from the pressure of their weight on the earth's surface was investigated in the laboratory and in field tests. The presence of an intruder above or in proximity to the buried sensor induces a phase shift in light propagating along the fiber which allows for the detection and localization of intrusions. Through the use of an ultra-stable erbium-doped fiber laser and phase sensitive optical time domain reflectometry, disturbances were monitored in long (several km) lengths of optical fiber. Narrow linewidth and low frequency drift in the laser were achieved through a combination of optical feedback and insulation of the laser cavity against environmental effects. The frequency drift of the laser, characterized using an all-fiber Mach Zehnder interferometer, was found to be less than 1 MHz/min, as required for operation of the intrusion detection system. Intrusions were simulated in a laboratory setting using a piezoelectric transducer to produce a controllable optical phase shift at the 2 km point of a 12 km path length. Interrogation of the distributed sensor was accomplished by repetitively gating light pulses from the stable laser into the sensing fiber. By monitoring the Rayleigh backscattered light with a photodetector and comparing traces with and without an induced phase shift, the phase disturbances were detected and located. Once the feasibility of such a sensor was proven in the laboratory, the experimental set up was transferred to Texas A&M's Riverside Campus. At the test site, approximately 40 meters of fiber optic cable were buried in a triangle perimeter and then spliced into the 12 km path length which was housed inside the test facility. Field tests were conducted producing results comparable to those found in the laboratory. Intrusions over this buried fiber were detectable on the ?-OTDR trace and could be localized to the intrusion point. This type of sensor has the potential benefits of heightened sensitivity, covertness, and greatly reduced cost over the conventional seismic, acoustic, infrared, magnetic, and fiber optic sensors for monitoring long (multi-km) perimeters.

Maier, Eric William

2005-05-01T23:59:59.000Z

12

Gravity-driven intrusions in stratified fluids  

E-Print Network (OSTI)

5.5.1 Five interleaving interfacial gravity currents 5.5.2Ten interleaving interfacial gravity currents . 5.6partial- depth intrusive gravity currents,” Atmosphere -

Maurer, Benjamin Dudley

2011-01-01T23:59:59.000Z

13

Intrusion Prevention in Information Systems: Reactive and Proactive Responses  

Science Conference Proceedings (OSTI)

Intrusion prevention requires effective identification of and response to malicious events. In this paper, we model two important managerial decisions involved in the intrusion prevention process: the configuration of the detection component, and the ... Keywords: Information Security, Intrusion Detection, Intrusion Prevention, Intrusion Response

Wei Yue; Metin Cakanyildirim

2007-07-01T23:59:59.000Z

14

Detecting intrusions in encrypted control traffic  

Science Conference Proceedings (OSTI)

Because of a lack of attack signatures and different forms of attacks, signature-based network intrusion detection systems currently provide insufficient protection for industrial control traffic. A combination of two anomaly detection approaches found ... Keywords: industrial control systems, intrusion detection, smart grids

Maarten Hoeve

2013-11-01T23:59:59.000Z

15

Evolving non-intrusive load monitoring  

Science Conference Proceedings (OSTI)

Non-intrusive load monitoring (NILM) identifies used appliances in a total power load according to their individual load characteristics. In this paper we propose an evolutionary optimization algorithm to identify appliances, which are modeled as on/off ... Keywords: NILM, evolution, evolutionary algorithm, knapsack problem, non-intrusive load monitoring

Dominik Egarter; Anita Sobe; Wilfried Elmenreich

2013-04-01T23:59:59.000Z

16

Intrusion ripple analysis in distributed information systems  

Science Conference Proceedings (OSTI)

Security is a very important aspect of distributed computing systems, especially in distributed information environments involving wide-area networks, such as internets. This paper addresses how a security breach, such as intrusion, propagates through ... Keywords: computer crime, distributed information systems, internets, intrusion ripple analysis, networked information system, ripple effect analysis, security breach propagation, software maintenance, wide-area networks

S. S. Yau; Jun Zhu

1997-10-01T23:59:59.000Z

17

Techniques and tools for analyzing intrusion alerts  

Science Conference Proceedings (OSTI)

Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts ... Keywords: Intrusion detection, alert correlation, security management

Peng Ning; Yun Cui; Douglas S. Reeves; Dingbang Xu

2004-05-01T23:59:59.000Z

18

Integrating software specifications into intrusion detection  

Science Conference Proceedings (OSTI)

There exist a number of Intrusion Detection Systems (IDSs) that detect computer attacks based on some defined attack scenarios. The attack scenarios or security requirements in some of these IDSs are specified in attack specification languages that are ... Keywords: Attack scenarios, Intrusion detection, Software specification languages, State machines

Mohammad Zulkernine; Mathews Graves; Muhammad Umair Ahmed Khan

2007-08-01T23:59:59.000Z

19

TIAA: A Visual Toolkit for Intrusion Alert Analysis  

Science Conference Proceedings (OSTI)

This paper presents the development of TIAA, a visual toolkit for intrusion alert analysis. TIAA is developed to provide an interactive platform for analyzing potentially large sets of intrusion alerts reported by heterogeneous intrusion detection systems ...

Ning, P

2003-03-01T23:59:59.000Z

20

Advanced technologies for perimeter intrusion detection sensors  

SciTech Connect

The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

Williams, J.D.

1995-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Gravity-Driven Intrusions in Stratified Fluids  

E-Print Network (OSTI)

5.5.1 Five interleaving interfacial gravity currents 5.5.2Ten interleaving interfacial gravity currents . 5.6in Iceland showing multiple gravity-driven intrusions c ´

Maurer, Benjamin D.

2011-01-01T23:59:59.000Z

22

Autonomous Rule Creation for Intrusion Detection  

SciTech Connect

Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-04-01T23:59:59.000Z

23

Dust Intrusion Events into the Mediterranean Basin  

Science Conference Proceedings (OSTI)

In this study seven dust intrusion events were identified and analyzed in the central and eastern part of the Mediterranean Sea beginning August 1988 and ending September 1989. In order to locate their sources, characterize their mode, and ...

U. Dayan; J. Heffter; J. Miller; G. Gutman

1991-08-01T23:59:59.000Z

24

Computationally Efficient Neural Network Intrusion Security Awareness  

SciTech Connect

An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

Todd Vollmer; Milos Manic

2009-08-01T23:59:59.000Z

25

Non-intrusive fault detection in reciprocating compressors  

E-Print Network (OSTI)

This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

Schantz, Christopher James

2011-01-01T23:59:59.000Z

26

The Structure and Driving Mechanisms of the Baltic Intrusions  

Science Conference Proceedings (OSTI)

Data from closely spaced CTD profiling performed in the eastern Gotland Basin after the 1993 inflow event are used to study thermohaline intrusions in the Baltic Sea. Two CTD cross sections display abundant intrusive layers in the permanent ...

Natalia Kuzmina; Bert Rudels; Tapani Stipa; Victor Zhurbas

2005-06-01T23:59:59.000Z

27

Towards better tamper&intrusion detection  

Science Conference Proceedings (OSTI)

This presentation discusses in generic terms some of the work of the Vulnerability Assessment Team at Los Alamos National Laboratory in the area of tamper and intrusion detection. Novel security approaches are discussed. We also present preliminary results for a crude prototype of a high security ('Town Crier') monitoring system for securing moving cargo or stationary assets.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.)

2002-01-01T23:59:59.000Z

28

Intrusive gravity currents in two-layer  

E-Print Network (OSTI)

Intrusive gravity currents in two-layer stratified media Morris R. Flynn & Paul F. Linden Dept to as a gravity current · In contrast to waves, gravity currents transport significant mass (e.g. fluid parcels, sediment, insects, etc.) Introduction Gravity currents in the environment www

Flynn, Morris R.

29

Intrusion Characteristics in the Antarctic Polar Front  

Science Conference Proceedings (OSTI)

Data obtained on two cruises to the Antarctic Polar Front are used to investigate the nature of thermohaline intrusions in the front. These data, obtained in the Drake Passage and south of New Zealand, include CTD time series made relative to ...

John M. Toole

1981-06-01T23:59:59.000Z

30

Proposing a multi-touch interface for intrusion detection environments  

Science Conference Proceedings (OSTI)

Network Intrusion Detection is a critical task in today's environment, where network attacks and intrusions are everyday occurrences and state-level cyber warfare is a major concern. At the same time, it is a very difficult task, in part due to the large ... Keywords: activity theory, cognitive task analysis, data exploration, natural user interfaces, network intrusion detection visualization

Jeffrey Guenther; Fred Volk; Mark Shaneck

2010-09-01T23:59:59.000Z

31

Network-wide deployment of intrusion detection and prevention systems  

Science Conference Proceedings (OSTI)

Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we explore an alternative design that exploits spatial, network-wide opportunities ... Keywords: intrusion detection, network management

Vyas Sekar; Ravishankar Krishnaswamy; Anupam Gupta; Michael K. Reiter

2010-11-01T23:59:59.000Z

32

Distributed fiber optic moisture intrusion sensing system  

DOE Patents (OSTI)

Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

Weiss, Jonathan D. (Albuquerque, NM)

2003-06-24T23:59:59.000Z

33

Non-intrusive appliance monitor apparatus  

DOE Patents (OSTI)

A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

1989-08-15T23:59:59.000Z

34

Non-intrusive appliance monitor apparatus  

DOE Patents (OSTI)

A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

1989-08-15T23:59:59.000Z

35

An Intrusion Detection System Using Quantum- mechanical Systems  

Technology Description A quantum mechanical-based device that detects an intrusion across a physical boundary or communication link. Because common

36

Sensor Net: Nuclear Installation Intrusion Detection in/near Water ...  

Sensor Net: Nuclear Installation Intrusion Detection in/near Water ... Computational Sciences & Engineering Div Licensing Contact SIMS, DAVID L UT-Battelle, LLC

37

An Intrusion Detection System Using Quantum-Mechanical Systems  

ORNL 2012-G00220/tcc UT-B ID 200701995 10.2012 An Intrusion Detection System Using Quantum-Mechanical Systems Technology Summary Securing property and ...

38

Model generalization and its implications on intrusion detection  

Science Conference Proceedings (OSTI)

To make up for the incompleteness of the known behaviors of a computing resource, model generalization is utilized to infer more behaviors in the behavior model besides the known behaviors. In principle, model generalization can improve the detection ... Keywords: generalization, intrusion, intrusion detection, machine learning, security, security infrastructure

Zhuowei Li; Amitabha Das; Jianying Zhou

2005-06-01T23:59:59.000Z

39

Intrusion detection in sensor networks using clustering and immune systems  

Science Conference Proceedings (OSTI)

Security of sensor networks is a complicated task, mostly due to the limited resources of sensor units. Encryption and authentication are useless if an attacker has entered the system. Thus, a second line of defense known as Intrusion Detection must ... Keywords: genetic algorithms, immune systems, intrusion detection, self-organizing maps, wireless sensor networks

Zorana Bankovi?; José M. Moya; Álvaro Araujo; Juan-Mariano De Goyeneche

2009-09-01T23:59:59.000Z

40

Delay of intrusion detection in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper we consider sensor networks for intrusion detection, such that node deployment, node failures and node behavior result in coverage gaps and a fraction of disconnected nodes in an otherwise dense and well-connected network. We focus on the ... Keywords: delay, intrusion detection, percolation, sensor networks

Olivier Dousse; Christina Tavoularis; Patrick Thiran

2006-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Effects-based feature identification for network intrusion detection  

Science Conference Proceedings (OSTI)

Intrusion detection systems (IDS) are an important element in a network's defences to help protect against increasingly sophisticated cyber attacks. IDS that rely solely on a database of stored known attacks are no longer sufficient for effectively detecting ... Keywords: Classification, Clustering, Decision trees, Feature selection, Intrusion detection

Panos Louvieris, Natalie Clewley, Xiaohui Liu

2013-12-01T23:59:59.000Z

42

COTS diversity based intrusion detection and application to web servers  

Science Conference Proceedings (OSTI)

It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems and networks. However, the anomaly-based IDSes that have been proposed in the recent ... Keywords: COTS diversity, anomaly detection, design diversity, intrusion detection

Eric Totel; Frédéric Majorczyk; Ludovic Mé

2005-09-01T23:59:59.000Z

43

Enhancing byte-level network intrusion detection signatures with context  

Science Conference Proceedings (OSTI)

Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false-positive rate. We develop the concept of contextual signatures as ... Keywords: bro, evaluation, network intrusion detection, pattern matching, security, signatures, snort

Robin Sommer; Vern Paxson

2003-10-01T23:59:59.000Z

44

Intrusion Margins and Associated Fractures | Open Energy Information  

Open Energy Info (EERE)

Intrusion Margins and Associated Fractures Intrusion Margins and Associated Fractures Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Print PDF Intrusion Margins and Associated Fractures Dictionary.png Intrusion Margins and Associated Fractures: No definition has been provided for this term. Add a Definition Controlling Structures List of controlling structures typically associated with geothermal systems: Major Normal Fault Termination of a Major Normal Fault Stepover or Relay Ramp in Normal Fault Zones Apex or Salient of Normal Fault Fault Intersection Accommodation Zone Displacement Transfer Zone Pull-Apart in Strike-Slip Fault Zone Intrusion Margins and Associated Fractures Stratigraphic Boundaries Fissure Swarms Caldera Rim Margins Lithologically Controlled Fractures caused by igneous activity creates permeability, allowing water

45

Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data  

E-Print Network (OSTI)

Abstract—Reliability and quality of service from information systems has been threatened by cyber intrusions. To protect information systems from intrusions and thus assure reliability and quality of service, it is highly desirable to develop techniques that detect intrusions. Many intrusions manifest in anomalous changes in intensity of events occurring in information systems. In this study, we apply, test, and compare two EWMA techniques to detect anomalous changes in event intensity for intrusion detection: EWMA for autocorrelated data and EWMA for uncorrelated data. Different parameter settings and their effects on performance of these EWMA techniques are also investigated to provide guidelines for practical use of these techniques. Index Terms—Anomaly detection, computer audit data, exponentially weighted moving average (EWMA), information assurance,

Nong Ye; Senior Member; Sean Vilbert; Qiang Chen

2003-01-01T23:59:59.000Z

46

Land Assemblage Tax Credit Program (Missouri) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assemblage Tax Credit Program (Missouri) Assemblage Tax Credit Program (Missouri) Land Assemblage Tax Credit Program (Missouri) < Back Eligibility Commercial Construction Developer Industrial Installer/Contractor Institutional Systems Integrator Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Missouri Program Type Personal Tax Incentives Provider Missouri Department of Economic Development The Land Assemblage Tax Credit Programs the redevelopment of blighted areas in Missouri into productive use. Redevelopers must incur acquisition costs for at least 50 acres of 75+ acre parcels, enter into redevelopment agreement, and be approved for redevelopment incentives. The maximum aggregate amount of tax credits for all projects is $95 million and while

47

Non-Intrusive Occupancy Monitoring using Smart Meters  

Science Conference Proceedings (OSTI)

Detailed information about a home's occupancy is necessary to implement many advanced energy-efficiency optimizations. However, monitoring occupancy directly is intrusive, typically requiring the deployment of multiple environmental sensors, e.g., motion, ... Keywords: Electricity, Energy, Grid

Dong Chen, Sean Barker, Adarsh Subbaswamy, David Irwin, Prashant Shenoy

2013-11-01T23:59:59.000Z

48

Harmonic approaches to non-intrusive load diagnostics  

E-Print Network (OSTI)

The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

Fuller, Ashley E. (Ashley Eliot)

2008-01-01T23:59:59.000Z

49

The Diagnosis of Vertical Motion within Dry Intrusions  

Science Conference Proceedings (OSTI)

Dry intrusions play an important role in modulating precipitation patterns both in the midlatitudes and in the Tropics. The lifting of unsaturated air aloft often leads to destabilization and the enhancement of precipitation rates, and may ...

Richard P. James; John H. E. Clark

2003-10-01T23:59:59.000Z

50

Improving shipboard applications of non-intrusive load monitoring  

E-Print Network (OSTI)

The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

51

Mutual Intrusion of a Gravity Current and Density Front Formation  

Science Conference Proceedings (OSTI)

A two-dimensional prognostic model was employed to examine the mutual intrusion of a gravity current and the formation of a density front. The results indicated strong vertical motion near the front and, with Earth rotation included, a baroclinic ...

Dono-Ping Wang

1984-07-01T23:59:59.000Z

52

Equilibration of Two-Dimensional Double-Diffusive Intrusions  

Science Conference Proceedings (OSTI)

This paper considers the equilibration of lateral intrusions in a doubly diffusive fluid with uniform unbounded basic-state gradients in temperature and salinity. These are density compensated in the horizontal direction and finger favorable in ...

Julian Simeonov; Melvin E. Stern

2007-03-01T23:59:59.000Z

53

Warm-Air Intrusions in Arizona’s Meteor Crater  

Science Conference Proceedings (OSTI)

Episodic nighttime intrusions of warm air, accompanied by strong winds, enter the enclosed near-circular Meteor Crater basin on clear, synoptically undisturbed nights. Data analysis is used to document these events and to determine their spatial ...

Bianca Adler; C. David Whiteman; Sebastian W. Hoch; Manuela Lehner; Norbert Kalthoff

2012-06-01T23:59:59.000Z

54

Data Assimilation of Tropopause Height Using Dry Intrusion Observations  

Science Conference Proceedings (OSTI)

This article investigates the problem of initializing upper-level potential vorticity by using the detection of dry intrusions that can be seen in water vapor images. First, a satellite image processing technique has been developed for the ...

Yann Michel

2010-01-01T23:59:59.000Z

55

Minimally intrusive strategies for fault detection and energy monitoring  

E-Print Network (OSTI)

This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

Cox, Robert Williams, 1979-

2006-01-01T23:59:59.000Z

56

TIAA: A Toolkit for Intrusion Alert Analysis (Version 0.4) Installation and Operation Manual  

E-Print Network (OSTI)

TIAA: A Toolkit for Intrusion Alert Analysis (Version 0.4) Installation and Operation Manual 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Correlator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion

Ning, Peng

57

TIAA: A Toolkit for Intrusion Alert Analysis (Version 1.0) Installation and Operation Manual  

E-Print Network (OSTI)

TIAA: A Toolkit for Intrusion Alert Analysis (Version 1.0) Installation and Operation Manual 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Correlator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion

Ning, Peng

58

Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges  

NLE Websites -- All DOE Office Websites (Extended Search)

Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges Speaker(s): Hampden Kuhns Date: May 10, 2010 - 12:00pm Location: 90-3122 Non-Intrusive Load Monitoring (NILM) describes the process of disaggregating multiple energy loads on a single circuit using signal processing techniques. The granular output of this analysis (much like an itemized phone bill) can help rate payers identify inefficiencies in their buildings and promote cost-effective energy efficiency actions. The concepts behind NIALM were originally developed in the late 1980s by George Hart of MIT and commercialized by Enetics Inc, but hardware expense, accuracy, and detection limit issues have hampered its large scale adoption. This presentation discusses the several steps of the original

59

Developing Novel Approaches to Tamper & Intrusion Detection - Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Developing Novel Approaches to Developing Novel Approaches to Tamper & Intrusion Detection VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Tamper & Intrusion Detection Rapid Sampling from Sealed Containers Demo video Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers

60

A Flushing Model of Onslow Bay, North Carolina, Based on Intrusion Volumes  

Science Conference Proceedings (OSTI)

Onslow Bay, North Carolina, is repeatedly flushed by intrusions of Gulf Stream water. An exponential dilution model based on intrusion models indicates 20–60 days are required for 50% dilution of Bay waters.

Larry P. Atkinson; Leonard J. Pietrafesa

1980-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Distribution and Circulation of the Coastal Oyashio Intrusion  

Science Conference Proceedings (OSTI)

The distribution and circulation of the coastal Oyashio intrusion were examined with a CTD and shipboard ADCP survey conducted in the vicinity of the east coast of Japan in May 1994. The estimate of mixing ratios in the density range of 26.4–27.2 ...

Yugo Shimizu; Ichiro Yasuda; Shin-ichi Ito

2001-06-01T23:59:59.000Z

62

A malware detector placement game for intrusion detection  

Science Conference Proceedings (OSTI)

We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop optimal detector algorithms taking into account attacker strategies and actions. ... Keywords: game theory, monitor placement, network-based intrusion detection

Stephan Schmidt; Tansu Alpcan; ?ahin Albayrak; Tamer Ba?ar; Achim Mueller

2007-10-01T23:59:59.000Z

63

Specification-Based Intrusion Detection for Advanced Metering Infrastructures  

Science Conference Proceedings (OSTI)

It is critical to develop an effective way to monitor advanced metering infrastructures (AMI). To ensure the security and reliability of a modernized power grid, the current deployment of millions of smart meters requires the development of innovative ... Keywords: AMI, specification-based security, intrusion detection, formal method

Robin Berthier; William H. Sanders

2011-12-01T23:59:59.000Z

64

The Three-Dimensional Mapping of a Small Thermohaline Intrusion  

Science Conference Proceedings (OSTI)

During the Mixed-Layer Experiment (MILE) at Ocean Station P in August-September 1977. a depth-cycling towed CTD was used to map intrusions below the seasonal thermocline. In a 10 km square two prominent minima in temperature and salinity were ...

M. C. Grego

1980-09-01T23:59:59.000Z

65

Intrusion detection of sinkhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by ...

Ioannis Krontiris; Tassos Dimitriou; Thanassis Giannetsos; Marios Mpasoukos

2007-07-01T23:59:59.000Z

66

Alert correlation in collaborative intelligent intrusion detection systems-A survey  

Science Conference Proceedings (OSTI)

As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuse- and anomaly-based. ... Keywords: Alert correlation, Collaborative intrusion detection, Computational intelligence approaches, False positive analysis

Huwaida Tagelsir Elshoush; Izzeldin Mohamed Osman

2011-10-01T23:59:59.000Z

67

Non-Intrusive Appliance Load Monitoring: Promise and Practice  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fraunhofer USA Fraunhofer USA Non-intrusive Appliance Load Monitoring (NIALM): Promise and Practice Michael Zeifman, Ph.D. and Kurt Roth, Ph.D. March 1 st , 2012 Building America Stakeholder Meeting © Fraunhofer USA What Is NIALM?  Non-Intrusive Appliance Load Monitoring  A.k.a. Non-Intrusive Load Monitoring  Main breaker/circuit level  Data acquisition (hardware) and disaggregation algorithms (software) 2 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 600 800 1000 1200 1400 Time Power, W 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 Power, W Coffee Maker 07:00 07:30 08:00 08:30 09:00 09:30 0 500 1000 Power, W Refrigerator 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 Time Power, W TV © Fraunhofer USA NIALM: Interest  Significant growth in U.S. granted patents

68

Video Installation Design: Appropriation and Assemblage As Projection Surface Geometry  

E-Print Network (OSTI)

This area of research focuses on the use of video projections in the context of fine art. Emphasis is placed on creating a unique video installation work that incorporates assemblage and appropriation as a means to develop multiple complex geometrical surfaces for video projection. The purpose of this research is to document a working process within a pre-defined set of guidelines that is influenced from my past work and the study of other artist?s prior work. Research includes the demonstration of the entire working process to create this original work and recommendations for future artists who wish to work in this medium.

Weaver, Timothy A.

2010-05-01T23:59:59.000Z

69

Distributed Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids.  

E-Print Network (OSTI)

??This thesis proposes a Distributed Intrusion Detection System for Smart Grids by developing and deploying intelligent modules in multiple layers of the smart grid in… (more)

Zhang, Yichi

2011-01-01T23:59:59.000Z

70

Bloom Filter Based Intrusion Detection for Smart Grid  

E-Print Network (OSTI)

This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n-gram analysis and Bloom Filter. The predictable and regular nature of the SCADA communication patterns is exploited to train the intrusion detection system. The protocol considered to test the proposed approach is MODBUS which is used for communication between a SCADA server and field devices in power system. The approach is tested for attacks like HMI compromise and Man-in-the-Middle. Bloom Filter is chosen because of its strong space advantage over other data structures like hash tables, linked lists etc. for representing sets. The advantage comes from its probabilistic nature and compact array structure. The false positive rates are found to be minimal with careful choice of parameters for Bloom Filter design. Also the memory-efficient property of Bloom Filter makes it suitable for implementation in resource constrained SCADA components. It is also established that the knowledge of physical state of the power system i.e., normal, emergency or restorative state can help in improving the accuracy of the proposed approach.

Parthasarathy, Saranya

2012-05-01T23:59:59.000Z

71

The analysis and conservation of the Belle footwear assemblage  

E-Print Network (OSTI)

Nautical archaeology can be loosely defined as the study of the material remains of ships and their contents as a component of a broader cultural system. The oceans and lakes of the world are replete with shipwrecks from all eras, and these sites have become the premier source of data for the nautical archaeologist. The inter-relationship between vessel, cargo, and crew is expressed in the assemblages recovered from these sites, and analysis of these remains serves to fill in the expansive gaps between human behavior and the material culture that they leave behind. The excavation of the French barque Belle, which had been part of La Salle's ill-fated expedition to the Mississippi in 1684, yielded several hundred leather artifacts, predominantly in the form of shoes. This thesis first proposes to analyze the Belle footwear assemblage both as a representation of seventeenth century French culture and as a facet of La Salle's final voyage. The harsh environment of the sea floor, however, affects remains from the Belle site in myriad ways. Metal artifacts are transformed into non-descript conglomerations of marine growth and sediments called encrustations, while organic remnants are preserved via chemical reactions with metals, or by quick burial in anaerobic soils. Equilibrium established between artifact and its benthic environment is disrupted upon recovery, and remains must be carefully treated to ensure long-term stability. This is the purview of the archaeological conservator. The role of the archaeological conservator is by no means limited to the stabilization of artifacts. They are also responsible for cleaning, documenting, and analyzing the objects that they treat. The recent introduction of polymer passivation technologies, which relies heavily on silicon oils, provides archaeological conservators with a new option concerning the treatment of organic artifacts. This thesis also proposes to examine this new methodology, particularly focusing on the treatment of the leather objects recovered from Belle.

Randolph, Anthony G., Jr

2003-01-01T23:59:59.000Z

72

LATE SYN-INTRUSIVE CLASTIC DIKES AT THE BASE OF THE PALISADES INTRUSIVE SHEET, FORT LEE, NJ, IMPLY A SHALLOW (~3 to 4 KM) DEPTH OF  

E-Print Network (OSTI)

dikes, vesicles, pipe amygdales, and brecciated chilled-margin facies of the Palisades suggest, the Palisades intrusive sheet, Watchung basalts, and place-names mentioned in the text. Index map modified from

Merguerian, Charles

73

A method for modeling and quantifying the security attributes of intrusion tolerant systems  

Science Conference Proceedings (OSTI)

Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, ... Keywords: MTTSF, QoS, intrusion tolerance, security attributes, semi Markov model

Bharat B. Madan; Katerina Goševa-Popstojanova; Kalyanaraman Vaidyanathan; Kishor S. Trivedi

2004-03-01T23:59:59.000Z

74

A real-time intrusion prevention system for commercial enterprise databases  

Science Conference Proceedings (OSTI)

Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural based detection. The first two have been extremely popular in the commercial ... Keywords: GLBA, HIPAA, VISA CISP, database security, encryption, intrusion tolerance, isolation

Ulf Mattsson

2005-02-01T23:59:59.000Z

75

Review: The use of computational intelligence in intrusion detection systems: A review  

Science Conference Proceedings (OSTI)

Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community. Characteristics of computational intelligence (CI) systems, such as adaptation, fault tolerance, high computational speed ... Keywords: Artificial immune systems, Artificial neural networks, Computational intelligence, Evolutionary computation, Fuzzy systems, Intrusion detection, Soft computing, Survey, Swarm intelligence

Shelly Xiaonan Wu; Wolfgang Banzhaf

2010-01-01T23:59:59.000Z

76

Evaluation of a lattice-Boltzmann method for mercury intrusion porosimetry simulations  

Science Conference Proceedings (OSTI)

We have simulated intrusion of a non-wetting liquid into pores of varying shape and size. Simulations were based on the lattice-Boltzmann method and the Shan-Chen multiphase model. The liquid-solid contact angle for pores with circular cross-section ... Keywords: lattice-Boltzmann, mercury intrusion porosimetry, wetting

J. Hyväluoma; P. Raiskinmäki; A. Jäsberg; A. Koponen; M. Kataja; J. Timonen

2004-08-01T23:59:59.000Z

77

Weakening of the Kuroshio Intrusion into the South China Sea over the Past Two Decades  

Science Conference Proceedings (OSTI)

Inferred from the satellite and in situ hydrographic data from the 1990s and 2000s, the Kuroshio intrusion into the South China Sea (SCS) had a weakening trend over the past two decades. Associated with the weakened Kuroshio intrusion, the ...

Feng Nan; Huijie Xue; Fei Chai; Dongxiao Wang; Fei Yu; Maochong Shi; Peifang Guo; Peng Xiu

2013-10-01T23:59:59.000Z

78

M-AID: An adaptive middleware built upon anomaly detectors for intrusion detection and rational response  

Science Conference Proceedings (OSTI)

Anomaly-based intrusion detection is about the discrimination of malicious and legitimate behaviors on the basis of the characterization of system normality in terms of particular observable subjects. As the system normality is constructed solely from ... Keywords: Anomaly detection, POMDP, intrusion detection, network security, security metrics, security policy

Zonghua Zhang; Hong Shen

2009-11-01T23:59:59.000Z

79

Decision tree classifier for network intrusion detection with GA-based feature selection  

Science Conference Proceedings (OSTI)

Machine Learning techniques such as Genetic Algorithms and Decision Trees have been applied to the field of intrusion detection for more than a decade. Machine Learning techniques can learn normal and anomalous patterns from training data and generate ... Keywords: decision trees, genetic algorithm, intrusion detection

Gary Stein; Bing Chen; Annie S. Wu; Kien A. Hua

2005-03-01T23:59:59.000Z

80

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Intrusion Prevention System SSP Fragmented Traffic 1: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability July 19, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Intrusion Prevention System PLATFORM: Cisco ASA 5500-X Series Adaptive Security Appliances Cisco Intrusion Prevention System (IPS) 7.1 ABSTRACT: A vulnerability in the implementation of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE LINKS: Secunia Advisory SA54246 SecurityTracker ID: 1028806 Cisco Advisory ID: cisco-sa-20130717-ips CVE-2013-1218

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Play and tolerance : notions of looseness in social and material assemblages  

E-Print Network (OSTI)

The material scenario provides the most illustrative of entry points into this collection of evidence embodying the difference between play and tolerance. In a material assemblage, the looseness in a joint (expansion, pin, ...

Voorhees, Jeremy, 1978-

2004-01-01T23:59:59.000Z

82

Network intrusion detector: NID user`s guide V 1.0  

SciTech Connect

The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

Palasek, R. [ed.

1994-04-01T23:59:59.000Z

83

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

84

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

85

Signatures of Doubly Diffusive Convection and Turbulence in an Intrusive Regime  

Science Conference Proceedings (OSTI)

Doubly diffusive convection and turbulence were measured from a submarine in a region where the mean gradients do not support doubly diffusive processes but intrusions provide favorable sites. The stability of the submarine-mounted CTD system ...

Thomas R. Osborn

1988-01-01T23:59:59.000Z

86

A robust SNMP based infrastructure for intrusion detection and response in tactical MANETs  

Science Conference Proceedings (OSTI)

Intrusion Detection Systems (IDS) for adhoc networks need secure, reliable, flexible, and lightweight infrastructures for exchanging available sensor data and security event messages. Cooperation is a major concept of Mobile Adhoc Networks (MANETs). ...

Marko Jahnke; Jens Tölle; Sascha Lettgen; Michael Bussmann; Uwe Weddige

2006-07-01T23:59:59.000Z

87

Effects of droplet size on intrusion of sub-surface oil spills  

E-Print Network (OSTI)

This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

Chan, Godine Kok Yan

2013-01-01T23:59:59.000Z

88

The placement-configuration problem for intrusion detection nodes in wireless sensor networks  

Science Conference Proceedings (OSTI)

The deployment and configuration of a distributed network intrusion detection system (NIDS) in a large Wireless Sensor Network (WSN) is an enormous challenge. A reduced number of devices equipped with detection capabilities have to be placed on strategic ...

Juan E. Tapiador, John A. Clark

2013-10-01T23:59:59.000Z

89

An analog and digital data acquisition system for Non-Intrusive Load Monitoring  

E-Print Network (OSTI)

Non-Intrusive Load Monitoring (NILM) is a method for characterizing and monitoring discrete loads connected to a power distribution system. This can include a ship, a car, or a utility distribution system. The entire concept ...

Clifford, Zachary Alan

2009-01-01T23:59:59.000Z

90

Double-Diffusive Intrusions in a Stable Salinity Gradient “Heated from Below”  

Science Conference Proceedings (OSTI)

Two-dimensional direct numerical simulations (DNS) are used to investigate the growth and nonlinear equilibration of spatially periodic double-diffusive intrusion for negative vertical temperature Tz < 0 and salinity Sz < 0 gradients, which are ...

Julian Simeonov; Melvin E. Stern

2008-10-01T23:59:59.000Z

91

Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring  

E-Print Network (OSTI)

This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

McKay, Thomas Duncan

2006-01-01T23:59:59.000Z

92

Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants  

E-Print Network (OSTI)

The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

Greene, William C. (William Calvin)

2005-01-01T23:59:59.000Z

93

Double-Diffusive Intrusions in a Stable Salinity Gradient “Heated from Below”  

Science Conference Proceedings (OSTI)

Two-dimensional direct numerical simulations (DNS) are used to investigate the growth and nonlinear equilibration of spatially periodic double-diffusive intrusion for negative vertical temperature Tz gradients, which are ...

Julian Simeonov; Melvin E. Stern

2008-10-01T23:59:59.000Z

94

Reference Handbook for Site-Specific Assessment of Subsurface Vapor Intrusion to Indoor Air  

Science Conference Proceedings (OSTI)

Subsurface vapor intrusion is only one of several possible sources for volatile and semi-volatile chemicals in indoor air. This report provides guidance on the site-specific assessment of the significance of subsurface vapor intrusion into indoor air. Topics covered include theoretical considerations, sampling and analysis considerations, recommended strategies and procedures, interpretive tools, mitigation measures, and suggestions for future research. This document reflects a comprehensive understandin...

2005-03-28T23:59:59.000Z

95

Active, Non-Intrusive Inspection Technologies for Homeland Defense  

SciTech Connect

Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

James L. Jones

2003-06-01T23:59:59.000Z

96

Analysis of the Pass Cavallo shipwreck assemblage, Matagorda Bay, Texas  

E-Print Network (OSTI)

A survey conducted in February of 1998 located an anomaly originally believed to be the remains of L'Aimable. L'Aimable was one of four ships utilized by Rene-Robert Cavelier, Sieur de La Salle, for his voyage to colonize the Gulf Coast in 1684. The anomaly, a wrecked vessel with a heavy iron signature, was located outside the entrance to the historic pass into Matagorda Bay, Texas. Artifacts were extracted from the wreck site to aid in the identification of the vessel, which was subsequently determined to be more recent in origin. A preliminary examination of the artifacts indicates that the shipwreck dates to the first half of the 19th century. The survey recovered over two hundred artifacts. The assemblage of artifacts includes over 80 lead shot, over 40 examples of brass firearm furniture, over 15 firearm fragments, several pieces of copper sheathing, and iron bar stock. Almost two-thirds of the material is associated with small arms. The majority of the identifiable firearms are military arms of three patterns: the British Short Land Pattern, the British India Pattern, and the 1757 Spanish musket. Historical research has determined that these arms were circulating in Texas, New Orleans, and Mexico, as early as 1815. The British Pattern arms were both purchased for the Mexican army in the 1820s, and used by the British Infantry in the Battle of New Orleans in 1815. The 1757 Spanish musket was used chiefly by Spanish expeditionary forces in North America in the late 18th century. Evidence garnered from the artifacts suggest that the firearms were shipboard cargo onboard a small, wood-hulled sailing vessel that wrecked between the years 1815 and 1845. Archival and historical research isolated nine wreck candidates for this period. Historical research and artifact analysis suggest the Hannah Elizabeth as the primary candidate for this wreck site. The Hannah Elizabeth was a small merchant schooner from New Orleans laden with a munitions cargo for Texas troops stationed at Goliad. The vessel wrecked at the entrance of the historic Pass Cavallo while evading capture from a Mexican brig-of-war in November of 1835.

Borgens, Amy Anne

2005-05-01T23:59:59.000Z

97

Igneous intrusions and thermal evolution in the Raton Basin, CO-NM: contact metamorphism and coal-bed methane generation .  

E-Print Network (OSTI)

??Tertiary mafic dikes and sills intrude coal-bearing formations of the Raton Basin. This study investigates the role of intrusions in generating methane from coal. Coal… (more)

Cooper, Jennifer Rebecca

2006-01-01T23:59:59.000Z

98

Potential Igneous Processes Relevant to the Yucca Mountain Repository: Intrusive-Release Scenario  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) is moving to prepare and submit a license application to initiate construction of the geologic repository at Yucca Mountain. As part of the application, the DOE must provide estimates of the dose risk to a local population caused by low-probability intrusions of volcanic magma that may occur into the repository after closure. To date, published estimates of such dose risks have included a large number of conservative assumptions such that it appears as if the igneous intrus...

2005-08-31T23:59:59.000Z

99

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol  

Science Conference Proceedings (OSTI)

When SCADA systems are exposed to public networks, attackers can more easily penetrate the control systems that operate electrical power grids, water plants, and other critical infrastructures. To detect such attacks, SCADA systems require an intrusion ... Keywords: Bro, DNP3, SCADA, specification-based intrusion detection system

Hui Lin; Adam Slagell; Catello Di Martino; Zbigniew Kalbarczyk; Ravishankar K. Iyer

2013-01-01T23:59:59.000Z

100

DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks  

Science Conference Proceedings (OSTI)

Wireless Mesh Networks (WMN) are particularly vulnerable to attacks, since they feature constraint nodes, multi-hop communication, and an open wireless communication channel. These features limit the feasibility of the deployment of contemporary Intrusion ... Keywords: intrusion detection, security, wireless mesh networks

Rodrigo do Carmo; Matthias Hollick

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

The influence of igneous intrusions on the peak temperatures of host rocks: Finite-time emplacement, evaporation, dehydration, and decarbonation  

Science Conference Proceedings (OSTI)

Using a 13-m-thick basic sill and its limestone host rocks of the Permian Irati Formation from the Parana Basin, South America, as an example, this paper presents a numerical investigation based on heat conduction models on the effect of the emplacement ... Keywords: Dehydration and decarbonation, Evaporation, Igneous intrusions, Intrusion mechanism, Peak temperature

Dayong Wang; Yongchen Song; Yu Liu; Minglong Zhao; Tian Qi; Weiguo Liu

2012-01-01T23:59:59.000Z

102

Development and Testing of Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway  

E-Print Network (OSTI)

Laser-Based Non-Intrusive Detection System for MeasurementLaser-Based Non-Intrusive Detection System for Measurementsystems are entirely dependent on time-of-?ight laser measurements

2001-01-01T23:59:59.000Z

103

State-based network intrusion detection systems for SCADA protocols: a proof of concept  

Science Conference Proceedings (OSTI)

We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere ... Keywords: IDS, SCADA systems, critical infrastructures, security

Andrea Carcano; Igor Nai Fovino; Marcelo Masera; Alberto Trombetta

2009-09-01T23:59:59.000Z

104

An architecture for adaptive intrusion-tolerant applications: Experiences with Auto-adaptive and Reconfigurable Systems  

Science Conference Proceedings (OSTI)

Applications that are part of a mission-critical information system need to maintain a usable level of key services through ongoing cyber-attacks. In addition to the well-publicized denial of service (DoS) attacks, these networked and distributed applications ... Keywords: Byzantine fault tolerance, adaptive defense, adaptive middleware, intrusion tolerance, redundancy, survivability architecture

Partha Pal; Paul Rubel; Michael Atighetchi; Franklin Webber; William H. Sanders; Mouna Seri; HariGovind Ramasamy; James Lyons; Tod Courtney; Adnan Agbaria; Michel Cukier; Jeanna Gossett; Idit Keidar

2006-09-01T23:59:59.000Z

105

Wild-Inspired Intrusion Detection System Framework for High Speed Networks f|p IDS Framework  

Science Conference Proceedings (OSTI)

While the rise of the Internet and the high speed networks made information easier to acquire, faster to exchange and more flexible to share, it also made the cybernetic attacks and crimes easier to perform, more accurate to hit the target victim and ... Keywords: Cybernetic Attacks, Framework, High Speed Network, Intrusion Detection, Monitoring

Hassen Sallay; Mohsen Rouached; Adel Ammar; Ouissem Ben Fredj; Khalid Al-Shalfan; Majdi Ben Saad

2011-10-01T23:59:59.000Z

106

A cost-based analysis of intrusion detection system configuration under active or passive response  

Science Conference Proceedings (OSTI)

This paper studies the joint decisions of IDS configuration and alarm investigation capacity under active and passive responses. In active response, alarm events are blocked immediately, whereas alarm events are allowed to access the information assets ... Keywords: IDS configuration, Information security, Intrusion response, Investigation capacity

Wei T. Yue; Metin Çakany?ld?r?m

2010-12-01T23:59:59.000Z

107

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps  

Science Conference Proceedings (OSTI)

The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific ... Keywords: Smart Grid Communications, Anomaly Detection, Self-Organizing Maps, Intrusion Detection

Zubair Ahmed Baig, Saif Ahmad, Sadiq Mohammed Sait

2013-07-01T23:59:59.000Z

108

Motif-oriented representation of sequences for a host-based intrusion detection system  

Science Conference Proceedings (OSTI)

Audit sequences have been used effectively to study process behaviors and build host-based intrusion detection models. Most sequence-based techniques make use of a pre-defined window size for scanning the sequences to model process behavior. In this ...

Gaurav Tandon; Debasis Mitra; Philip K. Chan

2004-05-01T23:59:59.000Z

109

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method  

Science Conference Proceedings (OSTI)

In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) ... Keywords: Android, Intrusion detection, Knowledge-based systems, Malware, Mobile devices, Temporal reasoning

Asaf Shabtai; Uri Kanonov; Yuval Elovici

2010-08-01T23:59:59.000Z

110

Mixing, 3D Mapping, and Lagrangian Evolution of a Thermohaline Intrusion  

Science Conference Proceedings (OSTI)

Observations of the three-dimensional structure and evolution of a thermohaline intrusion in a wide, deep fjord are presented. In an intensive two-ship study centered on an acoustically tracked neutrally buoyant float, a cold, fresh, low-oxygen ...

Matthew H. Alford; Michael C. Gregg; Eric A. D’Asaro

2005-09-01T23:59:59.000Z

111

Compilation of gas intrusion measurements, variations, and consequence modeling for SPR caverns.  

Science Conference Proceedings (OSTI)

The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H2S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

Hinkebein, Thomas E.

2003-03-01T23:59:59.000Z

112

Influence of the temperature dependence of thermal parameters of heat conduction models on the reconstruction of thermal history of igneous-intrusion-bearing basins  

Science Conference Proceedings (OSTI)

Heat conduction models are important tools for reconstructing the thermal history of sedimentary basins affected by magmatic intrusions. Accurate thermal properties of the intrusion and its wall rocks are crucial for accurate predictions of thermal history. ... Keywords: Igneous intrusion, Peak temperature, Specific heat, Thermal conductivity, Vitrinite reflectance

Dayong Wang; Xiancai Lu; Yongchen Song; Rong Shao; Tian Qi

2010-10-01T23:59:59.000Z

113

Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant  

SciTech Connect

The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

1993-11-01T23:59:59.000Z

114

Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices  

E-Print Network (OSTI)

Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile computing devices. This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks. 1.

Daniel C. Nash; Thomas L. Martin; Dong S. Ha; Michael S. Hsiao

2005-01-01T23:59:59.000Z

115

Field Studies of Soil Vapor Intrusion at a Vacant Manufactured Gas Plant (MGP) Site in Wisconsin  

Science Conference Proceedings (OSTI)

A comprehensive two-phase field-based research program was completed at a former manufactured gas plant (MGP) site located in Wisconsin during the summer of 2008. The purpose of this ongoing research study is to develop improved approaches and methodologies for characterizing the potential for vapor intrusion (VI) at MGP sites. This report describes the methods, results, and limited data interpretation of Phase I (Passive Soil Gas Survey) and Phase II (Soil, Groundwater, and Soil Gas Sampling) at the vac...

2009-06-30T23:59:59.000Z

116

Three-Dimensional Structure and Temporal Evolution of Submesoscale Thermohaline Intrusions in the North Pacific Subtropical Frontal Zone  

Science Conference Proceedings (OSTI)

Four instances of persistent intrusive deformation of the North Pacific Subtropical Front were tagged individually by a Lagrangian float and tracked for several days. Each feature was mapped in three dimensions using repeat towed observations ...

A. Y. Shcherbina; M. C. Gregg; M. H. Alford; R. R. Harcourt

2010-08-01T23:59:59.000Z

117

Non-intrusive load monitoring systems: Considerations for use and potential applications  

SciTech Connect

The value of measured energy performance data and the desire to acquire them without the cost, complexity, and intrusiveness of standard submetering techniques have led to recent research on non-intrusive load monitoring systems. These systems offer installation simplicity and the ability to discriminate important load changes through high-resolution, higher-speed sampling at a central monitoring point such as a building`s electrical service entrance. Important hardware and installation considerations learned from Oak Ridge National Laboratory`s (ORNL) experience with these systems are reviewed. In addition, the ability to discern important load changes in residential and commercial buildings using these systems is discussed based on recent ORNL experiments in two buildings. Potential applications, with examples, are also discussed. Using a non-intrusive load monitoring system, an experienced user can collect valuable building power profiles that provide insight into building operations, energy use, demand, and building systems problems easily and at low cost. These systems, when available, could be valuable to DSM and energy management professionals, utilities, researchers, building management firms, energy service companies, and others.

Sharp, T.R. [Oak Ridge National Lab., TN (United States). Energy Div.

1994-12-31T23:59:59.000Z

118

Methane release from igneous intrusion of coal during Late Permian extinction events  

SciTech Connect

Unusually large and locally variable carbon isotope excursions coincident with mass extinctions at the end of the Permian Period (253 Ma) and Guadalupian Epoch (260 Ma) can be attributed to methane outbursts to the atmosphere. Methane has isotopic values {delta}{sup 13}C low enough to reduce to feasible amounts the carbon required for isotopic mass balance. The duration of the carbon isotopic excursions and inferred methane releases are here constrained to < 10,000 yr by counting annual varves in lake deposits and by estimating peat accumulation rates. On paleogeographic maps, the most marked carbon isotope excursions form linear arrays back to plausible methane sources: end-Permian Siberian Traps and Longwood-Bluff intrusions of New Zealand and end-Guadalupian Emeishan Traps of China. Intrusion of coal seams by feeder dikes to flood basalts could create successive thermogenic methane outbursts of the observed timing and magnitude, but these are unreasonably short times for replenishment of marine or permafrost sources of methane. Methane released by fracturing and heating of coal during intrusion of large igneous provinces may have been a planetary hazard comparable with bolide impact.

Retallack, G.J.; Jahren, A.H. [University of Oregon, Eugene, OR (USA). Dept. of Geological Science

2008-01-15T23:59:59.000Z

119

Results of Field-Based Soil Vapor Intrusion (SVI) Research at Two MGP Sites and Implications for SVI Assessment  

Science Conference Proceedings (OSTI)

Soil vapor intrusion (SVI; also known simply as vapor intrusion, or VI) is the migration of volatile or semi-volatile chemicals from subsurface contaminated soil or groundwater to indoor air in an overlying building. In the past decade, SVI has emerged as a major environmental issue. This report presents previously unpublished results of a three-year study of two former manufactured gas plant (MGP) sites to determine the potential for subsurface chemicals to migrate into buildings.

2011-12-30T23:59:59.000Z

120

Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)  

SciTech Connect

Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

Jared Verba; Michael Milvich

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars  

Science Conference Proceedings (OSTI)

The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

Villa, Andrea; Mussi, Valerio [Laboratorio MUSP-via Turotti 9, 29122 Piacenza (Italy); Strano, Matteo [Politecnico di Milano-Dipartimento di Meccanica, via La Masa 1, 20156, Milan (Italy)

2011-05-04T23:59:59.000Z

122

There was no single characteristic fish assemblage that could be described for the oil platforms and natural  

E-Print Network (OSTI)

.) fish assemblages residing on oil/gas production platforms and natural outcrops, and (2) describe platforms and natural outcrops of central and southern California. However, we identified a number partitioning in species composition, where northerly platforms show the influence of the Oregonian province

Love, Milton

123

New Hardware and Software Design of a Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway  

E-Print Network (OSTI)

Time Laser-Based Prototype Detection System for MeasurementLaser-Based Non-Intrusive Detection System for MeasurementLaser-Based Non-Intrusive Detection System for Measurement

2001-01-01T23:59:59.000Z

124

Characterization of mixed waste for sorting and inspection using non-intrusive methods  

SciTech Connect

Characterization of mixed wastes (that is, radioactive and otherwise hazardous) requires that all hazardous, non-conforming, and radioactive materials be identified, localized, and quantified. With such information, decisions can be made regarding whether the item is treatable or has been adequately treated. Much of the required information can be gained without taking representative samples and analyzing them in a chemistry laboratory. Non-intrusive methods can be used to provide this information on-line at the waste treatment facility. Ideally, the characterization would be done robotically, and either automatically or semi-automatically in order to improve efficiency and safety. For the FY94 Mixed Waste Operations (MWO) project, a treatable waste item is defined as a homogeneous metal object that has external radioactive or heavy metal hazardous contamination. Surface treatment of some kind would therefore be the treatment method to be investigated. The authors developed sorting and inspection requirements, and assessed viable non-intrusive techniques to meet these requirements. They selected radiography, computed tomography and X-ray fluorescence. They have characterized selected mock waste items, and determined minimum detectable amounts of materials. They have demonstrated the efficiency possible by integrating radiographic with tomographic data. Here, they developed a technique to only use radiographic data where the material is homogeneous (fast), and then switching to tomography in those areas where heterogeneity is detected (slower). They also developed a tomographic technique to quantify the volume of each component of a mixed material. This is useful for such things as determining ash content. Lastly, they have developed a document in MOSAIC, an Internet multi-media browser. This document is used to demonstrate the ability to share data and information world-wide.

Roberson, G.P.; Ryon, R.W.; Bull, N.L.

1994-12-01T23:59:59.000Z

125

The copper artifact assemblage from an Ottoman period shipwreck in the Red Sea  

E-Print Network (OSTI)

This thesis is a study of a group of copper alloy artifacts excavated from an 18th-century shipwreck in the Red Sea. The shipwreck is located near Sadana Island off the Egyptian coast and is hence referred to as the Sadana Island shipwreck. The Sadana Island shipwreck provides important insight into the little known nature of maritime activity in the Red Sea region prior to the French invasion of Egypt. In addition to the historical background of Red Sea seafaring, the accounts of contemporary European travelers are examined. These accounts are unique descriptions of seafaring, trade, and travel during this time. The excavation of the shipwreck by the Institute of Nautical Archaeology (INA-Egypt) is discussed followed by a catalogue of the recovered copper alloy objects. The copper alloy artifact assemblage consists mainly of utilitarian galleyware and presents a glimpse into the shipboard lives of the crew. The types represented are common, everyday wares but have never before been documented. Although these types have been used for centuries and are still seen today, their utilitarian nature and basic designs have not attracted any scholarly attention prior to this thesis.

Willis, Kathryn Ewalt

2002-01-01T23:59:59.000Z

126

Species Assemblage Structure and Ecomorphological Convergence in Perciform Fishes (Cichlidae and Centrarchidae) in Tropical and Temperate Floodplain Rivers  

E-Print Network (OSTI)

In this study, I used two independent perciform lineages (Neotropical Cichlidae and Nearctic Centrarchidae) to examine patterns of species richness and species coexistence a two spatial scales (e.g., macrohabitat and mesohabitat) and to examine inter-faunal patterns of ecomorphological convergence. The study was conducted during the low-water periods in four lowland rivers: the Cinaruco in Venezuela, the Tambopata in Peru, and the Neches and the Brazos rivers in Texas (USA). These rivers were chosen because of their similar characteristics, in terms of geomorphology, sediments, and water quality. The Cinaruco River and the Neches River have clear slightly-stained waters, whereas the Tambopata and the Brazos River have turbid waters with high loads of suspended sediments. I used morphological approaches as a surrogate to investigate patterns of species distribution in niche space, and predict patterns of species richness at different spatial scales. Despite high variation in the number of species in these two perciform assemblages, morphological analysis based on the means and standard deviations of nearest neighbor distance (NND) and mean distance to centroid (CD) revealed similar trends of morphological similarity in relation to species richness. Comparison of observed versus randomized data mesohabitat scale for all four rivers generally supported the niche expansion model of response to increase in species richness. At the scale of mesohabitats within rivers, most species assemblages appear to be organized by competitive interactions in accordance with the niche expansion model. The tropical species-rich Cinaruco River revealed particularly strong support for the niche expansion model. Intercontinental comparison of functional morphology and diets based on analysis of stomach contents and stable isotope ratios indicated broad morphological and dietary overlap between cichlid and centrarchid assemblages. For the most part, morphological ordinations showed that the two groups have diversified in a parallel manner within the confines of ram-suction modes of prey ingestion. This study concludes that even though differences are observed in historical and stochastic factors structuring fish assemblages in different geographic regions, consistent patterns of convergence at the species and assemblage levels results from natural selection under similar environmental conditions.

Montana, Carmen 1976-

2012-12-01T23:59:59.000Z

127

Electrical signature analysis applications for non-intrusive automotive alternator diagnostics  

DOE Green Energy (OSTI)

Automotive alternators are designed to supply power for automobile engine ignition systems as well as charge the storage battery. This product is used in a large market where consumers are concerned with acoustic noise and vibration that comes from the unit. as well as overall quality and dependability. Alternators and generators in general are used in industries other than automotive, such as transportation and airline industries and in military applications. Their manufacturers are interested in pursuing state-of-the-art methods to achieve higher quality and reduced costs. Preliminary investigations of non-intrusive diagnostic techniques utilizing the inherent voltage signals of alternators have been performed with promising results. These techniques are based on time and frequency domain analyses of specially conditioned signals taken from several alternators under various test conditions. This paper discusses investigations that show correlations of the alternator output voltage to airborne noise production. In addition these signals provide insight into internal magnetic characteristics that relate to design and/or assembly problems.

Ayers, C.W.

1996-03-01T23:59:59.000Z

128

Design and testing of a non-intrusive torque measurement system  

E-Print Network (OSTI)

This thesis details the initial development of a non-intrusive torque measurement system to measure torque in a rotating driveshaft like those commonly found on internal combustion engine powered irrigation pumping plants. A typical driveshaft used in pumping plant applications consists of flanged U-joints on each end with a constant cross-section steele tube portion connecting the U-joints. The photoelectric sensor based system was able to predict torque to within 3?9.1 N-m (346 in-lbs) under constant rpm conditions. Two sensor types, phototransistor and photodiode, were tested. The photodiode sensor was tested with two emitter types: infrared LED and red laser. No significant difference in response was found using either the LED or red laser emmitters. Both the photoelectric and photodiode sensor measurements showed correlation to actual torque. The photoelectric sensor configuration correlation had a standard error of 5?% of a typical natural-gas pumping plant installation running at 773.9 N-m of torque. The sensors were mounted independent of the driveshaft and measured the phaseshift of two pins mounted on the shaft as they passed through the photosensing area. This caused extreme sensitivity to vibration of the engine and driveshaft. A similar design with a temporary mount connected to the shaft and transmitting the response signal via radio frequency telemetry could decrease the effects of vibration on the system.

Wilson, Edwin Ernest

1998-01-01T23:59:59.000Z

129

Non-Intrusive Load Monitoring (NILM)Technologies for End-Use Load Disaggregation: Laboratory Evaluation I  

Science Conference Proceedings (OSTI)

This report presents the results of a laboratory evaluation to assess the cost versus accuracy performance of residential non-intrusive load monitoring (NILM) technology. NILM is an evolving technology that can be deployed for utility and customer applications, such as end-use load disaggregation, energy audits, real-time customer information and appliance or load diagnostics. Commercial NILM products for utility and customer applications continue to emerge, although most products available today ...

2013-05-22T23:59:59.000Z

130

Midlevel Dry Intrusions as a Factor in Tornado Outbreaks Associated with Landfalling Tropical Cyclones from the Atlantic and Gulf of Mexico  

Science Conference Proceedings (OSTI)

Midlevel dry intrusions have been mentioned as a factor in tornado outbreaks associated with landfalling tropical cyclones for more than three decades, but a systematic analysis of historical outbreak cases with respect to this pattern has been ...

Lon Curtis

2004-04-01T23:59:59.000Z

131

A Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway  

E-Print Network (OSTI)

A Real- Time Laser-Based Detection System for Measurement ofTime Laser- Based Prototype Detection System for MeasurementLaser-Based Non-Intrusive Detection System for Measurement

Cheng, Harry H.; Shaw, Ben; Palen, Joe; Wang, Zhaoqing; Chen, Bo

2002-01-01T23:59:59.000Z

132

iSSH v. Auditd: Intrusion Detection in High Performance Computing  

SciTech Connect

The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks were roughly the same regardless of which tool was running.

Karns, David M. [Los Alamos National Laboratory; Protin, Kathryn S. [Los Alamos National Laboratory; Wolf, Justin G. [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

133

Assessment of Vapor Intrusion at MGP Sites: Review of Current Knowledge, Practices, and Proposed Field-Based Research Program  

Science Conference Proceedings (OSTI)

Vapor intrusion (VI) is the migration of volatile or semi-volatile chemicals from subsurface contaminated soil or groundwater to indoor air in the overlying building. In the past decade, VI has emerged as a major environmental issue. This report presents a review of the current knowledge, practices, and research needs for VI, including the current regulatory status at both the federal and state level. The report also provides a summary of a proposed field-focused research program to be implemented at two...

2008-03-31T23:59:59.000Z

134

Evidence for the compaction of feldspar-rich cumulates in the Pleasant Bay layered intrusion, coastal Maine  

SciTech Connect

The Pleasant Bay intrusion is roughly 12 km by 20 km. It consists of prominent rhythmic layers, up to 100 m thick, that grade from chilled gabbro on the base, to coarse-grained gabbroic, dioritic, or granitic rocks on the top. These layers were formed by multiple injections of basalt into a large chamber of silicic magma. The focus of this study is on one layer that is about 100 m thick, and is overlain by another basally chilled gabbroic layer at least 50 m thick. Silicic pipes and veins extend upward into the overlying gabbroic chill. The lower part of the layer has dominant calcic plagioclase, An60, augite, and olivine, with subordinate hornblende and biotite. The uppermost part has dominant sodic plagioclase, An20, and two pyroxenes with subordinate quartz, K-feldspar and hornblende. SiO[sub 2] and MgO vary from 49% and 5% at the base to 58% and 1% at the top, respectively. The top 7 m of this layer are characterized by variably deformed minerals. The deformation grades from bent biotite and plagioclase near the bottom to sutured plagioclase at the top. Pockets of undeformed quartz and K-feldspar in the uppermost rocks demonstrate that interstitial liquid was present during a after compaction. The pipes and veins probably represent trapped liquid and some crystals that were expelled into the overlying gabbroic chill.

Horrigan, E.K. (Franklin and Marshall College, Lancaster, PA (United States))

1993-03-01T23:59:59.000Z

135

Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report  

Science Conference Proceedings (OSTI)

Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

2011-09-01T23:59:59.000Z

136

Intrusion Detection: A Bibliography  

E-Print Network (OSTI)

This document contains more than 600 references, dated from 1980 to 2001. We undoubtedly have forgotten some important citations, either through oversight or ignorance. Moreover, errors may remain in the citations. Thus, we ask for your indulgence and, more importantly, for your help. Send us a note if you nd any errors and let us know of any omissions

Ludovic Mé; Cédric Michel

2001-01-01T23:59:59.000Z

137

Non-Intrusive Experiemental Investigation of Multi-Scale Flow Behavior in Rod Bundle with Spacer-Grids  

E-Print Network (OSTI)

Experiments investigating complex flows in rod bundles with spacer grids that have mixing devices (such as flow mixing vanes) have mostly been performed using single-point measurements. Although these measurements allow local comparisons of experimental and numerical data they provide little insight because the discrepancies can be due to the integrated effects of many complex flow phenomena such as wake-wake, wake-vane, and vane-boundary layer interactions occurring simultaneously in a complex flow environment. In order to validate the simulations results, detailed comparison with experimental data must be done. This work describes an experimental database obtained using Time Resolved Particle Image Velocimetry (TR-PIV) measurements within a 5 x 5 rod bundle with spacer-grids. Measurements were performed using two different grid designs. One typical of Boiling Water Reactors (BWR) with swirl type mixing vanes and the other typical of Pressurized Water Reactors (PWR) with split type mixing vanes. High quality data was obtained in the vicinity of the grid using the multi-scale approach. One of the unique characteristic of this set-up is the use of the Matched Index of Refraction (MIR) technique employed in this investigation. This approach allows the use of high temporal and spatial non-intrusive dynamic measurement techniques to investigate the flow evolution below and immediately above the spacer. The experimental data presented includes explanation of the various cases tested such as test rig dimensions, measurement zones, the test equipment and the boundary conditions in order to provide appropriate data for comparison with Computational Fluid Dynamics (CFD) simulations. Turbulence parameters of the obtained data are analyzed in order to gain insight of the physical phenomena. The shape of the velocity profile at various distances from the spacer show important modifications passing the grid which delineates the significant effects of the presence of the grid spacer. Influence of the vanes wake in the global velocity was quantified to be up to a distance of 4 hydraulic diameters from the edge of the grid.Spatial and temporal correlations in the two measured dimensions were performed to quantify the time and length scales present in the flow in the vicinity of the grids and its influence in the flow modification induced by the vanes. Detection of vortex cores was performed using the vorticity, swirl strength and Galilean decomposition approach. The resulted cores were then tracked in time, in order to observe the evolution of the structures under the influence of the vanes for each grid. Vortex stretching was quantified in order to gain insight of the energy dissipation process normally associated with the phenomena. This work presents data in a single-phase flow situation and an analysis of these data for understanding complex flow structure. This data provide for the first time detailed temporal velocity full field which can be used to validate CFD codes.

Dominguez Ontiveros, Elvis Efren

2010-05-01T23:59:59.000Z

138

Technology Review of Nondestructive Methods for Examination of Water Intrusion Areas on Hanford’s Double-Shell Waste Tanks  

Science Conference Proceedings (OSTI)

Under a contract with CH2M Hill Hanford Group, Inc., PNNL has performed a review of the NDE technology and methods for examination of the concrete dome structure of Hanford’s double-shell tanks. The objective was to provide a matrix of methodologies that could be evaluated based on applicability, ease of deployment, and results that could provide information that could be used in the ongoing structural analysis of the tank dome. PNNL performed a technology evaluation with the objective of providing a critical literature review for all applicable technologies based on constraints provided by CH2M HILL. These constraints were not mandatory, but were desired. These constraints included performing the evaluation without removing any soil from the top of the tank, or if necessary, requesting that the hole diameter needed to gain access to evaluate the top of the tank structure to be no greater than approximately 12-in. in diameter. PNNL did not address the details of statistical sampling requirements as they depend on an unspecified risk tolerance. PNNL considered these during the technology evaluation and have reported the results in the remainder of this document. Many of the basic approaches to concrete inspection that were reviewed in previous efforts are still in use. These include electromagnetic, acoustic, radiographic, etc. The primary improvements in these tools have focused on providing quantitative image reconstruction, thus providing inspectors and analysts with three-dimensional data sets that allow for operator visualization of relevant abnormalities and analytical integration into structural performance models. Available instruments, such as radar used for bridge deck inspections, rely on post-processing algorithms and do not provide real-time visualization. Commercially available equipment only provides qualitative indications of relative concrete damage. It cannot be used as direct input for structural analysis to assess fitness for use and if necessary to de-rate critical components. There are currently no tools that automatically convert the NDE data to formats compatible with structural analysis programs. While radiographic techniques still provide significant advantages in spatial resolution, non-ionizing techniques are still preferred. Radar imagining in the 1–5 GHz has become the most useful. Unfortunately the algorithms and underlying assumptions used in these reconstructions are proprietary, and it is not possible to assess the quality and limitations of the analytical methods used to generate the derived structural data. The hypothesis that water intrusion may contribute to potential rebar corrosion of the tank domes provided the primary guidance in reviewing and evaluating available NDE technologies. Of primary concern is the need to employ technologies that provide the best opportunity for visualizing the rebar and providing quantitative data that can be integrated into structural analysis efforts to better understand and quantify the structural capacity of the domes. The conclusion is that an imaging system capable of locating and quantifying the distribution and conditions of the cement, aggregate, and rebar will provide the most valuable baseline upon which to build a case for the integrity of the structure. If successful, such a system would fulfill the need to incorporate valuable data into current structural load capacity analysis.

Watkins, Michael L.; Pardini, Allan F.

2008-05-09T23:59:59.000Z

139

Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada  

DOE Green Energy (OSTI)

In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for extraction of groundwater from the deep carbonate aquifer. Grazing and hunting are unlikely to be potential causes for inadvertent human intrusion into waste areas because of vegetation characteristics and lack of significant game animal populations.

NSTec Environmental Management

2007-06-01T23:59:59.000Z

140

Tuna-Dolphin-Bird Feeding Assemblages in the Galapagos Islands and Their Response to the Physical Characteristics of the Upper Water Column  

E-Print Network (OSTI)

Tuna-dolphin-bird feeding assemblages are unique to the Eastern Tropical Pacific Ocean (ETP). These multiple species groups are believed to forage together in response to the physical properties of the near surface ocean as these constrain the distribution of prey. In the Galapagos Marine Reserve (GMR), intra-annual and interannual changes affect the properties of the water column, inducing mesoscale and fine scale temporal variability. Four three-week oceanographic surveys took place, in September 2008, April 2009, October 2009, and September 2010, between the coast of Ecuador and the Galapagos Islands and one small boat survey took place in June 2010 within the GMR. Marine mammal surveys were conducted during daylight hours and Conductivity, Temperature, Depth (CTD) sensor casts were taken throughout the survey. Data were analyzed to determine the types of water masses present and the strength and depth of the thermocline layer. These data were compared with the sightings of marine mammals, bird feeding groups, and tuna-dolphin-bird assemblages. Additionally, these data were used to predict where tuna would be likely to associate with dolphin groups. Results show Equatorial Surface Water was the dominant water mass throughout the archipelago, regardless of season or ENSO index. High salinity, cold water west of Isla Isabela indicated topographic upwelling of the Equatorial Undercurrent. Tropical Surface Waters from the Panama Current were detected north of the Equatorial Front to the east of the islands. Obvious changes in the water column properties were observed between El Niño and La Niña events in the GMR. Most mixed groups were sighted west and south of Isla Isabela during the four oceanographic surveys, as well as north and west of Isla San Cristobal in June 2010. Most sightings were in cool, high salinity waters, and high chlorophyll concentrations. There were a greater number of sightings during the April 2009 survey (ENSO-neutral conditions) than during any of the three fall surveys. Additionally, tuna-dolphin-bird groups were more likely to be seen near Isla Isabela, with the majority of them sighted during the April 2009 survey and a few sighted in each of the September 2008 and October 2009 surveys. No tuna-dolphin-bird groups were sighted during the September 2010 surveys. Results show that the presence and location of these multi-species groups may be controlled by the inter-annual cycles, the intra-annual cycles, or a combination of both types of changes seen within the Galapagos.

Johnston, Michelle

2011-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

SciTech Connect

One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water standards might be exceeded was evaluated. A variety of scenarios and aquifer conditions was considered in a sensitivity evaluation. The scenarios and conditions simulated in Section 4, in particular those describing the geochemistry and mineralogy of potable aquifers, were selected based on the comprehensive geochemical model developed in Section 3.

Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu

2008-10-01T23:59:59.000Z

142

Next Generation Intrusion Detection: Autonomous ...  

Science Conference Proceedings (OSTI)

... Prior to joining GTRI Dr. Cannady was a Special Agent with the US Naval Investigative Service, specializing in counterintelligence matters and the ...

2000-11-03T23:59:59.000Z

143

Non-intrusive cooling system  

DOE Patents (OSTI)

A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

2001-05-22T23:59:59.000Z

144

Water intrusion in underground structures  

E-Print Network (OSTI)

This thesis presents a study of the permissible groundwater infiltration rates in underground structures, the consequences of this leakage and the effectiveness of mitigation measures. Design guides and codes do not restrict, ...

Nazarchuk, Alex

2008-01-01T23:59:59.000Z

145

Intrusion detection at 100G  

Science Conference Proceedings (OSTI)

Driven by the growing data transfer needs of the scientific community and the standardization of the 100 Gbps Ethernet Specification, 100 Gbps is now becoming a reality for many HPC sites. This tenfold increase in bandwidth creates a number of significant ...

Scott Campbell; Jason Lee

2011-11-01T23:59:59.000Z

146

Intrusive multi-probe system  

DOE Green Energy (OSTI)

The Diagnostic Instrumentation and Analysis Laboratory (DIAL) in the College of Engineering at Mississippi State University is the result of the efforts of several faculty members in the Aerospace and Chemical Engineering Departments obtaining funding in 1976. At that time, an initial research project was begun which was funded by the US Department of Energy as part of the national magnetohydrodynamic (MHD) program. Initial research efforts concentrated in heat recovery and seed recovery (HRSR) from the MHD combustion process as well as some materials investigations. Over the years, efforts at DIAL were shifted from HRSR studies to the development of optical based, microprocessor controlled instrumentation for use in the harsh MHD environment.

Green, R.A.; Hester, L.R.; Bouchillon, C.W.

1995-02-01T23:59:59.000Z

147

Non-intrusive Termination of Noisy Optimization ?  

E-Print Network (OSTI)

May 31, 2011 ... U.S. Department of Energy, under Contract DE-AC02-06CH11357. .... 1: Noisy trajectory of function values for an expensive nuclear physics problem. The main ...... J. Optimization Theory and Applications 79, 157–181 (1993).

148

Disruptive event analysis: volcanism and igneous intrusion  

SciTech Connect

An evaluation is made of the disruptive effects of volcanic activity with respect to long term isolation of radioactive waste through deep geologic storage. Three major questions are considered. First, what is the range of disruption effects of a radioactive waste repository by volcanic activity. Second, is it possible, by selective siting of a repository, to reduce the risk of disruption by future volcanic activity. And third, can the probability of repository disruption by volcanic activity be quantified. The main variables involved in the evaluation of the consequences of repository disruption by volcanic activity are the geometry of the magma-repository intersection (partly controlled by depth of burial) and the nature of volcanism. Potential radionuclide dispersal by volcanic transport within the biosphere ranges in distance from several kilometers to global. Risk from the most catastrophic types of eruptions can be reduced by careful site selection to maximize lag time prior to the onset of activity. Certain areas or volcanic provinces within the western United States have been sites of significant volcanism and should be avoided as potential sites for a radioactive waste repository. Examples of projection of future sites of active volcanism are discussed for three areas of the western United States. Probability calculations require two types of data: a numerical rate or frequency of volcanic activity and a numerical evaluation of the areal extent of volcanic disruption for a designated region. The former is clearly beyond the current state of art in volcanology. The latter can be approximated with a reasonable degree of satisfaction. In this report, simplified probability calculations are attempted for areas of past volcanic activity.

Crowe, B.M.

1980-08-01T23:59:59.000Z

149

Intrusion Recovery Using Selective Re-execution  

E-Print Network (OSTI)

RETRO repairs a desktop or server after an adversary compromises it, by undoing the adversary's changes while preserving legitimate user actions, with minimal user involvement. During normal operation, RETRO records an ...

Kim, Taesoo

150

Petroleum Hydrocarbon Vapour Intrusion Assessment: Australian Guidance  

E-Print Network (OSTI)

Copyright © CRC CARE Pty Ltd, 2013 This book is copyright. Except as permitted under the Australian Copyright Act 1968 (Commonwealth) and subsequent amendments, no part of this publication may be reproduced, stored or transmitted in any form or by any means, electronic or otherwise, without the specific written permission of the copyright owner.

Jackie Wright; Greg Davis; Csiro L; Sophie Wood; Marc Salmon; Cavvanba Consulting; Peter Nadebaum; Prashant Srivastava; Crc Care; Ravi Naidu; Crc Care

2013-01-01T23:59:59.000Z

151

Non-intrusive refrigerant charge indicator - Energy ...  

... -phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, ...

152

Intrusion detection and monitoring for wireless networks.  

SciTech Connect

Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

2005-11-01T23:59:59.000Z

153

Intrusion Detection System for Advanced Metering Infrastructure  

Science Conference Proceedings (OSTI)

The deployment of Advanced Metering Infrastructure (AMI) technology significantly increases the attack surface that utilities have to protect. As a result, there is a critical need for efficient monitoring solutions to supplement protective measures and keep the infrastructure secure. This document investigates current industrial and academic efforts to address the challenge of detecting security events across the range of AMI networks and devices. The goal of this study is to help utilities and ...

2012-12-31T23:59:59.000Z

154

ITL Bulletin Acquiring and Deploying Intrusion Detection ...  

Science Conference Proceedings (OSTI)

... read the “Intru- sion Detection System Product Sur- vey” published by the Los Alamos National Laboratory and found at http://lib-www.lanl.gov/la ...

2012-03-26T23:59:59.000Z

155

Minimizing intrusiveness in home energy measurement  

Science Conference Proceedings (OSTI)

The expanding deployment of renewable energy sources as well as the widespread deployment of smart meters enables and encourages demand management in homes. Like smart meters, most solar or other renewable deployments allow homeowners to carefully monitor ... Keywords: energy, sustainability

David Lachut; Simon Piel; Lazeeb Choudhury; Yucheng Xiong; Sami Rollins; Kevin Moran; Nilanjan Banerjee

2012-11-01T23:59:59.000Z

156

Ecology, Assemblage Structure, Distribution, and Status of Fishes  

E-Print Network (OSTI)

DESCRIPTION: The City of Paducah risks FEMA decertification of its local flood protection project if it does

157

Testing olfactory foraging strategies in an Antarctic seabird assemblage  

E-Print Network (OSTI)

are scented responses to herring oil were more common. Withto this scented with herring oil compared with contrololfactory attractant, herring oil. Responses to tracking

Nevitt, G A; Reid, K; Trathan, P

2004-01-01T23:59:59.000Z

158

Correspondence of pollen assemblages with forest zones across steep  

E-Print Network (OSTI)

Forest, a rural site near Petersham, Massachusetts pro- vides a chemical climatology for all seasons over

Gavin, Daniel G.

159

Detecting temporal trends in species assemblages with bootstrapping  

E-Print Network (OSTI)

Forest, Harvard University, Petersham, MA 01366, USA 4 Warnell School of Forestry & Natural Resources

Gotelli, Nicholas J.

160

The assemblage of exchange : housing, industry and the potential mall  

E-Print Network (OSTI)

This thesis is interested in examining a contemporary generative method for approaching design in urban areas. It considers the levels of interactions in the city in which the questions of architecture are clearly affected ...

Eng, Ronald J. (Ronald Jan)

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Immunity-Based Intrusion Detection System: A General ...  

Science Conference Proceedings (OSTI)

... and proliferation of B cells are closely regulated (with a co-stimulation) in order to ... The signals tell how to kill the new virus as well as similar one. ...

1999-11-05T23:59:59.000Z

162

Distributed fiber optic intrusion sensor system for monitoring long perimeters  

E-Print Network (OSTI)

A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from seismic disturbances in the vicinity are sensed by a phase-sensitive optical time-domain reflectometer (??OTDR). Light pulses from a cw laser operating in a single longitudinal mode and with low (MHz/min range) frequency drift are injected into one end of the single mode fiber, and the backscattered light is monitored with a photodetector. In laboratory tests with 12 km of fiber on reels, the effects of localized phase perturbations induced by a piezoelectric fiber stretcher on ??OTDR traces were characterized. In field tests in which the sensing element is a single mode fiber in a 3-mm diameter cable buried in an 8 to 18 inch deep, 4 inch wide trench in clay soil, detection of intruders on foot up to 15 ft from the cable line was achieved. In desert terrain field tests in which the sensing fiber is in a 4.5-mm diameter cable buried in a 1 ft deep, 2.5 ft wide trench filled with loose sand, high sensitivity and consistent detection of intruders on foot and of vehicles traveling down a road near the cable line was realized over a cable length of 8.5 km and a total fiber path of 19 km in real time. In a final series of field tests in clay soil, phase changes produced by the steps of a person walking up to 15 ft away from the buried cable were observed, and vehicles traveling at 10 mph were consistently detected up to 300 ft away. Based on these results, this technology may be regarded as a candidate for providing low-cost perimeter security for nuclear power plants, electrical power distribution centers, storage facilities for fuel and volatile chemicals, communication hubs, airports, government offices, military bases, embassies, and national borders.

Juarez, Juan C.

2005-08-01T23:59:59.000Z

163

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network (OSTI)

intensity matrix (CIM) Q X|U – a set of homogeneousset of U is empty, the CIM is simply a standard intensitytory. So we know which CIM is governing the transition

Xu, Jing

2010-01-01T23:59:59.000Z

164

Ultra-Wideband Guard Dog Intrusion Detection Sensors  

... in a variety of exercises, including a 5 star node configuration outdoors with satellite exfiltration and simultaneous internet broadcast.

165

Energy Balancing Intrusion Detection System in Wireless Sensor Network  

Science Conference Proceedings (OSTI)

wireless sensor network (WSN) is vulnerable to a wide range of attacks due to deployment in the hostile ervironment and having limited resources. The security of WSN becomes a very important issue with the rapid development of WSN. Instrusion detection ... Keywords: WSN, Energy-effiency, Clustering, IDS

Chunyan Peng; Bing Liu

2012-10-01T23:59:59.000Z

166

Applying a data mining method for intrusion detection  

Science Conference Proceedings (OSTI)

Widespread use of networked computers has made computer security a serious issue. Every networked computer, to varying degrees, is vulnerable to malicious computer attacks that can result in a range of security violations, such as, unauthorized user ... Keywords: classification tree, data mining, misuse detection

Vera Marinova-Boncheva

2007-06-01T23:59:59.000Z

167

Characterizing Thermohaline Intrusions in the North Pacific Subtropical Frontal Zone  

Science Conference Proceedings (OSTI)

A monthlong field survey in July 2007, focused on the North Pacific subtropical frontal zone (STFZ) near 30°N, 158°W, combined towed depth-cycling conductivity–temperature–depth (CTD) profiling with shipboard current observations. Measurements ...

Andrey Y. Shcherbina; Michael C. Gregg; Matthew H. Alford; Ramsey R. Harcourt

2009-11-01T23:59:59.000Z

168

TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture  

E-Print Network (OSTI)

The last 20 years have led to unprecedented improvements in chipdensity and system performance fueled mainly by Moore's Law. Duringthe same time, system and application software have bloated, leadingto unmanageable ...

Shrobe, Howard

2007-05-30T23:59:59.000Z

169

Climate of West Antarctica and Influence of Marine Air Intrusions  

Science Conference Proceedings (OSTI)

High-resolution numerical weather forecasts from the Antarctic Mesoscale Prediction System (AMPS) archive are used to investigate the climate of West Antarctica (WA) during 2006–07. A comparison with observations from West Antarctic automatic ...

Julien P. Nicolas; David H. Bromwich

2011-01-01T23:59:59.000Z

170

Time-based intrusion detection in cyber-physical systems  

Science Conference Proceedings (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

171

Secure Routing and Intrusion Detection in Ad Hoc Networks  

Science Conference Proceedings (OSTI)

... The loss or capture of unattended sensors and personal computing devices ... Traffic monitoring in wired networks is usually per- formed at switches ...

2007-09-19T23:59:59.000Z

172

Shipboard fluid system diagnostics using non-intrusive load monitoring  

E-Print Network (OSTI)

Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

Mitchell, Gregory R. (Gregory Reed)

2007-01-01T23:59:59.000Z

173

Sea water intrusion model of Amchitka Island, Alaska  

SciTech Connect

During the 1960s and 1970s, Amchitka Island, Alaska, was the site of three underground nuclear tests, referred to as Milrow, Long Shot and Cannikin. Amchitka Island is located in the western part of the Aleutian Island chain, Alaska. The groundwater systems affected by the three underground nuclear tests at Amchitka Island are essentially unmonitored because all of the current monitoring wells are too shallow and not appropriately placed to detect migration from the cavities. The dynamics of the island`s fresh water-sea water hydrologic system will control contaminant migration from the three event cavities, with migration expected in the direction of the Bering Sea from Long shot and Cannikin and the Pacific Ocean from Milrow. The hydrogeologic setting (actively flowing groundwater system to maintain a freshwater lens) suggests a significant possibility for relatively rapid contaminant migration from these sites, but also presents an opportunity to use projected flowpaths to a monitoring advantage. The purpose of this investigation is to develop a conceptual model of the Amchitka groundwater system and to produce computer model simulations that reflect the boundary conditions and hydraulic properties of the groundwater system. The simulations will be used to assess the validity of the proposed conceptual model and highlight the uncertainties in hydraulic properties of the aquifer. The uncertainties will be quantified by sensitivity analyses on various model parameters. Within the limitations of the conceptual model and the computer simulations, conclusions will be drawn regarding potential radionuclide migration from the three underground nuclear tests.

Wheatcraft, S.W. [Nevada Univ., Reno, NV (United States). Hydrology/Hydrogeology Dept., Environmental and Resource Science

1995-09-01T23:59:59.000Z

174

Pasture and Soil Management Following Tidal Saltwater Intrusion  

E-Print Network (OSTI)

When land is flooded by saltwater, as after a hurricane tidal surge, it can long-term effects on soil productivity and fertility. This publication explains how to reclaim flooded pasture land. Having soil tested for salinity is an important step.

Provin, Tony; Redmon, Larry; McFarland, Mark L.; Feagley, Sam E.

2009-05-26T23:59:59.000Z

175

A STUDY OF SUBSURFACE VAPOR INTRUSION FROM EXPLORATION & PRODUCTION WASTE.  

E-Print Network (OSTI)

??Expanding city growth is causing the inhabitants of Louisiana to move further into rural areas. Abandoned oil and gas production sites are being used for… (more)

Wascom, Daniel Dawson

2007-01-01T23:59:59.000Z

176

A Host Intrusion Prevention System for Windows Operating Systems  

Science Conference Proceedings (OSTI)

this technique to Windows OS, also because Windows kernel structures ... vention System (HIPS) for Windows OS that immediately detects security rules.

177

A Numerical Study of Loop Current Intrusions and Eddy Shedding  

Science Conference Proceedings (OSTI)

The dynamics of the eddy shedding by the Loop Current in the Gulf of Mexico have been investigated using three nonlinear numerical models: two-layer, barotropic and reduced gravity. The barotropic and reduced gravity models demonstrate the ...

H. E. Hurlburt; J. Dana Thompson

1980-10-01T23:59:59.000Z

178

Review of Techniques for Non-Intrusive Electrical Load Monitoring  

NLE Websites -- All DOE Office Websites (Extended Search)

of individual electrical devices in buildings. It generally relies on aggregate power metering (at the whole-building or branch circuit level) and special signal processing...

179

1.0 Introduction Voluminous volcanic intrusive complexes are com-  

E-Print Network (OSTI)

processes and today's landscape in the Karoo Basin and offshore Norway. The resulting multimedia art of the project corresponds to the publication of geological pamphlets and field guides of the Karoo Basin and publish popular science booklets on the geology of the Karoo Basin for distribution in Norway and South

Polteau, Stephane

180

Non-Intrusive Electric Load Monitoring in Commercial Buildings  

E-Print Network (OSTI)

Increased interest in optimal control, energy scorekeeping and fault detection for HVAC equipment in commercial buildings has focused attention on instrumentation required to obtain the desired data. In this paper we investigate what can be learned from measurements of electrical power at a single point, that of the electrical service for the entire HVAC system. This low-cost measurement has proved in field tests to be capable of detecting the power change when a piece of equipment turns on or off; detecting oscillating equipment power caused by poorly tuned controllers; and detecting suboptimal staging of multiple chillers. Detection of equipment start and stop transitions was strengthened by application of a nonlinear filter that determines the point of median power from a filtering window of user-selected width. A review of electric motor literature indicated that samples of electrical current taken at slightly faster than twice the 60 Hz fundamental can be used to detect several indicators of incipient motor failure. Tests were initiated to determine whether this technique can be applied to a number of motors on the same circuit.

Norford, L. K.; Mabey, N.

1992-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Minimizing Intrusiveness in Home Energy Measurement David Lachut  

E-Print Network (OSTI)

to carefully monitor energy supply and past energy consumption, however, using this information to drive demand energy demand to meet supply, which requires a comprehensive understanding of home energy use. Though monitor energy supply and past energy consumption. Using this information to drive demand management

Rollins, Sami

182

NISTIR 6416, Applying Mobile Agents to Intrusion Detection ...  

Science Conference Proceedings (OSTI)

... Advanced Telecommunications/Information Distribution Research Program ... opportunities for improved automation in the ... a set of devices, when and ...

2012-11-09T23:59:59.000Z

183

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the...

184

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network (OSTI)

histogram. In ACM SIGMETRICS. Tandon, G. and Chan, P. K. (them in our experiments. Tandon and Chan (2005) look at a

Xu, Jing

2010-01-01T23:59:59.000Z

185

Improving shipboard maintenance practices using non-intrusive load monitoring  

E-Print Network (OSTI)

(cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

Piber, Mark A. (Mark Augustin)

2007-01-01T23:59:59.000Z

186

Effects Of Sea Otter Colonization On Soft-Sediment Intertidal Prey Assemblages In Glacier Bay, Alaska  

E-Print Network (OSTI)

organization in the western Aleutian Islands, Alaska.invertebrates in the western Aleutian archipelago. Marine

Weitzman, Benjamin Phillip

2013-01-01T23:59:59.000Z

187

Ontogenic landscapes: hydro-fracking, potentiality, and the assemblage of identity over the northeastern Marcellus Shale.  

E-Print Network (OSTI)

??Recent environmental, ecological, and economic concerns have interwoven in an increasingly complex manner with movements often coalescing around both particular practices and regions. Of great… (more)

Danza, Daniel J., 1987-

2012-01-01T23:59:59.000Z

188

Panel assemblage for housing : some form and construction explorations for small buildings  

E-Print Network (OSTI)

This thesis examines the consequences of building homes in a factory and explores viable construction alternatives using factory-made panels. The exploration considers panelized systems of dwelling construction and its ...

Borenstein, David Reed

1984-01-01T23:59:59.000Z

189

The impact of landuse on invertebrate assemblages in the Succulent Karoo, South Africa.  

E-Print Network (OSTI)

??The Succulent Karoo biodiversity hotspot is threatened by pressure caused by increasing human populations and its associated land use types. Land use is primarily focussed… (more)

Nchai, Makebitsamang Constance

2008-01-01T23:59:59.000Z

190

OIKOS 99: 591599, 2002 Assembly rules for New England ant assemblages  

E-Print Network (OSTI)

, Petersham, MA 01366, USA). The study of assembly rules that reflect species interac- tions is an active

Gotelli, Nicholas J.

191

Paleoarchaic Surface Assemblages in the Great Salt Lake Desert, Northwestern Utah  

E-Print Network (OSTI)

Unknown Basalt Source B Black Rock, Utah Unknown BasaltMountain, and Black Rock obsidian source areas in relationMalad, and Black Rock obsidian sources have a similar

Arkush, Brooke S; Pitblado, Bonnie L

2000-01-01T23:59:59.000Z

192

ORIGINAL PAPER Comparisons of arthropod assemblages on an invasive and native  

E-Print Network (OSTI)

tallow tree (Triadica sebifera) and three native tree species: silver maple (Acer saccharinum), sycamore and abundance of arthropods on tallow tree were similar to the natives. But, ordination (NMS) showed community composition differed on tallow tree compared to all three native trees. It supported an arthropod community

Siemann, Evan

193

Non-intrusive vibration monitoring in US Naval and US Coast Guard ships  

E-Print Network (OSTI)

In 2011, the Laboratory for Electromagnetic and Electronic Systems proposed a new type of vibration monitoring system, entitled vibration assessment monitoring point with integrated recovery of energy or VAMPRIE, in their ...

Gerhard, Katherine Leigh

2013-01-01T23:59:59.000Z

194

A Time Scale for Long-Term Salt Intrusion in Well-Mixed Estuaries  

Science Conference Proceedings (OSTI)

The one-dimensional equation for dispersion of sail in a well-mixed estuary is analyzed to obtain an estimate of the departure from the quasi-steady distribution of the tidally averaged salinity in the case of a gradually varying fresh water ...

C. Kranenburg

1986-07-01T23:59:59.000Z

195

Electric load information system based on non-intrusive power monitoring  

E-Print Network (OSTI)

Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

Lee, Kwangduk Douglas, 1970-

2003-01-01T23:59:59.000Z

196

Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse  

SciTech Connect

The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

Czejdo, Bogdan [ORNL; Ferragut, Erik M [ORNL; Goodall, John R [ORNL; Laska, Jason A [ORNL

2012-01-01T23:59:59.000Z

197

Thermal Mediation by Littoral Wetlands and Impact on Lake Intrusion Depth  

E-Print Network (OSTI)

Lake inflow dynamics can be affected by the thermal mediation provided by shallow littoral regions such as wetlands. In this study, wetland thermal mediation is evaluated using a linearized dead-zone model. Its impact on ...

Andradottir, Hrund O.

198

A retrofit 60 Hz current sensor for non-intrusive power monitoring at the circuit breaker  

E-Print Network (OSTI)

We present a new sensor for power monitoring that measures current flow in a circuit breaker without permanent modification of the breaker panel or the circuit breaker itself. The sensor consists of three parts: an inductive ...

Clifford, Zachary

199

A retrot current sensor for non-intrusive power monitoring at the circuit breaker  

E-Print Network (OSTI)

This thesis presents a new sensor for power monitoring that measures current flow in a circuit breaker without permanent modification of the breaker panel or the circuit breaker itself. At the breaker panel, an inductive ...

Vickery, Daniel Robert

2011-01-01T23:59:59.000Z

200

Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices  

E-Print Network (OSTI)

. These restrictions include limited processor power, memory, and power usage. Whereas a typical desktop system today for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy

Ha, Dong S.

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A non-intrusive fault tolerant framework for mission critical real-time systems  

E-Print Network (OSTI)

The need for dependable real-time systems for embedded application is growing, and, at the same time, so does the amount of functionality required from these systems. As testing can only show the presence of errors, not ...

Gorelov, Sébastien

2005-01-01T23:59:59.000Z

202

Modeling and Optimization of Seawater Intrusion Barriers in Southern California Coastal Plain  

E-Print Network (OSTI)

the locations of new injection wells that maximize thelocations for new injection wells are identified that resultannually through 43 injection wells along the barrier. The A

Yeh, William W-G.; Bray, Ben

2006-01-01T23:59:59.000Z

203

Using the non-intrusive load monitor for shipboard supervisory control  

E-Print Network (OSTI)

Field studies have demonstrated that it is possible to evaluate the state of many shipboard systems by analyzing the power drawn by electromechanical actuators [1], [2], [3], [4], [5]. One device that can perform such an ...

Bennett, Patrick Lawrence

2007-01-01T23:59:59.000Z

204

Numerical and observational estimates of Indian Ocean Kelvin wave intrusion into Lombok Strait  

E-Print Network (OSTI)

, Hiroshima University, Higashi-Hiroshima, Japan Dale B. Haidvogel Institute of Marine and Coastal Science

205

A Proposed Mechanism for the Intrusion of Dry Air into the Tropical Western Pacific Region  

Science Conference Proceedings (OSTI)

Recent studies using data from the Tropical Ocean and Global Atmosphere program’s Coupled Ocean–Atmosphere Response Experiment (TOGA COARE) have shown that synoptic-scale areas of extremely dry air can occur in the troposphere over the equatorial ...

Kunio Yoneyama; David B. Parsons

1999-06-01T23:59:59.000Z

206

Nocturnal Cold-Air Intrusions into a Closed Basin: Observational Evidence and Conceptual Model  

Science Conference Proceedings (OSTI)

Observations are analyzed to explain an unusual feature of the nighttime atmospheric structure inside Arizona’s idealized, basin-shaped Meteor Crater. The upper 75%–80% of the crater’s atmosphere, which overlies an intense surface-based inversion ...

C. David Whiteman; Sebastian W. Hoch; Manuela Lehner; Thomas Haiden

2010-09-01T23:59:59.000Z

207

A Mass Flux Model of Nocturnal Cold-Air Intrusions into a Closed Basin  

Science Conference Proceedings (OSTI)

Observations made during the Meteor Crater Experiment (METCRAX) field campaign revealed unexpected nighttime cooling characteristics in Arizona’s Meteor Crater. Unlike in other natural closed basins, a near-isothermal temperature profile regularly ...

Thomas Haiden; C. David Whiteman; Sebastian W. Hoch; Manuela Lehner

2011-05-01T23:59:59.000Z

208

Modeling and Optimization of Seawater Intrusion Barriers in Southern California Coastal Plain  

E-Print Network (OSTI)

Water Resources Planning and Management, ASCE, 114(2): Yeh,and W. W-G. Yeh. 2005. Optimization of Water distributionWater Resources Research 26(10): 2317-2329. April, 2006 Yeh

Yeh, William W-G.; Bray, Ben

2006-01-01T23:59:59.000Z

209

A non-intrusive beam power monitor for high power pulsed or continuous wave lasers  

DOE Patents (OSTI)

A system and method for monitoring the output of a laser is provided in which the output of a photodiode disposed in the cavity of the laser is used to provide a correlated indication of the laser power. The photodiode is disposed out of the laser beam to view the extraneous light generated in the laser cavity whose intensity has been found to be a direct correlation of the laser beam output power level. Further, the system provides means for monitoring the phase of the laser output beam relative to a modulated control signal through the photodiode monitor.

Hawsey, R.A.; Scudiere, M.B.

1991-05-29T23:59:59.000Z

210

NIST SP 800-94, Guide to Intrusion Detection and Prevention ...  

Science Conference Proceedings (OSTI)

... can be verified, such as comparing vendor-provided checksums to checksums computed for files on the media, or verifying digital signatures on the ...

2012-02-09T23:59:59.000Z

211

Fault Detection and Diagnostics for Non-Intrusive Monitoring Using Motor Harmonics  

E-Print Network (OSTI)

Harmonic analysis of motor current has been used to track the speed of motors for sensorless control. Algorithms exist that track the speed of a motor given a dedicated stator current measurement, for example. Harmonic ...

Orji, Uzoma A.

212

NON-INTRUSIVE SENSOR FOR GAS FILL VERIFICATION OF INSULATED GLASS WINDOWS  

SciTech Connect

A sensor capable of measuring the amount of oxygen (an unwanted component that is only present because of improper filling or seal failure) within an argon-filled insulated glass window has been designed, built and successfully tested. It operates by using the optical absorption of oxygen in the atmospheric A-band centered at 762 nm. Light emitted by an argon-filled surface glow discharge lamp is Zeeman-tuned on and off an oxygen absorption line using an AC-modulated electromagnet. In the presence of oxygen, the change in the measured intensity of the lamp, obtained using standard demodulation techniques, is proportional to the oxygen column density. Measurements using an industry-standard insulated glass window indicate that the sensor can measure the amount of oxygen in a nominally argon-filled IG window (with a window gap of 10 mm) with a precision of 0.50% oxygen using a 16 second integration time. This level of precision is well within the limits required by the IG window manufacturing industry for proper monitoring of newly manufactured window units.

Andrew Freedman; Paul L. Kebabian; Richard R. Romano; James Woodroffe

2003-10-01T23:59:59.000Z

213

Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol  

SciTech Connect

To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

2013-07-01T23:59:59.000Z

214

Assessment of Seawater Intrusion Potential From Sea-level Rise in Coastal Aquifers of California  

E-Print Network (OSTI)

February 2008). United Water Conservation District (UWCD). (Department, United Water Conservation District. Barazzuoli,Hydrologist, United Water Conservation District. Written

Loáiciga, Hugo A; Pingel, Thomas J; Garcia, Elizabeth S

2009-01-01T23:59:59.000Z

215

Buoyancy and stratification in Boussinesq flow with applications to natural ventilation and intrusive gravity currents  

E-Print Network (OSTI)

heating or air conditioning systems, as discussed by Woodsheating on simple household stoves using unpro- cessed solid fuels [most often wood

Flynn, Morris R.

2006-01-01T23:59:59.000Z

216

Method for Non-Intrusively Identifying a Contained Material Utilizing Uncollided Nuclear Transmission Measurements  

DOE Patents (OSTI)

An improved nuclear diagnostic method identifies a contained target material by measuring on-axis, mono-energetic uncollided particle radiation transmitted through a target material for two penetrating radiation beam energies, and applying specially developed algorithms to estimate a ratio of macroscopic neutron cross-sections for the uncollided particle radiation at the two energies, where the penetrating radiation is a neutron beam, or a ratio of linear attenuation coefficients for the uncollided particle radiation at the two energies, where the penetrating radiation is a gamma-ray beam. Alternatively, the measurements are used to derive a minimization formula based on the macroscopic neutron cross-sections for the uncollided particle radiation at the two neutron beam energies, or the linear attenuation coefficients for the uncollided particle radiation at the two gamma-ray beam energies. A candidate target material database, including known macroscopic neutron cross-sections or linear attenuation coefficients for target materials at the selected neutron or gamma-ray beam energies, is used to approximate the estimated ratio or to solve the minimization formula, such that the identity of the contained target material is discovered.

Morrison, John L.; Stephens, Alan G.; Grover Blaine S.

1999-02-26T23:59:59.000Z

217

A non-intrusive beam power monitor for high power pulsed or continuous wave lasers  

DOE Patents (OSTI)

A system for monitoring the output of a laser is provided in which the output of a photodiode disposed in the cavity of the laser is used to provide a correlated indication of the laser power. The photodiode is disposed out of the laser beam to view the extraneous light generated in the laser cavity whose intensity has been found to be a direct correlation of the laser beam output power level. Further, the system provides means for monitoring the phase of the laser output beam relative to a modulated control signal through the photodiode monitor. 4 figs.

Hawsey, R.A.; Scudiere, M.B.

1989-09-26T23:59:59.000Z

218

Development of real time non-intrusive load monitor for shipboard fluid systems  

E-Print Network (OSTI)

Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

Branch, Perry L. (Perry Lamar)

2008-01-01T23:59:59.000Z

219

Mixing and Intrusions in a Rotating Cold-Core Feature off Cape Blanco, Oregon  

Science Conference Proceedings (OSTI)

During August 1986, a large cold anomaly was observed in satellite and in situ measurements near Cape Blanco at 42°N, 126°30?W off the Pacific Coast. Detailed vertical profiles of temperature, conductivity, turbulent dissipation, and horizontal ...

James N. Moum; Douglas R. Caldwell; Phyllis J. Stabeno

1988-06-01T23:59:59.000Z

220

The Intrusion Depth of Density Currents Flowing into Stratified Water Bodies  

Science Conference Proceedings (OSTI)

Theory and laboratory experiments are presented describing the depth at which a density current intrudes into a linearly stratified water column, as a function of the entrainment ratio E, the buoyancy flux in the dense current B, and the ...

Mathew Wells; Parthiban Nadarajah

2009-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Multiparameter Raman Lidar Measurements for the Characterization of a Dry Stratospheric Intrusion Event  

Science Conference Proceedings (OSTI)

The University of Basilicata Raman lidar system (BASIL) is operational in Potenza, Italy, and it is capable of performing high-resolution and accurate measurements of atmospheric temperature and water vapor based on the application of the ...

Paolo Di Girolamo; Donato Summa; Rossella Ferretti

2009-09-01T23:59:59.000Z

222

Metal-residence sites in mine tailings in the Magdalena District, New Mexico, USA  

Science Conference Proceedings (OSTI)

Mineralization in the Kelly Mining Camp is hosted by the Mississippian Kelly Limestone and comprises Zn-Pb skarn, replacement, and vein deposits related to Tertiary intrusive activity. The ore consists of primary (hypogene) sulfide mineralization which has been oxidized near surface to form secondary (supergene) mineralization. A zone of secondary sulfide-enrichment separates the sulfide and oxide ores. Mine tailings in the camp contain primary sulfide, oxide and gangue minerals, secondary (supergene) minerals formed during weathering of the primary ore, and tertiary minerals formed by alteration of hypogene and supergene assemblages after deposition in the tailings impoundment.

Larocque, A.C.L. [Univ. of Manitoba, Winnipeg, Manitoba (Canada). Dept. of Geological Sciences; Chapin, C.E. [New Mexico Bureau of Mines and Mineral Resources, Socorro, NM (United States); Laughlin, A.W. [ICF Kaiser Ltd., Los Alamos, NM (United States); Hickmott, D. [Los Alamos National Lab., NM (United States)

1996-05-01T23:59:59.000Z

223

Evaluating Flake Assemblage and Stone Tool Distributions at a Large Western Stemmed Tradition Site Near Yucca Mountain, Nevada  

E-Print Network (OSTI)

Tradition Site Near Yucca Mountain, Nevada G R E G O R Y M .Institute near Yucca Mountain, Nevada, have revealed anlevel at the top of Yucca Mountain. Vegetation is typi- cal

Haynes, Gregory M

1996-01-01T23:59:59.000Z

224

An assemblage of fragments : history, revolutionary aesthetics and global capitalism in Vietnamese/American literature, films and visual culture  

E-Print Network (OSTI)

Theses on the Philosophy of History,” Illuminations. Trans.Trauma, Narrative, and History. Baltimore and London: TheAsian American Art: A History, 1850-1970. Stanford: Stanford

Võ, Ch'o'ng-?ài H?òng

2009-01-01T23:59:59.000Z

225

A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments  

E-Print Network (OSTI)

selected perspective views offshore San Diego, California.Holocene shelf sedimentation offshore La Jolla, California.M.P. , 1979. Faulting offshore San Diego and Northern Baja,

Le Dantec, Nicolas

2009-01-01T23:59:59.000Z

226

Nekton assemblage structure in natural and created marsh-edge habitats of the Guadalupe Estuary, Texas, USA  

E-Print Network (OSTI)

National Wildlife Refuge (ANWR) Biodiversity Conservation areas Reserve selection Stochastic programming

Hoeinghaus, David J.

227

Patterns of fish assemblage structure and dynamics in waters of the Savannah River Plant. Comprehensive Cooling Water Study final report  

SciTech Connect

Research conducted as part of the Comprehensive Cooling Water Study (CCWS) has elucidated many factors that are important to fish population and community dynamics in a variety of habitats on the Savannah River Plant (SRP). Information gained from these studies is useful in predicting fish responses to SRP operations. The overall objective of the CCWS was (1) to determine the environmental effects of SRP cooling water withdrawals and discharges and (2) to determine the significance of the cooling water impacts on the environment. The purpose of this study was to: (1) examine the effects of thermal plumes on anadromous and resident fishes, including overwintering effects, in the SRP swamp and associated tributary streams; (2) assess fish spawning and locate nursery grounds on the SRP; (3) examine the level of use of the SRP by spawning fish from the Savannah River, this objective was shared with the Savannah River Laboratory, E.I. du Pont de Nemours and Company; and (4) determine impacts of cooling-water discharges on fish population and community attributes. Five studies were designed to address the above topics. The specific objectives and a summary of the findings of each study are presented.

Aho, J.M.; Anderson, C.S.; Floyd, K.B.; Negus, M.T.; Meador, M.R.

1986-06-01T23:59:59.000Z

228

A national drilling program to study the roots of active hydrothermal systems related to young magmatic intrusions  

DOE Green Energy (OSTI)

The importance of studies of active hydrothermal-magma systems as part of a national continental scientific drilling program has been emphasized in numerous workshops and symposia. The present report, prepared by the Panel on Thermal Regimes of the Continental Scientific Drilling Committee, both reinforces and expands on earlier recommendations. The US Geodynamics Committee 1979 report of the Los Almos workshop, Continental Scientific Drilling Program, placed major emphasis on maximizing the scientific value of current and planned drilling by industry and government, supplementing these efforts with holes drilled solely for scientific purposes. Although the present report notes the importance of opportunities for scientific investigations that may be added on to current, mission-oriented drilling activities, the Panel on Thermal Regimes recognizes that such opportunities are limited and thus focused its study on holes dedicated to broad scientific objectives. 16 refs., 2 figs., 4 tabs.

Not Available

1984-01-01T23:59:59.000Z

229

Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California  

E-Print Network (OSTI)

heterogeneity of the Aleutian margin (1965-4822 m), Progressforaminifera from the Aleutian Margin and the Southern

Kluesner, Jared W.

2011-01-01T23:59:59.000Z

230

Contact metamorphic devolatilization of shales in the Karoo Basin, South Africa, and the effects of multiple sill intrusions  

E-Print Network (OSTI)

Contact metamorphic devolatilization of shales in the Karoo Basin, South Africa, and the effects the organic-rich Ecca Group in the Karoo Basin, South Africa, which was affected by contact metamorphism from. The modelling results are constrained by data from two case studies in the Karoo Basin in order to obtain

Svensen, Henrik

231

Monitoring CO2 intrusion and associated geochemical transformations in a shallow groundwater system using complex electrical methods  

E-Print Network (OSTI)

dissolution and ion exchange. Both laboratory and field experiments demonstrate the potential of field complex resistivity method

Dafflon, B.

2013-01-01T23:59:59.000Z

232

Non-Intrusive Autonomic Approach with Self-Management Policies Applied to Legacy Infrastructures for Performance Improvements  

Science Conference Proceedings (OSTI)

The growing complexity of large IT facilities involves important time and effort costs to operate and maintain. Autonomic computing gives a new approach in designing distributed architectures that manage themselves in accordance with high-level objectives. ... Keywords: Autonomic Computing, Distributed, Grid, Legacy, Performance, Policies

Rémi Sharrock; Thierry Monteil; Patricia Stolf; Daniel Hagimont; Laurent Broto

2011-01-01T23:59:59.000Z

233

Long-term biobarriers to plant and animal intrusions of uranium tailings. [24% trifluralin, 18% carbon black, and 58% polymer  

SciTech Connect

The objective of this project was to develop and evaluate the effectiveness of physical and chemical barriers designed to prevent plant and animal breachment of uranium mill tailings containment systems for an extended period of time. A polymeric carrier/biocide delivery system was developed and tested in the laboratory, greenhouse and field. A continuous flow technique was established to determine the release rates of the biocides from the PCD systems; polymeric carrier specifications were established. Studies were conducted to determine effective biocide concentrations required to produce a phytotoxic response and the relative rates of phytotoxin degradation resulting from chemical and biological breakdown in soils. The final PCD system developed was a pelletized system containing 24% trifluralin, 18% carbon black and 58% polymer. Pellets were placed in the soil at the Grand Junction U-tailings site at one in. and two in. intervals. Data obtained in the field determined that the pellets released enough herbicide to the soil layer to stop root elongation past the barrier. Physical barriers to subsurface movement of burrowing animals were investigated. Small crushed stone (1 to 1 1/2 in. diameter) placed over asphalt emulsion and multilayer soil seals proved effective as barriers to a small mammal (ground squirrels) but were not of sufficient size to stop a larger animal (the prairie dog). No penetrations were made through the asphalt emulsion or the clay layer of the multilayer soil seals by either of the two mammals tested. A literature survey was prepared and published on the burrowing habits of the animals that may be found at U-tailings sites.

Cline, J.F.; Burton, F.G.; Cataldo, D.A.; Skiens, W.E.; Gano, K.A.

1982-09-01T23:59:59.000Z

234

High-resolution subsurface imaging and neural network recognition: Non-intrusive buried substance location. Final report  

SciTech Connect

A high-frequency, high-resolution electromagnetic (EM) imaging system has been developed for environmental geophysics surveys. Some key features of this system include: (1) rapid surveying to allow dense spatial sampling over a large area, (2) high-accuracy measurements which are used to produce a high-resolution image of the subsurface, (3) measurements which have excellent signal-to-noise ratio over a wide bandwidth (31 kHz to 32 MHz), (4) elimination of electric-field interference at high frequencies, (5) large-scale physical modeling to produce accurate theoretical responses over targets of interest in environmental geophysics surveys, (6) rapid neural network interpretation at the field site, and (7) visualization of complex structures during the survey. Four major experiments were conducted with the system: (1) Data were collected for several targets in our physical modeling facility. (2) The authors tested the system over targets buried in soil. (3) The authors conducted an extensive survey at the Idaho National Engineering Laboratory (INEL) Cold Test Pit (CTP). The location of the buried waste, category of waste, and thickness of the clay cap were successfully mapped. (4) The authors ran surveys over the acid pit at INEL. This was an operational survey over a hot site. The interpreted low-resistivity region correlated closely with the known extent of the acid pit.

Sternberg, B.K.; Poulton, M.M.

1997-01-26T23:59:59.000Z

235

Wiberg: The Santa Rita Village Mortuary Complex (CA-ALA-413): Evidence and Implications of a Meganos Intrusion  

E-Print Network (OSTI)

does not critically evaluate the merit of the Meganos hypothesis, the meaning of observed differences between CA-ALA-413

Fenenga, Gerrit L

1994-01-01T23:59:59.000Z

236

Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development  

E-Print Network (OSTI)

ApplianceAppliance Features . . . . . . . . . . .data with 7 different appliances . . . . . . . . . . . . . .

Balakrishnan, Vikram

2013-01-01T23:59:59.000Z

237

Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development  

E-Print Network (OSTI)

of the appliances, we generate a lookup table containing thethe closest appliance feature in the lookup table. In other

Balakrishnan, Vikram

2013-01-01T23:59:59.000Z

238

Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis  

E-Print Network (OSTI)

Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

Luo, Dong, 1966-

2001-01-01T23:59:59.000Z

239

Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California  

E-Print Network (OSTI)

and sills of the western Karoo, South Africa. S. Afr. J.and sills of the western Karoo, South Africa. S. Afr. J.vent complexes in the Karoo Basin, South Africa. J. Geol.

Kluesner, Jared W.

2011-01-01T23:59:59.000Z

240

Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2012 Annual Report  

SciTech Connect

Progress in the second year of this project is described by the series of technical reports and manuscripts that make up the content of this report. These documents summarize successes in our goals to develop our robust image-hash templating and material-discrimination techniques and apply them to test image data.

Jarman, Kenneth D.; McDonald, Benjamin S.; Robinson, Sean M.; Gilbert, Andrew J.; White, Timothy A.; Pitts, W. Karl; Misner, Alex C.; Seifert, Allen

2012-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway 1  

E-Print Network (OSTI)

United States Department of Transportation, Federal Highway Administration. The contents of this report reflect the views of the authors who are responsible for the facts and the accuracy of the data presented herein. The contents do not necessarily reflect the official views or policies of the State of California. This report does not constitute a standard, specification, or regulation. Report for MOU 3005

Harry H. Cheng; Ben Shaw; Joe Palen; Bin Lin; Xudong Hu; Bo Chen; Jason Parks; Harry H. Cheng; Ben Shaw; Joe Palen; Bin Lin; Xudong Hu; Bo Chen; Jason Parks

2000-01-01T23:59:59.000Z

242

Monitoring CO2 intrusion and associated geochemical transformations in a shallow groundwater system using complex electrical methods  

E-Print Network (OSTI)

three-dimensional electrical resistivity tomography: Field-Archie, G. E. , The electrical resistivity log as an aid inResults show that electrical resistivity and phase responses

Dafflon, B.

2013-01-01T23:59:59.000Z

243

Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California  

E-Print Network (OSTI)

drilling results found extensive evidence of sill-driven fluid-Drilling results confirmed (Kastner, 1982) that vertical discharge hydrothermal fluids

Kluesner, Jared W.

2011-01-01T23:59:59.000Z

244

Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California  

E-Print Network (OSTI)

whom I can bounce ideas. Sandy will always be a close friendwhile the reflector-rich sandy units were being deposited,several 2-3 cm thick basal sandy silt layers found in the

Kluesner, Jared W.

2011-01-01T23:59:59.000Z

245

Fiskenaesset Anorthosite Complex: Stable isotope evidence for shallow emplacement into Archean ocean crust  

DOE Green Energy (OSTI)

Oxygen and hydrogen isotope ratios indicate that unusual rocks at the upper contact of the Archean Fiskenaesset Anorthosite Complex at Fiskenaesset Harbor (southwest Greenland) are the products of hydrothermal alteration by seawater at the time of anorthosite intrusion. Subsequent granulite-facies metamorphism of these Ca-poor and Al- and Mg-rich rocks produced sapphirine- and kornerupine-bearing assemblages. Because large amounts of surface waters cannot penetrate to depths of 30 km during granulite-facies metamorphism, the isotopic signature of the contact rocks must have been obtained prior to regional metamorphism. The stable isotope and geochemical characteristics of the contact rocks support a model of shallow emplacement into Archean ocean crust for the Fiskenaesset Anorthosite Complex. 45 refs., 3 figs., 2 tabs.

Peck, W.H.; Valley, J.W. [Univ. of Wisconsin, Madison, WI (United States)] [Univ. of Wisconsin, Madison, WI (United States)

1996-06-01T23:59:59.000Z

246

Evolution of the Geysers (US) - Data From Fluid-Inclusion Microthermometry and Gas Geochemistry  

DOE Green Energy (OSTI)

The Geysers, California, is the site of an active hydrothermal system that initially developed between about 1.5 and 2 Ma in response to intrusion of a hypabyssal granitic pluton. Mineralogic and fluid-inclusion data demonstrate that the present vapor-dominated regime evolved from an earlier and more extensive, liquid-dominated hydrothermal system. Circulation of these early fluids produced veins characterized by tourmaline and/or biotite {+-} actinolite {+-} clinopyroxene within the pluton and adjacent biotite-rich hornfels, actinolite {+-} ferroaxinite {+-} epidote, and epidote {+-} chlorite {+-} wairakite within the intermediate parts of the thermal system, and calcite in the outer parts. Potassium feldspar and quartz are present in all assemblages. Maximum pressure-corrected homogenization temperatures and apparent salinities of fluid-inclusions in these veins range from 440 C and 44 weight percent NaCl equivalent within the hornfels (<600 m from the pluton) to 325 C and 5 weight percent NaCl equivalent at approximately 1500 m from the intrusion. We suggest that the shallow, moderate-salinity fluids are crustal waters modified by water-rock interactions and that the high-salinity fluids are magmatic brines. The formation of vapor-dominated conditions is reflected in the abrupt appearance of low salinity (0.0 to 0.4 weight percent NaCl equivalent) fluid inclusions with homogenization temperatures near 265 C. These inclusion fluids are thought to represent steam condensate formed as the liquid-dominated system boiled off.

Moore, J.N.; Hulen, J.B.; Norman, D.I.

1995-01-01T23:59:59.000Z

247

Most of this book has been concemed with horizontal linkages in plant and animal assemblages. In other words, patterns of species richness (Chapter 8),  

E-Print Network (OSTI)

similar. As an example, #12;I 11 Snails 12 Garter snake 3 Redw~ngrdblackbird Bronze grocklo Song sparrow f

Gotelli, Nicholas J.

248

The artifact assemblage from the Pepper Wreck: an early seventeenth century Portuguese East-Indiaman that wrecked in the Tagus River  

E-Print Network (OSTI)

Almost four hundred years after the wrecking of the Portuguese East-Indiaman Nossa Senhora dos Martires in 1606, excavations were begun at Sao Juliao de Barra by the Centro Nacional de Arqueologia Nautica e Subaquatica (CNANS). The 1996-1998 field seasons yielded thousands of individual artifacts from the wreck that is almost certainly Martires, today known as the Pepper Wreck. These items represent the remains of one of the first archaeologically excavated Portuguese East Indiamen to date. Even after an immediate contemporary salvage effort and four hundred years in a heavy surge zone, the remains of the Pepper Wreck are extensive in their size (large portions of the ship's hull survived) and variety. The range of artifacts recovered includes some of the ship's navigational instruments, Asian trade goods such as pepper and porcelain dishes, and personal items. Other materials recovered include everything from modern signage and trash to hundreds of ceramic sherds and balls of lead shot. The collection was found in varying states of preservation, from pristine to unrecognizable, depending on the amount of protection received on the site. This thesis will focus on the artifacts that were originally carried aboard the Pepper Wreck. The area containing the wreck site is in a location that has been the site of numerous shipwrecks from all time periods. Subsequently, all manner of objects were collected from the bottom during the CNANS excavation. Therefore, the main portion of the thesis will only focus on artifacts that can be linked with the Pepper Wreck. This thesis contains a broad historical background of the trade routes traversed by the Portuguese, along with more specific historical and practical research concerning the particular artifacts themselves. These artifacts will be grouped into the following categories: navigational instruments, porcelains, pewter ware, and a miscellaneous category (for items ranging from Asian stonewares to a Japanese sword guard or tsuba). This thesis will strive to place this mix of trade and personal goods into the historical context of the Portuguese Empire at the turn of the seventeenth century.

Brigadier, Sara R

2002-01-01T23:59:59.000Z

249

Le complexe Djruchula-Koudaro au sud Caucase (Gorgie). Remarques sur les assemblages lithiques plistocnes de Koudaro I, Tsona et Djruchula  

E-Print Network (OSTI)

movements from neighbouring areas. KEy wORDs: Georgia ­ Caucasus ­ Acheulian ­ middle Paleolithic ­ Laminar ­ Caucase ­ Acheuléen ­ Paléolithique moyen ­ Débitage laminaire AbsTRACT: Georgia yielded numerous middle of the Great Caucasus barrier. several cultural groups are based on local technical trends or on behaviours

Paris-Sud XI, Université de

250

Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils  

E-Print Network (OSTI)

Puerto Rico. Isotope tracers were utilized in vitro to enable the simultaneous quantification of CH 4 production and consumptionPuerto Rico. Isotope tracers were utilized in vitro to enable the simultaneous quantification of CH 4 production and consumptionPuerto Rico; r = 0.817, p Epilogue Until recently, microorganisms have unequivocally dominated land and ocean biogeochemical dynamics in addition to production and consumption

Blazewicz, Steven Joseph

2012-01-01T23:59:59.000Z

252

DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA  

Science Conference Proceedings (OSTI)

Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

2010-12-02T23:59:59.000Z

253

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

E-Print Network (OSTI)

Evaluation and mitigation of landfill gas impacts on cadmium325 Landfill Gasgroundwater flow paths. 5.2 Landfill Gas Impacts McGrath et

Birkholzer, Jens

2008-01-01T23:59:59.000Z

254

Non-intrusive measurement of particle charge: Electrostatic dry coal cleaning. Technical progress report No. 8, April 1, 1993--June 30, 1993  

SciTech Connect

As we reported in the Technical Progress Report No. 7, there are surges of electric current in the charging loop during triboelectrification of all particles. A high speed data acquisition and analysis system was developed to monitor and record the current pattern. There is no known report on such charge-discharge surges in the literature. The mechanism for it is yet to be understood. The on-line computerized electric current measurement also leads to an observation of charging effects as a function of particle feeding rate. It is shown that feed rate greatly alters particle charge. Such an effect is mostly overlooked by researchers and it could have a important role in process design where the feed rate would be maximized. The initial results for coal and mineral particles demonstrated that the average charge was lower when the feed rate was increased. Further investigation is scheduled to identify potential controlling factors, eg, the solid volume fraction and particle number density could be important process factors. The study of charging velocity and particle size was continued. It was found that particle charge was linearly dependent on the charging velocity for all samples investigated. However, the slope of this linear dependence varied for particles having different diameters. In addition, the charge-velocity relationships were dependent on feeding rates. Hence, the data discussed below include these interrelationships.

1993-09-01T23:59:59.000Z

255

Tectogenesis of the rocks surrounding the Winnsboro intrusive complex and reconnaissance and petrography of the Pageland pluton; South Carolina Geothermal Program Final Report  

DOE Green Energy (OSTI)

Major post-tectonic plutons of the easternmost Piedmont in the southern Appalachians have been of primary interest because of their high radiogenic heat production. Such heat production comes from a linear map trend including the Winnsboro, Liberty Hill, Pageland, and Lilesville plutons which parallel the proposed eastern Piedmont Fault system of Hatcher and others (1977). This study, in examining regional versus contact metamorphism and crosscutting relationships between the Winnsboro and Pageland complexes and the major folds and mylonitic zones of this area, provides a relative time framework for the tectonic and plutonic events.

Bourland, W.C.; Farrar, S.S.

1978-09-29T23:59:59.000Z

256

Copepod diversity and composition as indicators of intrusion of the Kuroshio Branch Current into the northern Taiwan Strait in spring 2000  

E-Print Network (OSTI)

TS Chiu. 1998. Copepod diversity in the water mass- es ofof species) and (b) diversity (Shannon s index) at each sam-43(2): 393-403 (2004) Copepod Diversity and Composition as

Hsieh, Chih-hao H; Chiu, T S; Shih, C T

2004-01-01T23:59:59.000Z

257

INEL cold test pit demonstration of improvements in information derived from non-intrusive geophysical methods over buried waste sites. Phase 1, Final report  

SciTech Connect

The objectives of this research project were to lay the foundation for further improvement in the use of geophysical methods for detection of buried wastes, and to increase the information content derived from surveys. Also, an important goal was to move from mere detection to characterization of buried wastes. The technical approach to achieve these objectives consisted of: (1) Collect a data set of high spatial density; (2) Acquire data with multiple sensors and integrate the interpretations inferred from the various sensors; (3) Test a simplified time domain electromagnetic system; and (4) Develop imaging and display formats of geophysical data readily understood by environmental scientists and engineers. The breadth of application of this work is far reaching. Not only are uncontrolled waste pits and trenches, abandoned underground storage tanks, and pipelines found throughout most US DOE facilities, but also at military installations and industrial facilities. Moreover, controlled land disposal sites may contain ``hot spots`` where drums and hazardous material may have been buried. The technologies addressed by the R&D will benefit all of these activities.

Not Available

1993-09-08T23:59:59.000Z

258

Mechanical design of PlayLamp : a minimally intrusive device for recording the behavior of children at-risk of developmental disorders  

E-Print Network (OSTI)

This thesis paper documents the design process, decisions, and outcomes of the design of the physical form factor of PlayLamp, a device for video and audio recording the development of children at-risk of having developmental ...

Steger, Stephen Andrew

2008-01-01T23:59:59.000Z

259

ER-12-1 completion report  

SciTech Connect

The objective of drillhole ER-12-1 was to determine the hydrogeology of paleozoic carbonate rocks and of the Eleana Formation, a regional aquitard, in an area potentially downgradient from underground nuclear testing conducted in nearby Rainier Mesa. This objective was addressed through the drilling of well ER-12-1 at N886,640.26 E640,538.85 Nevada Central Coordinates. Drilling of the 1094 m (3588 ft) well began on July 19, 1991 and was completed on October 17, 1991. Drilling problems included hole deviation and hole instability that prevented the timely completion of this borehole. Drilling methods used include rotary tri-cone and rotary hammer drilling with conventional and reverse circulation using air/water, air/foam (Davis mix), and bentonite mud. Geologic cuttings and geophysical logs were obtained from the well. The rocks penetrated by the ER-12-1 drillhole are a complex assemblage of Silurian, Devonian, and Mississippian sedimentary rocks that are bounded by numerous faults that show substantial stratigraphic offset. The final 7.3 m (24 ft) of this hole penetrated an unusual intrusive rock of Cretaceous age. The geology of this borehole was substantially different from that expected, with the Tongue Wash Fault encountered at a much shallower depth, paleozoic rocks shuffled out of stratigraphic sequence, and the presence of an altered biotite-rich microporphyritic igneous rock at the bottom of the borehole. Conodont CAI analyses and rock pyrolysis analyses indicate that the carbonate rocks in ER-12-1, as well as the intervening sheets of Eleana siltstone, have been thermally overprinted following movement on the faults that separate them. The probable source of heat for this thermal disturbance is the microporphyritic intrusion encountered at the bottom of the hole, and its age establishes that the major fault activity must have occurred prior to 102.3+0.5 Ma (middle Cretaceous).

Russell, C.E.; Gillespie, D.; Cole, J.C.; Drellack, S.L. [and others

1996-12-01T23:59:59.000Z

260

6 FIELD MEASUREMENT METHODS AND INSTRUMENTATION 6.1 Introduction  

E-Print Network (OSTI)

, M. Izquierdo, X. Querol, Complex nanominerals and ultrafine particles assemblages in phosphogypsum

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The Tiwi geothermal reservoir: Geology, geochemistry, and response to production  

Science Conference Proceedings (OSTI)

The Tiwi geothermal field is located on the Bicol Peninsula of Southern Luzon in the Philippines. The field is associated with the extinct Quaternary stratovolcano Mt. Malinao, one of a chain of volcanos formed as a result of crustal subduction along the Philippine Trench to the east. The geothermal reservoir is contained within a sequence of interlayered andesite flows and pyroclastic deposits that unconformably overlie a basement complex of marine sediments, metamorphic, and intrusive rocks. In its initial state, the Tiwi reservoir was an overpressured liquid-filled system containing near-neutral sodium chloride water at temperatures exceeding 260{degree}C. The reservoir is partially sealed at its top and sides by hydrothermal argillic alteration products and calcite deposition. Isolated portions of the reservoir contain a corrosive acid chloride-sulfate water associated with a distinctive advanced argillic mineral assemblage. Withdrawal of fluid for electricity generation has caused widespread boiling in the reservoir and the formation of steam zones. The resultant solids deposition in wellbores and near-wellbore formation has been mitigated by a combination of mechanical and chemical well stimulation. Mass withdrawal from the reservoir has also caused invasion of cold groundwater into the reservoir through former fluid outflow channels. During 1983-1987, several wells were flooded with cold water and ceased flowing. In response, PGI moved development drilling west to largely unaffected areas and undertook recompletion and stimulation programs. These programs effectively halted the decline in generation by 1988.

Hoagland, J.R.; Bodell, J.M. (Unocal Geothermal Div., Santa Rosa, CA (USA))

1990-06-01T23:59:59.000Z

262

Detection and Analysis of Threatsto the Energy Sector (DATES) May 2008  

Energy.gov (U.S. Department of Energy (DOE))

A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis.

263

Fish Populations in and around the San Diego-La Jolla Ecological Reserve  

E-Print Network (OSTI)

P.K. Dayton. 2002. The near-shore fish assemblage of the SanCharacterizing the nearshore fish assemblage of the Scrippsat both sites. Table 1. Mean fish densities (number of fish

Hastings, Phil

2009-01-01T23:59:59.000Z

264

Contrib Mineral Petrol (1984) 87:337-350 Contributions to  

E-Print Network (OSTI)

-talc-corundum-chlorite assemblage that was stable during an early stage in the metamorphic cycle and subsequently armored

Sandiford, Mike

265

The Propagation of Gravity Currents along Continental Shelves  

Science Conference Proceedings (OSTI)

An analytical method for computing the speed at which the nose of a light (rotating) intrusion advances along a continental shelf is proposed. The nonlinear model includes two active layer; the intrusion itself, which occupies the entire shelf (...

Doron Nof; Stephen Van Gorder

1988-03-01T23:59:59.000Z

266

Mesoscale Currents on the Inner New Jersey Shelf Driven by the Interaction of Buoyancy and Wind Forcing  

Science Conference Proceedings (OSTI)

Shipboard hydrographic and acoustic Doppler current profiler surveys conducted in August 1996 on the New Jersey inner shelf revealed a buoyant intrusion advancing southward along the coast. This buoyant intrusion originated from the Hudson ...

Alexander E. Yankovsky; Richard W. Garvine; Andreas Münchow

2000-09-01T23:59:59.000Z

267

Special Publication 800-12: Chapter EIGHTEEN - Printable ...  

Science Conference Proceedings (OSTI)

... need that access to accomplish their job. ... T. "Automated Audit Trail Analysis for Intrusion ... System administrators conducting such monitoring might ...

268

Focusing on the Criminal Threats  

Science Conference Proceedings (OSTI)

... for intrusion detection and response which includes the fusion of information from the CERT, law enforcement, counterintelligence and intelligence ...

1999-10-27T23:59:59.000Z

269

NIST SP 800-116, A Recommendation for the Use of PIV ...  

Science Conference Proceedings (OSTI)

... functions include area protection, intrusion detection, monitoring and tracking ... Biometric readers, especially unattended readers in an Unrestricted ...

2012-02-09T23:59:59.000Z

270

URANIUM IN ALKALINE ROCKS  

E-Print Network (OSTI)

combine to indicate uranium enrichment of an alkaline magma.uranium, the Ilfmaussaq intrusion contains an unusually high enrichment

Murphy, M.

2011-01-01T23:59:59.000Z

271

Learning Optimal Threshold on Resampling Data to Deal with Class Imbalance  

E-Print Network (OSTI)

, such as credit card fraud detection, intrusion detection, oil-spill detection, disease diagnosis, and many other

Schmidt-Thieme, Lars

272

A fast pattern matching algorithm with multi-byte search unit for high-speed network security  

Science Conference Proceedings (OSTI)

A signature-based intrusion detection system identifies intrusions by comparing the data traffic with known signature patterns. In this process, matching of packet strings against signature patterns is the most time-consuming step and dominates the overall ... Keywords: Network intrusion detection system, Pattern matching algorithm, The L+1-MWM algorithm, The MWM algorithm

Yoon-Ho Choi; Moon-Young Jung; Seung-Woo Seo

2011-09-01T23:59:59.000Z

273

Discovery and prevention of attack episodes by frequent episodes mining and finite state machines  

Science Conference Proceedings (OSTI)

This paper proposes a framework that applies frequent episode rules, implemented by finite state machines (FSMs), to design a real-time network-based intrusion prevention system (NIPS) for Probe/Exploit (hacking) intrusion. This type of Probe/Exploit ... Keywords: Finite state machines (FSMs), Firewall, Frequent episode rules, Honeypot, Network security, Network-based intrusion prevention system (NIPS)

Ming-Yang Su

2010-03-01T23:59:59.000Z

274

NetHost-sensor: Monitoring a target host's application via system calls  

Science Conference Proceedings (OSTI)

Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may employ ... Keywords: Application security, Dynamic link libraries, Host, Intrusion detection, Network, System calls

A. A. Abimbola; J. M. Munoz; W. J. Buchanan

2006-01-01T23:59:59.000Z

275

Installation and Operation Manual for TIAA v0.3 1 Introduction  

E-Print Network (OSTI)

Installation and Operation Manual for TIAA v0.3 Yiquan Hu 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Cor- relator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion alerts reported by IDSs. Some

Ning, Peng

276

An adaptive architecture of applying vulnerability analysis to IDS alerts  

Science Conference Proceedings (OSTI)

With increasing intrusions and attacks on the Internet, there is an urgent need to develop techniques for network security. Current standalone network security products, such as the firewall systems, the Intrusion Detection System (IDS), the anti-virus ... Keywords: alert, intrusion detection, network security, predicate-based evaluation, vulnerability analysis

Xuejiao Liu; Xin Zhuang; Debao Xiao

2008-07-01T23:59:59.000Z

277

Learning DFA representations of HTTP for protecting web applications  

Science Conference Proceedings (OSTI)

Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using intrusion detection is challenging, especially when autonomy is required ... Keywords: Anomaly intrusion detection, Finite automata induction, Web server security

Kenneth L. Ingham; Anil Somayaji; John Burge; Stephanie Forrest

2007-04-01T23:59:59.000Z

278

A RADIOLARIAN ANALYSIS OF THE MONTEREY FORMATION: PALEOCEANOGRAPHIC RECONSTRUCTIONS OF THE NEOGENE CALIFORNIA CURRENT SYSTEM (PACIFIC OCEAN) .  

E-Print Network (OSTI)

??Neogene radiolarian assemblages were examined from California, the offshore waters, and adjacent areas. Three time plans, 10, 8, and 5 Ma, were selected for study… (more)

[No author

1985-01-01T23:59:59.000Z

279

Marine Communities of North Sea Offshore Platforms, and the Use of Stable Isotopes to Explore Artificial Reef Food Webs.  

E-Print Network (OSTI)

??Stable isotope methods offer a powerful means of investigating trophic interactions, allowing assessment of the relative importance of multiple nutrient sources to biological assemblages, as… (more)

Guerin, Andrew James

2009-01-01T23:59:59.000Z

280

Species composition and abundance of the fishes at offshore petroleum platforms on the San Pedro Shelf, Southern California.  

E-Print Network (OSTI)

?? Research examining fish assemblages associated with offshore petroleum platforms in the Santa Barbara Channel (SBC) have indicated an ecological importance of these structures; however,… (more)

Martin, Christopher J. B.

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Program on Technology Innovation: Security Technology Evaluation for New Nuclear Power Plants  

Science Conference Proceedings (OSTI)

This report provides a summary of the state-of-the-art technologies available for perimeter surveillance and intrusion detection systems. These technologies are applicable to the planning and implementation of security measures for the next generation of nuclear power plants. In the absence of intelligence information, the first indication of a potential attack would be from an intrusion into a facility. This intrusion would be detected by a properly designed and deployed perimeter security system. The a...

2007-10-22T23:59:59.000Z

282

Bio-optical profiling floats as new observational tools for biogeochemical and ecosystem studies: Potential synergies with ocean color remote sensing  

E-Print Network (OSTI)

of two main kinds of bio-optical models of primaryof statistical biogeochemical/bio- optical trends, withusing a non intrusive bio-optical method. Biogeosciences, 4,

Claustre, H.

2010-01-01T23:59:59.000Z

283

NIST Sealants  

Science Conference Proceedings (OSTI)

... damage from bulk water intrusion based on failed building sealant is a major cause of the $65B/yr spent by American homeowners to repair their ...

2012-12-03T23:59:59.000Z

284

RoboChair  

Science Conference Proceedings (OSTI)

... a typical home – WCD's and/or homeowners don't want the home changed due to costs and intrusive changes, or even ...

2012-09-08T23:59:59.000Z

285

Carbon Dioxide Emissions From Vegetation-Kill Zones Around The...  

Open Energy Info (EERE)

of Long Valley caldera California was performed to evaluate the premise that gaseous and thermal anomalies are related to renewed intrusion of magma. Some kill sites are...

286

Geophysical Setting of the Blue Mountain Geothermal Area, North...  

Open Energy Info (EERE)

a prominent crustal-scale fracture interpreted from total intensity aeromagnetic and gravity data. Aeromagnetic data indicate that this feature is related to the intrusion of...

287

Standoff Detection of Chemicals Using Rydberg Fingerprint ...  

applied for non-intrusive detection of combustion intermediates. The technique can be applied to detection of chemical vapors as well as residues on ...

288

WASTEWATER TREATMENT IN THE OIL SHALE INDUSTRY  

E-Print Network (OSTI)

steam, and groundwater intrusion during oil shale retorting: retort water and gas condensate.Steam Stripping of Occi- dental petroleum Retort No. 6 Gas Condensate,

Fox, J.P.

2010-01-01T23:59:59.000Z

289

Sustaining Sherman Island: A Water Management and Agricultural Diversification System  

E-Print Network (OSTI)

intrusion, and ongoing subsidence are current threats todisasters by reversing subsidence and stabilizing levees,must be made to reverse subsidence, stabilize the fragile

Fischer, Richard

2011-01-01T23:59:59.000Z

290

Enterprise Information Security Management Framework [EISMF  

E-Print Network (OSTI)

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

291

Hampden Kuhns  

NLE Websites -- All DOE Office Websites (Extended Search)

Hampden Kuhns Director Division of Atmospheric Science Desert Research Institute hkuhns@dri.edu This Speaker's Seminars Non-Intrusive Load Monitoring - Recent Advances and Existing...

292

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers, industry partners, and academia from the Cybersecurity for...

293

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

294

Status of Nuclear Energy Programs In the United States  

Science Conference Proceedings (OSTI)

Enhanced fuel properties ... Mission: Develop advanced fuels and non-intrusive reactor system components (e.g. .... Could replace aging fossil plants – provide.

295

ASSESSMENT OF ABORIGINAL SMALLHOLDER SOILS FOR  

E-Print Network (OSTI)

interbed- ded shales, and granitic intrusions. Tointerbedded tuffs and shales of the same age. The Mendoi-terraces, the quartzite and shale-derived soils on the high

Kurt A. Schwabe

2006-01-01T23:59:59.000Z

296

Industrial Ecology and Metal Production - TMS  

Science Conference Proceedings (OSTI)

Jul 2, 2008 ... Topic Title: Powerpoint: Industrial Ecology and Metal Production Topic Summary: Metal extraction is on the the most Earth-intrusive industrial ...

297

Generalized Role-Based Access Control for Securing Future ...  

Science Conference Proceedings (OSTI)

... make it very easy for a home- owner to define ... home; otherwise, it is likely the homeowner will not ... and non-intrusive, or many homeowners will sim ...

2000-11-03T23:59:59.000Z

298

Watching the watchdogs : assessing a First Amendment claim against the government's use of national security letters to track journalists' newsgathering activities.  

E-Print Network (OSTI)

??The FBI's use of National Security Letters (NSLs) to secretly demand customer records from communications providers in terrorism-related investigations has been criticized as an intrusion… (more)

Hoppenjans, Lisa.

2010-01-01T23:59:59.000Z

299

More information - Vulnerability Assessment Team - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

We've devised fundamentally new approaches to tamper detection, intrusion detection, nuclear safeguards and cargo security. Team members have won numerous awards, including: 2013...

300

ANL-W EM Report.pmd  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

actions based on event-specific criteria, such as type of release (short or long term), weather conditions (clear or snowing), and building integrity against air intrusion, are...

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Idaho National Laboratory - Technology Transfer - Technologies ...  

... developed a portal-style concealed weapons detection system that uses passive magnetic sensors. The system provides a non-intrusive method for rapid detection, ...

302

Public-Private Technology R&D Partnerships: Lessons from US Partnership for a New Generation of Vehicles  

E-Print Network (OSTI)

would obviate battery electric cars and intrusive governmentfor instance, GM's EV1 electric car (unveiled as the Impactand away from electric cars that use ultracapa- citors and

Sperling, Daniel

2001-01-01T23:59:59.000Z

303

Public-private technology R&D partnerships: lessons from US partnership for a new generation of vehicles  

E-Print Network (OSTI)

would obviate battery electric cars and intrusive governmentfor instance, GM's EV1 electric car (unveiled as the Impactand away from electric cars that use ultracapa- citors and

Sperling, Dan

2001-01-01T23:59:59.000Z

304

NIST Manuscript Publication Search  

Science Conference Proceedings (OSTI)

... at evaluating the ability of vents to resist firebrand intrusion into attic and crawl ... and air is pulled through the vent using a fan placed downstream. ...

2010-01-25T23:59:59.000Z

305

An Oxygen Isotope Study Of Hydrothermal Alteration In The Lake...  

Open Energy Info (EERE)

they are also typically intensely mineralogically altered. (3) The resurgent intrusive stock and its contact metamorphic aureole of hornfels both experienced waterrock ratios...

306

Understanding the Role of Automated Response Actions in ...  

Science Conference Proceedings (OSTI)

... and M. Alam, “Distributed intrusion detection system in a multi-layer network architecture of smart grids,” IEEE Transactions on Smart Grid, vol. ...

2012-05-04T23:59:59.000Z

307

Gas-path leakage seal for a gas turbine  

DOE Patents (OSTI)

A gas-path leakage seal for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a gas turbine (such as combustor casing segments). The seal includes a generally imperforate foil-layer assemblage which is generally impervious to gas and is located in the leakage-gap. The seal also includes a cloth-layer assemblage generally enclosingly contacting the foil-layer assemblage. In one seal, the first edge of the foil-layer assemblage is left exposed, and the foil-layer assemblage resiliently contacts the first member near the first edge to reduce leakage in the "plane" of the cloth-layer assemblage under conditions which include differential thermal growth of the two members. In another seal, such leakage is reduced by having a first weld-bead which permeates the cloth-layer assemblage, is attached to the metal-foil-layer assemblage near the first edge, and unattachedly contacts the first member.

Wolfe, Christopher E. (Schenectady, NY); Dinc, Osman S. (Troy, NY); Bagepalli, Bharat S. (Schenectady, NY); Correia, Victor H. (New Lebanon, NY); Aksit, Mahmut F. (Troy, NY)

1996-01-01T23:59:59.000Z

308

Gas-path leakage seal for a gas turbine  

DOE Patents (OSTI)

A gas-path leakage seal is described for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a gas turbine (such as combustor casing segments). The seal includes a generally imperforate foil-layer assemblage which is generally impervious to gas and is located in the leakage-gap. The seal also includes a cloth-layer assemblage generally enclosingly contacting the foil-layer assemblage. In one seal, the first edge of the foil-layer assemblage is left exposed, and the foil-layer assemblage resiliently contacts the first member near the first edge to reduce leakage in the ``plane`` of the cloth-layer assemblage under conditions which include differential thermal growth of the two members. In another seal, such leakage is reduced by having a first weld-bead which permeates the cloth-layer assemblage, is attached to the metal-foil-layer assemblage near the first edge, and unattachedly contacts the first member. 4 figs.

Wolfe, C.E.; Dinc, O.S.; Bagepalli, B.S.; Correia, V.H.; Aksit, M.F.

1996-04-23T23:59:59.000Z

309

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams  

Science Conference Proceedings (OSTI)

In this paper, we present a method of handling the visualization of hetereogeneous event traffic that is generated by intrusion detection sensors, log files and other event sources on a computer network from the point of view of detecting multistage ... Keywords: attack tracks, intrusion detection, visualization

S. Mathew; R. Giomundo; S. Upadhyaya; M. Sudit; A. Stotz

2006-11-01T23:59:59.000Z

310

Simple, state-based approaches to program-based anomaly detection  

Science Conference Proceedings (OSTI)

This article describes variants of two state-based intrusion detection algorithms from Michael and Ghosh [2000] and Ghosh et al. [2000], and gives experimental results on their performance. The algorithms detect anomalies in execution audit data. One ... Keywords: Anomaly detection, finite automata, information system security, intrusion detection, machine learning

C. C. Michael; Anup Ghosh

2002-08-01T23:59:59.000Z

311

doi: 10.1130/GES00506.1 2010;6;211-224Geosphere  

E-Print Network (OSTI)

are common within doler- ite sill intrusions in the Karoo Basin in South Africa. The dikes are subvertical affected by mag- matic sill intrusions (i.e., volcanic basins), like the Karoo Basin in South breccias within sills in the Karoo Basin. However, the results can be applied to other sedimentary basins

Svensen, Henrik

312

Research paper Rock magnetic stratigraphy of a mafic layered sill  

E-Print Network (OSTI)

Research paper Rock magnetic stratigraphy of a mafic layered sill: A key to the Karoo volcanics intrusion and part of the Karoo Large Igneous Province in South Africa. This well-exposed intrusion consists reserved. Keywords: AMS; magnetic susceptibility; Karoo; Insizwa; gabbro 1. Introduction Studies of Large

Ferré, Eric

313

On scalable attack detection in the network  

Science Conference Proceedings (OSTI)

Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunately, even today, many IDS systems we know of keep per-connection or per-flow ... Keywords: data structures, denial of service, network attacks, routers, scanning, streaming algorithms, syn flooding

Ramana Rao Kompella; Sumeet Singh; George Varghese

2007-02-01T23:59:59.000Z

314

Automating cyber-defense management  

Science Conference Proceedings (OSTI)

Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. That success can largely be attributed to our use of a "survivability architecture", which refers to the organization of a set of concrete defense mechanisms ... Keywords: defense mechanisms, defense-enabling, intrusion-tolerance, survivability, survivability architecture

Partha Pal; Franklin Webber; Michael Atighetchi; Paul Rubel; Paul Benjamin

2008-04-01T23:59:59.000Z

315

EvoNILM: evolutionary appliance detection for miscellaneous household appliances  

Science Conference Proceedings (OSTI)

To improve the energy awareness of consumers, it is necessary to provide them with information about their energy demand, not just on the household level. Non-intrusive load monitoring (NILM) gives the consumer the opportunity to disaggregate their consumed ... Keywords: evolutionary algorithm, load disaggregation, non-intrusive load monitoring

Dominik Egarter; Wilfried Elmenreich

2013-07-01T23:59:59.000Z

316

Contactless sensing of appliance state transitions through variations in electromagnetic fields  

Science Conference Proceedings (OSTI)

Non-Intrusive Load Monitoring (NILM) is a promising technique for disaggregating per-appliance energy consumption in buildings from aggregate voltage/current measurements. One major limitation of the approach is that it typically requires a training ... Keywords: load tree analysis, non-intrusive load monitoring

Anthony Rowe; Mario Berges; Raj Rajkumar

2010-11-01T23:59:59.000Z

317

Interactive visualization for network and port scan detection  

Science Conference Proceedings (OSTI)

Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect ... Keywords: information visualization, intrusion detection, network scans, network security, port scans, user interfaces

Chris Muelder; Kwan-Liu Ma; Tony Bartoletti

2005-09-01T23:59:59.000Z

318

Intrinsically resilient energy control systems  

Science Conference Proceedings (OSTI)

To preserve critical energy control functions while under attack, it is necessary to perform comprehensive analysis on the root cause and impact of an ongoing cyber intrusion without sacrificing the availability of energy delivery. In this position paper, ... Keywords: cybersecurity, data integration, energy control system, intrusion-tolerant scada, knowledge base, ontology, root cause analysis, semantic annotation, situational awareness

Frederick Sheldon; Daniel Fetzer; David Manz; Jingshan Huang; Stuart Goose; Thomas Morris; Jiangbo Dang; Jonathan Kirsch; Dong Wei

2013-01-01T23:59:59.000Z

319

Development and Evaluation of a Dataset Generator Tool for Generating Synthetic Log Files Containing Computer Attack Signatures  

Science Conference Proceedings (OSTI)

A key requirement for experimental analysis in the areas of network intrusion and computer forensics is the availability of suitable datasets. However, the inherent security and privacy issues surrounding these disciplines have resulted in a lack of ... Keywords: Computer Forensics, Data Mining, Dataset Generator, Experimental Analysis, Intrusion Detection

Stephen O'Shaughnessy; Geraldine Gray

2011-04-01T23:59:59.000Z

320

MagmaHeatNS1D: One-dimensional visualization numerical simulator for computing thermal evolution in a contact metamorphic aureole  

Science Conference Proceedings (OSTI)

MagmaHeatNS1D is an IDL (Interactive Data Language) program that is aimed at numerically modeling heat transfer from an igneous intrusion to its host rocks and providing important thermal state information for minerals and organic matters in a contact ... Keywords: Contact metamorphism, Heat transfer model, Igneous intrusion, Maturation, Numerical simulation, Thermal evolution

Dayong Wang

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Microfossil zonation and correlation of nonmarine Triassic of southwestern United States  

Science Conference Proceedings (OSTI)

Recent studies of the nonmarine Triassic in New Mexico and adjacent states by the New Mexico Museum of Natural History have resulted in a data base that for the first allows the use of calcareous microfossils for zonation of the Moenkopi and Chinle formations. Three biostratigraphic assemblages have been recognized thus far: Moenkopi, lower Chinle, and upper Chinle. The Middle Triassic Moenkopi assemblage is characterized by the charophyte Porochara, uncoiled species of Spirorbis, and the presence of the ostracod genus Darwinuloides. The Upper Triassic lower Chinle assemblage is present in the lower shale member of the Chinle Formation. It is characterized by lacking a charophyte component and in containing an exceptionally large species of Darwinula. The upper Chinle assemblage is present in the upper shale and Redonda members of the Chinle Formation and in the Sloan Canyon Formation. It contains the charophyte Stellatochara, a diverse assemblage of darwinulid ostracods, the ostracod genus Lutkevichinella, and a generally coiled species of Spirorbis. These three microfossil assemblages contain several elements of apparent cosmopolitan distribution and should greatly facilitate long-range correlations. Initial correlations suggest the Moenkopi can be correlated with the middle Bundsandstein of Europe and the Lower Triassic of the Caspian depression of the Soviet Union. The lower Chinle assemblage appears to be restricted to the southwestern US with no known correlatives elsewhere. The upper Chinle assemblage contains elements in common with the middle and upper Keuper of Europe and the Upper Triassic Wayaobu Formation of Shaanxi, China. As more collections are made and studied, correlations with other Triassic assemblages should increase in refinement and utility. Additionally, the paleoecologic aspects of these assemblages should help greatly in refining Triassic paleoenvironmental interpretations.

Kietzke, K.K. (New Mexico Museum of Natural History, Albuquerque (USA))

1989-09-01T23:59:59.000Z

322

ISS Fact Sheet.cdr  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security System (ISS) Security System (ISS) Integrated Security System (ISS) A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Cyber Security for Energy Delivery Systems Electricity Delivery & Energy Reliability Project Lead: Siemens Corporate Research Partners: Rutgers University Idaho National Laboratory The Concept The Integrated Security System (ISS) is a security platform that provides multi- layered security features and intrusion detection at the field device, network, and control system levels. The ISS operates as part of the security layer that

323

Emergent patterns of diversity and dynamics in natural populations of planktonic Vibrio bacteria  

E-Print Network (OSTI)

Despite the importance of microorganisms for global and engineering processes, currently lacking is a theoretical framework to describe how the structure of a microbial assemblage translates an environmental condition into ...

Thompson, Janelle Renée, 1976-

2005-01-01T23:59:59.000Z

324

Oceanic Internal Waves Are Not Weak Waves  

Science Conference Proceedings (OSTI)

It is shown that the oceanic internal wave field is too energetic by roughly two orders of magnitude to be treated theoretically as an assemblage of weakly interacting waves. This may be seen both from recent weak wave theoretical calculations ...

Greg Holloway

1980-06-01T23:59:59.000Z

325

Gas-path leakage seal for a turbine  

DOE Patents (OSTI)

A gas-path leakage seal for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a turbine (such as combustor casing segments of a gas turbine). The seal includes a flexible and generally imperforate metal sheet assemblage having opposing first and second surfaces and two opposing raised edges extending a generally identical distance above and below the surfaces. A first cloth layer assemblage has a thickness generally equal to the previously-defined identical distance and is superimposed on the first surface between the raised edges. A second cloth layer assemblage is generally identical to the first cloth layer assemblage and is superimposed on the second surface between the raised edges. 5 figs.

Bagepalli, B.S.; Aksit, M.F.; Farrell, T.R.

1999-08-10T23:59:59.000Z

326

"Art is Love is God" : Wallace Berman and the Transmission of Aleph, 1956-66  

E-Print Network (OSTI)

In 1956 in Los Angeles, California, Wallace Berman, a Beat assemblage artist, poet and founder of Semina magazine, began to make a film. Over ten years, the film now known as Aleph became Berman's personal record, documenting ...

Behle, Chelsea Ryanne

2012-01-01T23:59:59.000Z

327

Gas-path leakage seal for a turbine  

SciTech Connect

A gas-path leakage seal for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a turbine (such as combustor casing segments of a gas turbine). The seal includes a flexible and generally imperforate metal sheet assemblage having opposing first and second surfaces and two opposing raised edges extending a generally identical distance above and below the surfaces. A first cloth layer assemblage has a thickness generally equal to the previously-defined identical distance and is superimposed on the first surface between the raised edges. A second cloth layer assemblage is generally identical to the first cloth layer assemblage and is superimposed on the second surface between the raised edges.

Bagepalli, Bharat Sampathkumaran (Niskayuna, NY); Aksit, Mahmut Faruk (Troy, NY); Farrell, Thomas Raymond (Simpsonville, SC)

1999-01-01T23:59:59.000Z

328

Molecular diversity and adaptations of microorganisms from the deep ocean  

E-Print Network (OSTI)

in the North Pacific ocean. ISME J. 3:1374-1386. DeLong, E.microbial assemblages in the ocean's interior. Science 311:J. 4:159-170. Schlitzer, R. 2010. Ocean Data View. [http://

Eloe, Emiley Ansley

2011-01-01T23:59:59.000Z

329

Technologies of the operator : engineering the pilot in the U.S. and Japan, 1930-1960  

E-Print Network (OSTI)

This study examines the assemblage of scientific knowledge, engineering practices, measuring instruments, and civilian and military institutions in the U.S. and Japan that went into the construction of the machine operator ...

Jeon, Chihyung

2010-01-01T23:59:59.000Z

330

Plant Species Distributions under Present Conditions and Forecasted for Warmer Climates in an Arid Mountain Range  

Science Conference Proceedings (OSTI)

Complex environmental gradients in the White and Inyo Mountains in eastern California produce striking variations in vegetation assemblages over short distances. Vegetation composition is dominated by elevational gradients of temperature and ...

Christopher M. Van de Ven; S. B. Weiss; W. G. Ernst

2007-07-01T23:59:59.000Z

331

Copyright 1999, Society of Petroleum Engineers Inc. This paper was prepared for presentation at the 1999 SPE Annual Technical Conference and  

E-Print Network (OSTI)

, and wood. The presence of a zeolite, phillipsite, indicates alteration of volcanic glass by seawater with a high content of volcanic glass and basalt fragments. The benthic foraminiferal assemblage within Unit

Backe, Knut

332

C A T A L O G Undergraduate  

E-Print Network (OSTI)

Vicente Wetland Project: Baseline Condition Report / David Menzie 65 Fish Assemblage Dynamics, and the pair set off for Mexico. They drove south to Louisiana and did some birding along the Gulf Coast before

Gelfond, Michael

333

Understanding invaded urban `wild lands' as novel communities  

E-Print Network (OSTI)

. Pechmann et al. Tuesday, August 5, 2008 - 2:10 PM COS 36-3: Vegetative assemblage distribution and long carbon sinks Human interface: Place for contact with nature and natural processes Spaces where natural

334

Topology optimization for the design of periodic microstructures composed of electromagnetic materials  

Science Conference Proceedings (OSTI)

Electromagnetic structures that incorporate certain structural periodicities are known to display special behavior when subjected to electromagnetic waves, and can be designed to have specific functions such as inhibiting the intrusion of electromagnetic ... Keywords: Electromagnetic field, Periodic boundary, Topology optimization

Tsuyoshi Nomura; Shinji Nishiwaki; Kazuo Sato; Koichi Hirayama

2009-02-01T23:59:59.000Z

335

Resilient Image Fusion  

Science Conference Proceedings (OSTI)

The paper describes a distributed spectral-screening PCT algorithm for fusing hyper-spectral images in remote sensing applications. The algorithm provides intrusion tolerance from information warfare attacks using the notion of computational resiliency. ...

Tiranee Achalakul; Joohan Lee; Stephen Taylor

2000-08-01T23:59:59.000Z

336

Detecting unknown network attacks using language models  

Science Conference Proceedings (OSTI)

We propose a method for network intrusion detection based on language models such as n-grams and words. Our method proceeds by extracting these models from TCP connection payloads and applying unsupervised anomaly detection. The essential part ...

Konrad Rieck; Pavel Laskov

2006-07-01T23:59:59.000Z

337

The Structure of Idealized Upper-Tropospheric Shear Lines  

Science Conference Proceedings (OSTI)

The structure of idealized two-dimensional shear lines has been calculated for specified tropopause potential temperature anomalies. A cold anomaly corresponds to an intrusion of stratospheric air into the troposphere. A balanced hydrostatic ...

Martin Juckes

1999-08-01T23:59:59.000Z

338

A Modeling Study of Hurricane Landfall in a Dry Environment  

Science Conference Proceedings (OSTI)

The effects of dry air intrusion on landfalling hurricanes are investigated using eight numerical simulations. The simulations differ in the initial amount of moisture in the storm core and its horizontal extent from the storm center. The storms ...

Sytske K. Kimball

2006-07-01T23:59:59.000Z

339

Turbulence in the California Undercurrent  

Science Conference Proceedings (OSTI)

Vertical profiles of microstructure velocity over the San Diego Trough showed enhanced levels of kinetic energy dissipation in the intrusive region between the California Undercurrent and the surface California Current. If the observed rate of ...

Hidekatsu Yamazaki; Rolf Lueck

1987-09-01T23:59:59.000Z

340

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

DOE-Funded Research Projects Win 39 R&D Awards for 2010 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

X-ray free electron laser energy monitor non-intrusively measures the energy of ultrahigh intensity X-ray pulses produced by revolutionary X-ray free electron lasers. Grating...

342

Observations of Persistent Mixing and Near-Inertial Internal Waves  

Science Conference Proceedings (OSTI)

Repeated profiles of microstructure and shear alongside a drogued buoy show a 10 m thick mixing zone at the same depth as a near-inertial feature. Because the profile was diffusively stable and free of thermohaline intrusions, internal wave ...

M. C. Gregg; E. A. D'Asaro; T. J. Shay; N. Larson

1986-05-01T23:59:59.000Z

343

Siberian gas venting and the end-Permian environmental crisis Henrik Svensen a,  

E-Print Network (OSTI)

through spectacular pipe structures with kilometre-sized craters. Dating of a sill intrusion by the U below the flood basalts is the most important factor in controlling whether a Large Igneous Provinces

Svensen, Henrik

344

Journal of the Geological Society, London, Vol. 163, 2006, pp. 671682. Printed in Great Britain. Structure and evolution of hydrothermal vent complexes in the Karoo Basin,  

E-Print Network (OSTI)

, formed at c. 183 Ma, is characterized by the presence of voluminous basaltic intrusive complexes within the Karoo Basin, extrusive lava sequences and hydrothermal vent complexes. These last are pipe

Svensen, Henrik

345

Monitoring Fine Sediment; Grande Ronde and John Day Rivers, 1999 Annual Report.  

DOE Green Energy (OSTI)

This project was initiated to monitor surface fine sediment levels and overwinter intrusion of fine sediment in spring chinook salmon spawning habitat in the North Folk John Day and Grande Ronde Rivers, for five years.

Rhodes, Jonathan J.; Greene, M. Jonas; Purser, Michael D. (Columbia River Inter-Tribal Fish Commission, Portland, OR)

2000-01-01T23:59:59.000Z

346

Information Model for Policy-Based Network Security Management  

Science Conference Proceedings (OSTI)

Policy Based Network Management (PBNM) for network security has been paid much attention as a solution to consistent and unified management of security systems including IDS (Intrusion Detection System) and Firewall. In this paper, we define NSPIM (Network ...

Sook-Yeon Kim; Myung-Eun Kim; Kiyoung Kim; Jongsoo Jang

2002-01-01T23:59:59.000Z

347

M-TOP: multi-target operator placement of query graphs for data streams  

Science Conference Proceedings (OSTI)

Nowadays, many applications processes stream-based data, such as financial market analysis, network intrusion detection, or visualization applications. To process stream-based data in an application-independent manner, distributed stream processing systems ...

Nazario Cipriani; Oliver Schiller; Bernhard Mitschang

2011-09-01T23:59:59.000Z

348

Realistic internet traffic simulation through mixture modeling and a case study  

Science Conference Proceedings (OSTI)

Internet background traffic modeling and simulation is the main challenge when constructing a test environment for network intrusion detection experiments. However, a realistic simulation of network traffic through analytical models is difficult, because ...

Song Luo; Gerald A. Marin

2005-12-01T23:59:59.000Z

349

The Nondeterministic Nature of Kuroshio Penetration and Eddy Shedding in the South China Sea  

Science Conference Proceedings (OSTI)

A ?°, 6-layer Pacific version of the Naval Research Laboratory Layered Ocean Model is used to investigate the nondeterministic nature of Kuroshio intrusion and eddy shedding into the South China Sea (SCS) on annual and interannual timescales. ...

E. Joseph Metzger; Harley E. Hurlburt

2001-07-01T23:59:59.000Z

350

A one-shot configurable-cache tuner for improved energy and performance  

Science Conference Proceedings (OSTI)

We introduce a new non-intrusive on-chip cache-tuning hardware module capable of accurately predicting the best configuration of a configurable cache for an executing application. Previous dynamic cache tuning approaches change the cache configuration ...

Ann Gordon-Ross; Pablo Viana; Frank Vahid; Walid Najjar; Edna Barros

2007-04-01T23:59:59.000Z

351

Modeling Turbulent Flow in an Urban Central Business District  

Science Conference Proceedings (OSTI)

The Realistic Urban Spread and Transport of Intrusive Contaminants (RUSTIC) model has been developed as a simplified computational fluid dynamics model with a k–? turbulence model to be used to provide moderately fast simulations of turbulent ...

Donald A. Burrows; Eric A. Hendricks; Steve R. Diehl; Robert Keith

2007-12-01T23:59:59.000Z

352

Urban Dispersion Modeling: Comparison with Single-Building Measurements  

Science Conference Proceedings (OSTI)

Two models have been developed to predict airflow and dispersion in urban environments. The first model, the Realistic Urban Spread and Transport of Intrusive Contaminants (RUSTIC) model, is a fast-running urban airflow code that rapidly ...

Steve R. Diehl; Donald A. Burrows; Eric A. Hendricks; Robert Keith

2007-12-01T23:59:59.000Z

353

Microsoft Word - MRCSP Wetlands FactSheet 09.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

of tidal marsh have been lost since the 1930's at Blackwater due to sea-level rise, subsidence, erosion, salt water intrusion, and herbivory by invasive species. Current tidal...

354

IPS: IDS or IPS: what is best?  

Science Conference Proceedings (OSTI)

Intrusion detection systems (IDS) have become one of the most common countermeasures in the network security arsenal. But while other technologies such as firewalls and anti-virus provide proactive protection, most current IDSs are passive; detection ...

Maria Papadaki; Steven Furnell

2004-07-01T23:59:59.000Z

355

Optimizing investments in cyber-security for critical infrastructure  

Science Conference Proceedings (OSTI)

Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making ...

Ike Patterson; James Nutaro; Glenn Allgood; Teja Kuruganti; David Fugate

2013-01-01T23:59:59.000Z

356

Exploiting heterogeneous multicore-processor systems for high-performance network processing  

Science Conference Proceedings (OSTI)

In this paper, we examine two network-processing appliances, i.e., the IBM Proventia® Network Intrusion Prevention System and the IBM WebSphere® DataPower® service-oriented architecture appliance, and the ...

H. Franke; T. Nelms; H. Yu; H. D. Achilles; R. Salz

2010-01-01T23:59:59.000Z

357

South China Sea Isopycnal-Surface Circulation  

Science Conference Proceedings (OSTI)

This paper investigates the seasonal variabilities of the South China Sea isopycnal-surface circulations and of the Kuroshio intrusion through the Luzon Strait using the U.S. Navy’s climatological temperature and salinity dataset (public domain) ...

Peter C. Chu; Rongfeng Li

2000-09-01T23:59:59.000Z

358

The nascent Coso metamorphic core complex, east-central California...  

Open Energy Info (EERE)

in the upper 5 km of the Mesozoic intrusive bedrock of the Coso Range. The Coso Wash fault and other late Pleistocene and Holocene normal faults in, and adjacent to, the...

359

Helicopter Observations of the Sea Breeze over a Coastal Area  

Science Conference Proceedings (OSTI)

Thermodynamical observations by a helicopter have been conducted to study the internal structure of the sea breeze blowing inland from Tosa Bay during three periods (September 1993, November 1994 and 1995). Inland-intrusion distances of the ...

Osamu Chiba; Fumiaki Kobayashi; Gen’ichi Naito; Koji Sassa

1999-04-01T23:59:59.000Z

360

Sequence pattern query processing over out-of-order event streams  

E-Print Network (OSTI)

Complex event processing has become increasingly important in modern applications, ranging from RFID tracking for supply chain management to real-time intrusion detection. A key aspect of complex event processing is to ...

Liu, Mo

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Arkansas Water Resources Center  

E-Print Network (OSTI)

Alluvial Aquifer, that has resulted from oil and gas operations in the area, particularly in south, discharge from poultry and hog plants, and leaky landfills, among others. Saline water intrusion and near

Soerens, Thomas

362

The Effects of the Internal Flow Structure on SPM Entrapment in the Rotterdam Waterway  

Science Conference Proceedings (OSTI)

Field measurements are presented, which are the first to quantify the processes influencing the entrapment of suspended particulate matter (SPM) at the limit of saltwater intrusion in the Rotterdam Waterway. The estuarine turbidity maximum (ETM) ...

Michel A. J. de Nijs; Johan C. Winterwerp; Julie D. Pietrzak

2010-11-01T23:59:59.000Z

363

Heartbeat of a Nest: Using imagers as biological sensors  

E-Print Network (OSTI)

the nest (Fig. 4). An infrared light emitting diode (LED) which consumes 24 mW continuously illuminates down with minimal intrusion into the bird's nesting activities. Infrared light emitting diodes (LEDs

Hamilton, Michael P.

364

Aircraft Inspection  

Science Conference Proceedings (OSTI)

Table 3   Typical locations of corrosion on aircraft...by maintenance, moisture intrusion V RBR. BAS Nose section Nose radome latches Galvanic (steel fasteners in aluminum structures)

365

Cumulative attestation kernels for embedded systems  

Science Conference Proceedings (OSTI)

There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable commonly-used embedded processors known as flash MCUs to provide remote attestation ...

Michael LeMay; Carl A. Gunter

2009-09-01T23:59:59.000Z

366

Evaluation of a Fast-Running Urban Dispersion Modeling System Using Joint Urban 2003 Field Data  

Science Conference Proceedings (OSTI)

An urban dispersion modeling system was evaluated using the Joint Urban 2003 field data. The system consists of a fast-running urban airflow model (RUSTIC, for Realistic Urban Spread and Transport of Intrusive Contaminants) that is coupled with a ...

Eric A. Hendricks; Steve R. Diehl; Donald A. Burrows; Robert Keith

2007-12-01T23:59:59.000Z

367

Cirrus Outflow Dynamics  

Science Conference Proceedings (OSTI)

Cirrus outflow from deep convection are analyzed as dynamically and thermodynamically active systems. The initial outflow is considered as an analog to wake collapse, in which a neutrally buoyant flow intrusion is flattened and stretched by its ...

Douglas K. Lilly

1988-05-01T23:59:59.000Z

368

Utilizing the connected power electronic converter for improved condition monitoring of induction motors and claw-pole generators.  

E-Print Network (OSTI)

??This dissertation proposes several simple, robust, and non-intrusive condition monitoring methods for induction motors fed by closed-loop inverters and claw-pole generators with built-in rectifiers. While… (more)

Cheng, Siwei

2012-01-01T23:59:59.000Z

369

Piezoelectric kinetic energy-harvesting ics .  

E-Print Network (OSTI)

??Wireless micro-sensors can enjoy popularity in biomedical drug-delivery treatments and tire-pressure monitoring systems because they offer in-situ, real-time, non-intrusive processing capabilities. However, miniaturized platforms severely… (more)

Kwon, Dongwon

2013-01-01T23:59:59.000Z

370

ASAP: automatic semantics-aware analysis of network payloads  

Science Conference Proceedings (OSTI)

Automatic inspection of network payloads is a prerequisite for effective analysis of network communication. Security research has largely focused on network analysis using protocol specifications, for example for intrusion detection, fuzz testing and ...

Tammo Krueger; Nicole Krämer; Konrad Rieck

2010-09-01T23:59:59.000Z

371

Tide-Induced Variation of the Dynamics of a Salt Wedge Estuary  

Science Conference Proceedings (OSTI)

The time variations of the salt wedge intrusion in the Fraser estuary, British Columbia, were monitored during a variety of tidal and run-off conditions using instruments and sampling methods that provided high resolution of the velocity and ...

W. Rockwell Geyer; David M. Farmer

1989-08-01T23:59:59.000Z

372

SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation  

Science Conference Proceedings (OSTI)

Malware -- a generic term that encompasses viruses, trojans, spywares and other intrusive code -- is widespread today. Malware analysis is a multi-step process providing insight into malware structure and functionality, facilitating the development of ... Keywords: instrumentation, malware, security

Amit Vasudevan; Ramesh Yerraballi

2006-01-01T23:59:59.000Z

373

Application of Laser Techniques in Combustion Environments of Relevance for Gas Turbine Studies.  

E-Print Network (OSTI)

??In the work presented in this thesis, different laser-based techniques were employed for measurements in different combustion devices. Laser-based techniques enable non-intrusive and in-situ measurements… (more)

Lantz, Andreas

2012-01-01T23:59:59.000Z

374

Survival by defense-enabling  

Science Conference Proceedings (OSTI)

Attack survival, which means the ability to provide some level of service despite an ongoing attack by tolerating its impact, is an important objective of security research. In this paper we present a new approach to survivability and intrusion tolerance. ...

Partha Pal; Franklin Webber; Richard Schantz

2001-09-01T23:59:59.000Z

375

Monitoring Precipitable Water and Surface Wind over the Gulf of Mexico from Microwave and VAS Satellite Imagery  

Science Conference Proceedings (OSTI)

Spatial and temporal changes of atmospheric water vapor and surface wind speeds are investigated for a period following an intrusion of cold continental air over the Gulf of Mexico, during the Gulf of Mexico Experiment (GUFMEX) in March 1988. ...

Robert M. Rabin; Lynn A. McMurdie; Christopher M. Hayden; Gary S. Wade

1991-06-01T23:59:59.000Z

376

Layered Precipitable Water from the Infrared VAS Sounder during a Return-Flow Event over the Gulf of Mexico  

Science Conference Proceedings (OSTI)

Spatial and temporal changes in the vertical distribution of atmospheric water vapor are investigated during a period following the intrusion of cold continental air over the Gulf of Mexico, during the Gulf of Mexico Experiment (GUFMEX) in ...

Robert M. Rabin; Lynn A. McMurdie; Christopher M. Hayden; Gary S. Wade

1992-08-01T23:59:59.000Z

377

Aerosol Indirect Effects on Tropical Convection Characteristics under Conditions of Radiative–Convective Equilibrium  

Science Conference Proceedings (OSTI)

The impacts of enhanced aerosol concentrations such as those associated with dust intrusions on the trimodal distribution of tropical convection have been investigated through the use of large-domain (10 000 grid points), fine-resolution (1 km), ...

Susan C. van den Heever; Graeme L. Stephens; Norman B. Wood

2011-04-01T23:59:59.000Z

378

Formal verification of hierarchically distributed agent based protection scheme in smart grid  

Science Conference Proceedings (OSTI)

In recent studies, hierarchically distributed non-intrusive agent aided transmission line distance relaying protection scheme has been proposed. This scheme is meant to provide the distance relays with situational awareness and improve their robustness ...

Shravan Garlapati; Sandeep K. Shukla

2012-07-01T23:59:59.000Z

379

Alert correlation using artificial immune recognition system  

Science Conference Proceedings (OSTI)

High volumes of low-level alerts that are generated by intrusion detection systems (IDSs) are serious obstacle for using them effectively. These high volumes of alerts overwhelm system administrators in such a way that they cannot manage and ...

Mehdi Bateni; Ahmad Baraani; Ali Ghorbani

2012-06-01T23:59:59.000Z

380

Alert correlation survey: framework and techniques  

Science Conference Proceedings (OSTI)

Managing raw alerts generated by various sensors are becoming of more significance to intrusion detection systems as more sensors with different capabilities are distributed spatially in the network. Alert Correlation addresses this issue by reducing, ...

Reza Sadoddin; Ali Ghorbani

2006-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Machine learning for host-based anomaly detection  

Science Conference Proceedings (OSTI)

Anomaly detection techniques complement, signature based methods for intrusion detection. Machine learning approaches are applied to anomaly detection for automated learning and detection. Traditional host-based anomaly detectors model system call sequences ...

Gaurav Tandon / Philip K. Chan

2008-01-01T23:59:59.000Z

382

Look Who's Talking : mechanisms for sharing interpersonal context and social titles as awareness information  

E-Print Network (OSTI)

Mobile awareness systems aim to convey personal context information between people in a way that is less intrusive, somewhat automatic, and often much more persistent than a phone call. Although there are many ways in which ...

Adcock, Matthew Graham

2007-01-01T23:59:59.000Z

383

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks  

Science Conference Proceedings (OSTI)

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on ...

Mohssen Mohammed, Al-Sakib Khan Pathan

2013-05-01T23:59:59.000Z

384

A Machine Learning Evaluation of an Artificial Immune System  

Science Conference Proceedings (OSTI)

ARTIS is an artificial immune system framework which contains several adaptive mechanisms. LISYS is a version of ARTIS specialized for the problem of network intrusion detection. The adaptive mechanisms of LISYS are characterized in terms of their machine-learning ...

Matthew Glickman; Justin Balthrop; Stephanie Forrest

2005-06-01T23:59:59.000Z

385

Quasigeostrophic Forecasting and Physical Processes of Iceland-Faroe Frontal Variability  

Science Conference Proceedings (OSTI)

Using a hydrocast survey of the Iceland-Faroe Front (IFF) from October 1992, quasigeostrophic forecasts are studied to validate their efficacy and to diagnose the physical processes involved in the rapid growth of a cold tongue intrusion. ...

Arthur J. Miller; Pierre-Marie Poulain; Alex Warn-Varnas; Hernan G. Arango; Allan R. Robinson; Wayne G. Leslie

1995-06-01T23:59:59.000Z

386

Data Min Knowl Disc (2010) 20:191220 DOI 10.1007/s10618-009-0146-1  

E-Print Network (OSTI)

real-world applications: credit card fraud detection and network intrusion detection. Keywords Rare in many real-world applications, such as the detection of oil spills in satellite radar images (Kubat et

Xiong, Hui

387

Cost-Sensitive Learning Methods for Imbalanced Data Nguyen Thai-Nghe, Zeno Gantner, and Lars Schmidt-Thieme, Member, IEEE  

E-Print Network (OSTI)

. This phenomenon appears in many machine learning and data mining applications, such as credit card fraud detection, intrusion detection, oil-spill detection, disease diagnosis, and many other areas. Most classifiers

Schmidt-Thieme, Lars

388

wRACOG: A Gibbs Sampling-Based Oversampling Barnan Das, Narayanan C. Krishnan, Diane J. Cook  

E-Print Network (OSTI)

domains that include network intrusion detection [1], fraud detection [2], oil-spill detection [3 unused data, data are being treated as the "new oil". Social media, e-commerce, and healthcare companies

Cook, Diane J.

389

Ostracode distribution in Late Pennsylvanian Finis Shale cyclothem  

SciTech Connect

Four successive intergrading ostracode biofacies characterize the Finis Shale cyclothem (Cisco Group, Virgilian) near Jacksboro, Texas. Composition of the ostracode biofacies parallels the distinct megafaunal assemblages ascribed by Boardman et al (1983) to changing oxygen concentrations, water depths, and salinity. Black, organic-rich, noncalcareous, fissile shales occur near the base of the Finis. This lithofacies is barren of ostracodes and megafauna, and is interpreted to represent a deeper water, anoxic environment. The overlying dark-gray, phosphatic shales contain a diminutive pyritic molluscan fauna with abundant ammonoids and a low-diversity ostracode assemblage dominated by Healdia, indicating a dysaerobic environment. The overlying lithofacies is a medium-gray, clay-rich, calcareous shale. The Megafauna is dominated by a brachiopod-bryzoan assemblage, and a diverse Ampissites-Kirkbya ostracode association occurs. This fauna represents a shallow depth, aerobic environment. The Amphissites-Kirkbya biofacies is overlain by a dark-gray calcareous shale with abundant megafossils of the fusulind-bryozoan facies of Boardman et al. This interval is dominated by a Bairdia-Amphissites-Kelletina ostracode assemblage, indicating a shallower aerobic environment. The shale is interrupted by the Jacksboro Limestone Member, an algal limestone deposited at or near wave base, which is covered by a thin intertidal sandstone. The cyclothem is capped by noncalcareous, brown silty shale. It contains a low-diversity ostracode assemblage dominated by Cavellina and a megafaunal assemblage characterized by Myalina, which represents a shallow, brackish water environment.

Boller, K.A.

1985-02-01T23:59:59.000Z

390

Noninstrusive Appliance Load Monitoring System (NIALMS): Beta-Test Results  

Science Conference Proceedings (OSTI)

Traditional methods for gathering appliance-specific load data require installation of individual recording meters on each appliance or multi-channel recording meters with remote sensors on individual appliances. This is a highly intrusive approach that is expensive and cumbersome in terms of capital, labor, and customer goodwill. A newly developed non-intrusive appliance load monitoring system (NIALMS) promises to minimize many of the costs of traditional end-use metering approaches.

1997-11-04T23:59:59.000Z

391

Uncertainty quantification of limit-cycle oscillations  

SciTech Connect

Different computational methodologies have been developed to quantify the uncertain response of a relatively simple aeroelastic system in limit-cycle oscillation, subject to parametric variability. The aeroelastic system is that of a rigid airfoil, supported by pitch and plunge structural coupling, with nonlinearities in the component in pitch. The nonlinearities are adjusted to permit the formation of a either a subcritical or supercritical branch of limit-cycle oscillations. Uncertainties are specified in the cubic coefficient of the torsional spring and in the initial pitch angle of the airfoil. Stochastic projections of the time-domain and cyclic equations governing system response are carried out, leading to both intrusive and non-intrusive computational formulations. Non-intrusive formulations are examined using stochastic projections derived from Wiener expansions involving Haar wavelet and B-spline bases, while Wiener-Hermite expansions of the cyclic equations are employed intrusively and non-intrusively. Application of the B-spline stochastic projection is extended to the treatment of aerodynamic nonlinearities, as modeled through the discrete Euler equations. The methodologies are compared in terms of computational cost, convergence properties, ease of implementation, and potential for application to complex aeroelastic systems.

Beran, Philip S. [Multidisciplinary Technologies Center, Air Vehicles Directorate, AFRL/VASD, Building 146, 2210 Eighth Street, WPAFB, OH 45433 (United States)]. E-mail: philip.beran@wpafb.af.mil; Pettit, Chris L. [United States Naval Academy, 590 Holloway Rd., MS 11-B, Annapolis, MD 21402 (United States)]. E-mail: pettitcl@usna.edu; Millman, Daniel R. [USAF TPS/EDT, 220 South Wolfe Ave, Bldg. 1220, Rm. 131, Edwards AFB, CA 93524-6485 (United States)]. E-mail: daniel.millman@edwards.af.mil

2006-09-01T23:59:59.000Z

392

A Learning System for Discriminating Variants of Malicious Network Traffic  

Science Conference Proceedings (OSTI)

Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacks and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.

Beaver, Justin M [ORNL; Symons, Christopher T [ORNL; Gillen, Rob [ORNL

2013-01-01T23:59:59.000Z

393

Archaeological investigations in the Elm Creek Watershed, Runnels County, Texas: sites 41RN61, 41RN64, 41RN65, 41RN72, 41RN74, 41RN76  

E-Print Network (OSTI)

This thesis describes results of archaeological investigations and material analysis associated with six prehistoric sites in Runnels County, Texas that lie within a proposed Soil Conservation Service floodwater retarding structure and reservoir. Data recovery, based on geomorphic investigations to resolve potential for subsurface cultural deposits, resulted in retrieval of representative samples of lithic assemblages from four sites (41RN61, 41RN64, 41RN65, 41RN74). These lithic assemblages, along with lithic collections from previous testing by SMU within the project area (41RN72, 41RN76), were analyzed with an emphasis on the diversity in assemblage characteristics from quarry or primary lithic procurement sites as contrasted with sites in which further lithic reduction and utilization related to subsistence prevails, such as habitation sites. Inferences with regard to site activity and function are made based on results of lithic analysis and trends revealed in the data.

Sanders, Calvin B

1995-01-01T23:59:59.000Z

394

Microsoft Word - EA integrated case studies document 2007May07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

250 250 Rev. 0 May 15, 2007 Washington Savannah River Company Savannah River Site Aiken, SC 29808 Prepared for the U.S. Department of Energy Under Contract Number DEAC09-96-SR18500 Gravel Admixture in Upper 20 cm Vegetation (ET) Geotextile Separator Topsoil 61.0 cm Animal Intrusion Layer (Cobbles Filled w/ Soil) 30.5 cm Capillary Barrier (Coarse Sand) 38.0 cm Growth Medium and Frost Protection (Fine-Grained Soil) 41.0 cm Fine-Grained Soil 30.5 cm Water Storage Layer (Sponge) 163 cm Gravel Admixture in Upper 20 cm Gravel Admixture in Upper 20 cm Vegetation (ET) Geotextile Separator Geotextile Separator Topsoil 61.0 cm Topsoil 61.0 cm Animal Intrusion Layer (Cobbles Filled w/ Soil) 30.5 cm Animal Intrusion Layer (Cobbles Filled w/ Soil) 30.5 cm Capillary Barrier (Coarse Sand) 38.0 cm

395

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability and Intrusion Detection Vulnerability and Intrusion Detection Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy Sector Control Systems Working Group provided technical feedback and recommendations to each project to ensure DOE continues to support robust projects that meet industry needs. Presentations on Vulnerability and Instrusion Detection are below.

396

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability and Intrusion Detection Vulnerability and Intrusion Detection Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy Sector Control Systems Working Group provided technical feedback and recommendations to each project to ensure DOE continues to support robust projects that meet industry needs. Presentations on Vulnerability and Instrusion Detection are below.

397

Dike/Drift Interactions  

Science Conference Proceedings (OSTI)

This report presents and documents the model components and analyses that represent potential processes associated with propagation of a magma-filled crack (dike) migrating upward toward the surface, intersection of the dike with repository drifts, flow of magma in the drifts, and post-magma emplacement effects on repository performance. The processes that describe upward migration of a dike and magma flow down the drift are referred to as the dike intrusion submodel. The post-magma emplacement processes are referred to as the post-intrusion submodel. Collectively, these submodels are referred to as a conceptual model for dike/drift interaction. The model components and analyses of the dike/drift interaction conceptual model provide the technical basis for assessing the potential impacts of an igneous intrusion on repository performance, including those features, events, and processes (FEPs) related to dike/drift interaction (Section 6.1).

E. Gaffiney

2004-11-23T23:59:59.000Z

398

Chemical and Dynamical Characteristics of Stratosphere-Troposphere Exchange  

E-Print Network (OSTI)

Stratosphere-troposphere exchange processes are responsible for controlling the distribution of chemically and radiatively important trace gases in the upper troposphere and lower stratosphere. Extensive characterization of exchange processes is critical to the development of our understanding and prediction of the climate system. This study examines the occurrence and dynamical and chemical characteristics related to two primary stratosphere-troposphere exchange processes: Rossby wavebreaking and moist convection. Intrusions of air from the tropical upper troposphere into the extratropical stratosphere above the subtropical jet via Rossby wavebreaking potentially have a significant impact on the composition of the lowermost stratosphere (the stratospheric part of the "middleworld"). We first present an analysis of tropospheric intrusion events observed in aircraft observations using kinematic and chemical diagnostics. The transport processes operating during each event are discussed using high-resolution model analyses and backward trajectory calculations. In situ chemical observations of the tropospheric intrusions are used to estimate the mixing timescales of the observed intrusions through use of a simple box model and trace species with different photo-chemical lifetimes. We estimate that the timescale for an intrusion to mix with the background stratospheric air is 5 to 6 days. Detailed analysis of small-scale features with tropospheric characteristics observed in the stratosphere suggests frequent irreversible transport associated with tropospheric intrusions. We also present a 30-year climatology (1981-2010) of anticyclonically and cyclonically sheared Rossby wave-breaking events along the boundary of the tropics in the 350-500 K potential temperature range from ECMWF ERA-Interim reanalyses. Lagrangian transport analyses show poleward transport at altitudes below and above the 370-390 K layer. Poleward transport at lower levels is in disagreement with previous studies and is shown to be largely dependent on the choice of tropical boundary. In addition, transport analyses reveal three modes of transport for anticyclonic wavebreaking events near the tropical tropopause (380 K): poleward, equatorward, and bidirectional. These transport modes are associated with distinct characteristics in the geometry of the mean flow. Stratospheric intrusions (tropopause folds) are known to be major contributors to stratosphere-troposphere exchange. The specific mixing processes that lead to irreversible exchange between stratospheric intrusions and the surrounding troposphere, however, are not entirely understood. This study presents direct observations of moist convection penetrating into stratospheric intrusions. The characteristics of convective injection are shown by using in situ aircraft measurements, radar reflectivities, and model analyses. Convective injection is observed at altitudes up to 5 km above the bottom of a stratospheric intrusion. Aircraft measurements show that convective injection in stratospheric intrusions can be uniquely identified by coincident observations of water vapor greater than about 100 ppmv and ozone greater than about 125 ppbv. Trajectory analyses show that convective injection can impact transport in both directions: from troposphere to stratosphere and from stratosphere to troposphere. We present a conceptual model of the synoptic meteorological conditions conducive to convective injection in stratospheric intrusions. In particular, convective injection is found to be associated with a "split front" where the upper-level frontal boundary outruns the surface cold front.

Homeyer, Cameron Ross

2012-08-01T23:59:59.000Z

399

Hydrogen & Fuel Cells | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Land Conservation (Virginia) Land Conservation (Virginia) The Virginia Department of Conservation and Recreation has developed the Commonwealth's first comprehensive, continually maintained GIS data layer for Virginia's protected conservation lands. This database includes mapped boundaries and attributes for public and certain private lands having various conservation, recreation and open-space roles. Most federal, state, regional and interstate lands are included. October 16, 2013 Land Assemblage Tax Credit Program (Missouri) The Land Assemblage Tax Credit Programs the redevelopment of blighted areas in Missouri into productive use. Redevelopers must incur acquisition costs for at least 50 acres of 75+ acre parcels, enter into redevelopment agreement, and be approved for redevelopment incentives. The maximum

400

Groups & Services, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Groups & Services Groups & Services Homepage | Contact Us Customer Support Cyber Security Enterprise Computing Services Network Services BCF Facility Services Web Services Unix Services Overview Overview Overview Overview Overview Overview Overview Cyber Security Policy Development: Developing and communicating Cyber Security policy and processes. Network and Application Review: Reviewing and approving all external connections to and from the BNL Intranet. Incident Investigation: Investigating Cyber Security "incidents" that are referred to the Cyber Security Incident Response Team (CSIRT). CSIRT will assist local administrators with technical and forensic investigations. Intrusion Detection Management: Supporting the Intrusion Detection system at BNL, which includes tracking events, assessing risk, and

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

402

Improved Security Via ''Town Crier'' Monitoring  

Science Conference Proceedings (OSTI)

Waste managers are increasingly expected to provide good security for the hazardous materials they marshal. Good security requires, among other things, effective tamper and intrusion detection. We have developed and demonstrated a new method for tamper and intrusion detection which we call the ''town crier method''. It avoids many of the problems and vulnerabilities associated with traditional approaches, and has significant advantages for hazardous waste transport. We constructed two rudimentary town crier prototype systems, and tested them for monitoring cargo inside a truck. Preliminary results are encouraging.

Johnston, R. G.; Garcia, A. R. E.; Pacheco, A. N.

2003-02-26T23:59:59.000Z

403

Using Semantic Web Technologies to Develop Intrinsically Resilient Energy Control Systems  

SciTech Connect

To preserve critical energy control functions while under attack, it is necessary to perform comprehensive analysis on root causes and impacts of cyber intrusions without sacrificing the availability of energy delivery. We propose to design an intrinsically resilient energy control system where we extensively utilize Semantic Web technologies, which play critical roles in knowledge representation and acquisition. While our ultimate goal is to ensure availability/resiliency of energy delivery functions and the capability to assess root causes and impacts of cyber intrusions, the focus of this paper is to demonstrate a proof of concept of how Semantic Web technologies can significantly contribute to resilient energy control systems.

Sheldon, Frederick T [ORNL; Huang, Jingshan [ORNL; Fetzer, Daniel T [ORNL; Morris, Thomas H [ORNL; Jonathan, Kirsch [Siemens Corporate Research; Goose, Stuart [Siemens Corporate Research; Wei, Dong [Siemens Corporate Research; Dang, Jiangbo [Siemens Corporate Research; Manz, David [Pacific Northwest National Laboratory (PNNL)

2012-01-01T23:59:59.000Z

404

PLEASE SCROLL DOWN FOR ARTICLE This article was downloaded by: [George Mason University  

E-Print Network (OSTI)

Assemblages, NUREG/CR-6708, U. S. Nuclear Regulatory Commission, Washington, D.C., 214 pp. Davis, J.A., Hess, Colorado, Report NUREG CR-6820, U. S. Nuclear Regulatory Commission, Rockville, MD, 223 pp. Fuller, C. C Facilities, Report NUREG CR-6870, U. S. Nuclear Regulatory Commission, Rockville, MD, 111 pp. T. E. Payne, J

Parasuraman, Raja

405

B R I G H A M Y O U N G U N I V E R S I T Y G E O L O G I C A L S O C I E T Y O F A M E R I C A  

E-Print Network (OSTI)

generallyprompt and helpful in meeting our tight schedule. These included: Lee Allison, Genevieve Atwood, Gary and Anderson, 1942). The RMA is a complexly deformed assemblage of sand- stone, siltstone, shale, chert are present (Fig. 7) and consist of coarse silt to medium sand size grains of carbonate skeletal fragments

Seamons, Kent E.

406

FIRST OCCURRENCE OF FOOTPRINTS OF LARGE THERAPSIDS FROM THE UPPER PERMIAN OF  

E-Print Network (OSTI)

, indicates that Bron- topus was made by a herbivore. Comparison with the Karoo Trace fossils, including tetrapod tracks, have been re- ported from many horizons in the Middle Permian of the Karoo Basin in South. A dicynodont trackway from the Ciste- cephalus Assemblage Zone in the Karoo, east of Graaff-Reinet, South

Benton, Michael

407

Pelagic fishes are not evenly dispersed in the oceans, but aggregate at dis-  

E-Print Network (OSTI)

in this vast and open environment. Nomadic species such as mackerels, tunas, and sharks form assemblages supports a greater abun- The occurrence of yellowfin tuna (Thunnus albacares)Thunnus albacares- ward radiating valleys and ridges of magnetic minimums and maximums might provide landmarks in oceanic

Klimley, A. Peter

408

[Diffusion/dispersion transport of chemically reacting species]. Progress report, FY 1992--1993  

DOE Green Energy (OSTI)

Progress is reported on the following: calculation of activity coefficients for aqueous silica in alkali metal chloride solutions; calculation of degrees of formation of polyatomic clusters of Al in alkali chloride solutions; bulk composition-pH diagrams for arkosic sediments; and chemical interaction of petroleum, oil field brines, and authigenic mineral assemblages. Plans for future research are given.

Helgeson, H.C.

1993-07-01T23:59:59.000Z

409

No name: just notes on software reuse  

Science Conference Proceedings (OSTI)

In the beginning, so our myths and stories tell us, the programmer created the program from the eternal nothingness of the void. In this essay, we recognise that programs these days are like any other assemblage, and suggest that in fact programming ... Keywords: components, object-oriented programming, software reuse

Robert Biddle; Angela Martin; James Noble

2003-12-01T23:59:59.000Z

410

Journal of Foraminiferal Research, v. 30, no. 2, p. 135142, April 2000 PRELIMINARY SURVEY OF ARCELLACEANS (THECAMOEBIANS) AS  

E-Print Network (OSTI)

OF ARCELLACEANS (THECAMOEBIANS) AS LIMNOLOGICAL INDICATORS IN TROPICAL LAKE SENTANI, IRIAN JAYA, INDONESIA A. P) assemblages recovered from Lake Sentani, a large tropical lake southwest of Jayapura, Irian Jaya, Indonesia by documenting the arcellacean fauna found in tropical Lake Sentani, Irian Jaya, Indonesia, and variations

Patterson, Timothy

411

Eastern Australasian Basins Symposium IVBrisbane, QLD, 1014 September, 2012 1 EarthByte Group, School of Geosciences, The University of Sydney, NSW,  

E-Print Network (OSTI)

.Heine@sydney.edu.au Abstract The Banda Arc, situated west of Irian Jaya and in the easternmost extension of the Sunda is autochthonous to western Irian Jaya, with its western margin being a continental transform margin during) continental block of western Irian Jaya are prominent features in the complex tectonic assemblage of Southeast

Müller, Dietmar

412

Russian Journal of Herpetology Vol. 3, No. 1. 1996. pp. 18-31 EVOLUTION OF THE BISEXUAL SPECIES OF CAUCASIAN ROCK LIZARDS  

E-Print Network (OSTI)

, ,+lrchaeolacerta,phylogeny, systematics, genetics. Caucasus Mountains, allozymes. INTRODUCTION Few assemblages as have the rock lizards of the Caucasus Mountains. Within this gathering of lacertid lizards of the genus of the subgenus Ar- chaeolacerta from the Caucasus Mountains of south- ern Russia (Daghestan), Armenia

Murphy, Bob

413

Published by ORNL's Energy Efficiency and Renewable Energy Program (www.ornl.gov/Energy_Eff) No. 1 2001 This is DOE's vision for the year  

E-Print Network (OSTI)

of Industrial Technologies Bethlehem Steel Success Story By rebuilding a steam turbine to incorporate the latest industrial or commercial operations and homes, and excess power will be fed into the central power supply give industry and academia unparalleled access to this unique assemblage of expertise, facilities

414

The CretaceousTertiary Mass Extinction, Chicxulub Impact,  

E-Print Network (OSTI)

) and Meyerhoff et al. (1994) described Cretaceous assemblages in limestones over- lying breccias in Yucatan Pemex-examined the geophysical logs, sedimentology, and biostratigraphy of seven Pemex wells from northern Yucatan and concluded is often not available for study in PEMEX or UNAM wells. As noted earlier, Cretaceous planktic

Keller, Gerta

415

Volatile impurities in the ceramic form for the Plutonium Immobilization Project (PIP)  

SciTech Connect

The primary goal for the impurity tests performed at SRS was to determine the maximum level of volatile impurities that can be accommodated into the ceramic form without significantly affecting product properties. The properties investigated in this study are the apparent porosity and the phase assemblage.

Cozzi, A.D.

2000-03-02T23:59:59.000Z

416

Annual Logging Symposium, June 19-23, 2010 IMPROVED ESTIMATION OF MINERAL  

E-Print Network (OSTI)

measurements, 77B Q-factor, 90B, 92B susceptibility, 77B, 88B, 90B, 93B-94B, 131A neutron porosity, 173B and oblique seismic experiment (OSE), 106B phenocryst assemblages in Hole 418A, 135B-136B physical properties sequence, 145B See also Pillow basalts Basalts, massive compressional wave velocity, 95A, 146A neutron

Torres-Verdín, Carlos

417

Perception and Digital Media in India  

Science Conference Proceedings (OSTI)

This essay analyzes the body politics at the center of both business services outsourcing labor also termed affective, immaterial, or communicative labor and the value-adding digital image in contemporary Indian media. The author uses a "media assemblage" ... Keywords: Affect, Digital Media, Electronic Commerce, India, Information Systems, Value Added

Amit S. Rai

2012-10-01T23:59:59.000Z

418

Micro-and nano-environments of C sequestration in soil: A multi-elemental STXMNEXAFS assessment of black C and organomineral associations  

E-Print Network (OSTI)

Micro- and nano-environments of C sequestration in soil: A multi-elemental STXM­NEXAFS assessment-NEXAFS identified terminal micro- and nano-organic C repository environments in undisturbed organomineral assemblage-black C organic matter. The binding and sequestration of black C in the investigated micro- and nano

Lehmann, Johannes

419

The dynamics of conformational isomerization in flexible biomolecules. I. Hole-filling spectroscopy of N-acetyl tryptophan methyl amide  

E-Print Network (OSTI)

macrophytes. Assemblages with intermediate sized barbel and nase (100­200 mm TL), the larger size classes Cyprinidae of intermediate size classes (100­200 mm TL) as well as common carp and mosquitofish charac and intermediate sizes ( 200 mm TL) of the two benthic

Zwier, Timothy S.

420

Developing physical surrogates for benthic biodiversity using co-located samples and regression tree models: a conceptual synthesis for a sandy temperate embayment  

Science Conference Proceedings (OSTI)

Marine physical and geochemical data can be valuable surrogates for predicting the distributions and assemblages of marine species. This study investigated the bio-environment surrogacy relationships in Jervis Bay, a sandy marine embayment in south-eastern ... Keywords: Jervis Bay, benthic biodiversity, conceptual model, surrogates

Zhi Huang; Matthew McArthur; Lynda Radke; Tara Anderson; Scott Nichol; Justy Siwabessy; Brendan Brooke

2012-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Investigation of component failures in downhole geothermal pumping systems. Final report  

DOE Green Energy (OSTI)

This study investigated component failures in electric, downhole submersible pumps which prevented the attainment of one year continuous downhole running times in geothermal wells at temperatures up to 375/sup 0/F. The feasibility of a pressurized motor to prevent brine intrusion was investigated, as well as improved pothead and packoff designs, and brine scale buildup on impeller sleeve bearings and thrust washers. (ACR)

Werner, D.K.

1985-03-15T23:59:59.000Z

422

Towards the protection of industrial control systems: conclusions of a vulnerability analysis of profinet IO  

Science Conference Proceedings (OSTI)

The trend of introducing common information and communication technologies into automation control systems induces besides many benefits new security risks to industrial plants and critical infrastructures. The increasing use of Internet protocols in ... Keywords: anomaly detection, industrial control systems, intrusion detection, profinet IO attacks, profinet IO vulnerabilities

Andreas Paul, Franka Schuster, Hartmut König

2013-07-01T23:59:59.000Z

423

Semantic security analysis of SCADA networks to detect malicious control commands in power grids  

Science Conference Proceedings (OSTI)

In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes ... Keywords: contingency analysis, intrusion detection system, scada, semantic analysis

Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer

2013-11-01T23:59:59.000Z

424

Towards automatic security management: a model-based approach  

Science Conference Proceedings (OSTI)

This paper introduces a security management approach that integrates system monitoring, intrusion detection, and automatic control in order to detect, classify and protect against security attacks automatically. The model-based controller computes the ... Keywords: DoS attack, detection, optimization, protection

Qian Chen; Sherif Abdelwahed; Weston Monceaux

2013-01-01T23:59:59.000Z

425

Using participatory modelling to compensate for data scarcity in environmental planning: A case study from India  

Science Conference Proceedings (OSTI)

Participatory modelling has provided a new approach to overcome the problem of data scarcity which formerly interfered with the environmental planning for the restoration of the Kolleru-Upputeru wetland ecosystem on the east coast of Andhra Pradesh in ... Keywords: Delta system, Duflow, Environment, Estuary, Integrated water resources management, Salt-water intrusion, Stakeholder participation

Henk Ritzema; Jochen Froebrich; Ramakrishna Raju; Ch. Sreenivas; Rob Kselik

2010-11-01T23:59:59.000Z

426

Response Tracking Number: 1  

E-Print Network (OSTI)

The significance of vadose-zone biodegradation on the vapor intrusion of petroleum compounds is well recognized, but considered to a limited extent in the guidance document. Although exceptions can occur, the likelihood that dissolved hydrocarbons in groundwater will cause impacts to indoor air is remote. It is more reasonable to focus screening efforts on hydrocarbon release sites with i) shallow NAPL present below the building, ii) direct contact of dissolved hydrocarbons on the building, or iii) migration of petroleum vapors through preferential pathways in contact with contamination. Studies have demonstrated that vadose-zone aerobic biodegradation of petroleum hydrocarbons is common and significant (Roggemans et al., 2001). The USEPA vapor intrusion database and industry experience both indicate that dissolved petroleum hydrocarbons in groundwater do not cause vapor intrusion impacts. Provided no preferential pathways are present, the potential for biodegradation is increased at sites with low hydrocarbon concentration, large depth to source, relatively permeable soils, and no capping effect (e.g., low permeability surface soil or cover that would limit transport of O2 into the subsurface) (Health Canada, 2004). Hence, Health Canada is currently considering a provision to allow for a 10x adjustment in the attenuation factor to account for biodegradation at sites with no surface cap and large depths to source. Modeling and site investigation studies demonstrate that biodegradation can result in many orders of magnitude reduction in vapor intrusion risk estimates (Abreu and Johnson, 2005b; Ettinger

Commenter Organization

2005-01-01T23:59:59.000Z

427

Method for detecting sophisticated cyber attacks  

DOE Patents (OSTI)

A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

Potok, Thomas E. (Oak Ridge, TN)

2008-11-18T23:59:59.000Z

428

UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD  

E-Print Network (OSTI)

figures. 785 Earthquake and volcano clustering via stress transfer at Yucca Mountain, Nevada Tom Parsons U intrusions at Crater Flat. How- ever, when we allowed central Yucca Mountain faults to slip in the model, we found that magmatic clustering was not favored at Crater Flat or in the central Yucca Mountain block

429

ADWICE – anomaly detection with real-time incremental clustering  

Science Conference Proceedings (OSTI)

Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in real-time places hard requirements on the algorithms used, making many proposed ... Keywords: adaptability, anomaly detection, clustering, intrusion detection, realtime

Kalle Burbeck; Simin Nadjm-Tehrani

2004-12-01T23:59:59.000Z

430

Method and system for measuring gate valve clearances and seating force  

DOE Patents (OSTI)

Valve clearances and seating force, as well as other valve operational parameters, are determined by measuring valve stem rotation during opening and closing operations of a translatable gate valve. The magnitude of the stem rotation, and the relative difference between the stem rotation on opening and closing provides valuable data on the valve internals in a non-intrusive manner.

Casada, Donald A. (Knoxville, TN); Haynes, Howard D. (Knoxville, TN); Moyers, John C. (Oak Ridge, TN); Stewart, Brian K. (Burns, TN)

1996-01-01T23:59:59.000Z

431

Grid of security: a new approach of the network security Olivier FLAUZAC, Florent NOLOT, Cyril RABAT, Luiz-Angelo STEFFENEL  

E-Print Network (OSTI)

Grid of security: a new approach of the network security Olivier FLAUZAC, Florent NOLOT, Cyril-angelo.steffenel}@univ-reims.fr Abstract--Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion knowledge, a distributed and easily manageable solution for the global security of an enterprise network

Paris-Sud XI, Université de

432

Distributed detection of mobile malicious node attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to ... Keywords: Intrusion detection, Mobile malicious node, Sequential hypothesis testing

Jun-Won Ho; Matthew Wright; Sajal K. Das

2012-05-01T23:59:59.000Z

433

Measuring network security using dynamic bayesian network  

Science Conference Proceedings (OSTI)

Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics have generally focused on measuring individual vulnerabilities without ... Keywords: attack graph, intrusion detection, security, security metric

Marcel Frigault; Lingyu Wang; Anoop Singhal; Sushil Jajodia

2008-10-01T23:59:59.000Z

434

Simulation of coastal groundwater remediation: the case of Nardò fractured aquifer in Southern Italy  

Science Conference Proceedings (OSTI)

A new theoretical approach for evaluating the sharp interface position in a fractured aquifer was applied to the Nardo aquifer (Southern Italy). The results, based on Dupuit and Ghyben-Herzberg approximations, clearly show both the extent of seawater ... Keywords: Coastal springs, Fractured aquifers, Mathematical models, Seawater intrusion

Costantino Masciopinto

2006-01-01T23:59:59.000Z

435

Observing industrial control system attacks launched via metasploit framework  

Science Conference Proceedings (OSTI)

Industrial Control Systems (ICS) are present across many industries ranging from automotive to utilities. These systems have been found to be connected to corporate enterprise servers and can communicate over unencrypted communication channels. Interconnections ... Keywords: SCADA, industrial control systems, intrusion detection

Nathan Wallace, Travis Atkison

2013-04-01T23:59:59.000Z

436

Low-cost appliance state sensing for energy disaggregation  

Science Conference Proceedings (OSTI)

Reliable detection of appliance state change is a barrier to the scalability of Non Intrusive Load Monitoring (NILM) beyond a small number of sufficiently distinct and large loads. We advocate a hybrid approach where a NILM algorithm is assisted by ultra-low-cost ... Keywords: appliance state change, energy disaggregation, sensor

Tianji Wu; Mani Srivastava

2012-11-01T23:59:59.000Z

437

DoubleDip: leveraging thermoelectric harvesting for low power monitoring of sporadic water use  

Science Conference Proceedings (OSTI)

We present DoubleDip, a low power monitoring system for enabling non-intrusive water flow detection. DoubleDip taps into minute thermal gradients in pipes for both replenishing energy reserves and performing low power wakeup. One of the remaining issues ... Keywords: energy harvesting, low power, sustainability, thermoelectric, water monitoring

Paul Martin; Zainul Charbiwala; Mani Srivastava

2012-11-01T23:59:59.000Z

438

A multi-sensor based occupancy estimation model for supporting demand driven HVAC operations  

Science Conference Proceedings (OSTI)

Heating, ventilation, and air conditioning (HVAC) is a major energy consumer in buildings, and implementing demand driven HVAC operations is a way to reduce HVAC related energy consumption. This relies on the availability of occupancy information, which ... Keywords: HVAC, building energy consumption, demand driven, non-intrusive sensor, occupancy estimation

Zheng Yang; Nan Li; Burcin Becerik-Gerber; Michael Orosz

2012-03-01T23:59:59.000Z

439

Program on Technology Innovation: Response to the Center for Nuclear Waste Regulatory Analyses Review of EPRI Reports on Igneous Pro cesses at Yucca Mountain  

Science Conference Proceedings (OSTI)

EPRI's 2004 and 2005 technical reports (1008169 and 1011165) describe what might occur in the unlikely event of extrusive or intrusive igneous events at Yucca Mountain repository. The Center for Nuclear Waste Regulatory Analyses (CNWRA) reviewed these two reports in 2007. EPRI has evaluated this review; this report discusses and clarifies several salient points that EPRI believes were misinterpreted in the CNWRA review.

2007-09-27T23:59:59.000Z

440

Bull Valcanol (1987) 49:765-775 Voliaology Springer-Verlag 1987 Variation in peperite textures associated with differing  

E-Print Network (OSTI)

masses of the basaltic intrusions up to 1 m in size were dispersed for distances up to 3 m into host pipes in tuff breccia above the lower sill provides evidence for meter-scale fluidization of the host. The contact zone between the basaltic magma and the shelly micrite host resembles a mixture of two viscous

Busby, Cathy

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Modular Anomaly Detection for Smartphone Ad hoc Communication  

E-Print Network (OSTI)

a mobile ad hoc network (MANET). While intrusion detection in MANETs is typically evaluated with network. The study shows the feasibility of the statistics-based anomaly detection regime, having low CPU usage, among others, has been focused on studies of energy and bandwidth constrained communication using

442

Threat based risk management in the federal sector  

Science Conference Proceedings (OSTI)

The United States federal government has many regulations and laws today that require federal agencies to implement a risk management program. Despite these efforts, computer security intrusions and data loss continue to rise. The need for a adaptable ... Keywords: FISMA, NIST, computer security, cybersecurity, risk, risk management, security programs

Nathan Volk

2010-10-01T23:59:59.000Z

443

Gravity model studies of Newberry Volcano, Oregon  

SciTech Connect

Newberry, Volcano, a large Quaternary volcano located about 60 km east of the axis of the High Cascades volcanoes in central Oregon, has a coincident positive residual gravity anomaly of about 12 mGals. Model calculations of the gravity anomaly field suggest that the volcano is underlain by an intrusive complex of mafic composition of about 20-km diameter and 2-km thickness, at depths above 4 km below sea level. However, uplifted basement in a northwest trending ridge may form part of the underlying excess mass, thus reducing the volume of the subvolcanic intrusive. A ring dike of mafic composition is inferred to intrude to near-surface levels along the caldera ring fractures, and low-density fill of the caldera floor probably has a thickness of 0.7--0.9 km. The gravity anomaly attributable to the volcano is reduced to the east across a north-northwest trending gravity anomaly gradient through Newberry caldera and suggests that normal, perhaps extensional, faulting has occurred subsequent to caldera formation and may have controlled the location of some late-stage basaltic and rhyolitic eruptions. Significant amounts of felsic intrusive material may exist above the mafic intrusive zone but cannot be resolved by the gravity data.

Gettings, M.E.; Griscom, A.

1988-09-10T23:59:59.000Z

444

Improving security applications using indoor location systems on wireless sensor networks  

Science Conference Proceedings (OSTI)

One of the fields in which companies are investing more money is security, either personal security to avoid industrial accidents or security against intrusions. There is also the huge effort that the scientific community is doing developing all required ... Keywords: IEEE 802.15.4, ILS, indoor location systems, security applications, wireless sensor networks

Josep Paradells; Jordi Vilaseca; Jordi Casademont

2009-01-01T23:59:59.000Z

445

Protecting consumer privacy from electric load monitoring  

Science Conference Proceedings (OSTI)

The smart grid introduces concerns for the loss of consumer privacy; recently deployed smart meters retain and distribute highly accurate profiles of home energy use. These profiles can be mined by Non Intrusive Load Monitors (NILMs) to expose much of ... Keywords: load monitor, privacy, smart meter

Stephen McLaughlin; Patrick McDaniel; William Aiello

2011-10-01T23:59:59.000Z

446

The impact of a realistic packet traffic model on the performance of surveillance wireless sensor networks  

Science Conference Proceedings (OSTI)

It is quite common to see that classical periodic or Poisson packet traffic models are used for evaluating the performance of wireless sensor networks (WSNs). However, these models may not be appropriate for modeling the data traffic resulting from a ... Keywords: Intrusion detection applications, Packet traffic model, Surveillance sensor networks, Wireless sensor networks

Ilker Demirkol; Cem Ersoy; Fatih Alagöz; Hakan Deliç

2009-02-01T23:59:59.000Z

447

Network anomaly detection with the restricted Boltzmann machine  

Science Conference Proceedings (OSTI)

With the rapid growth and the increasing complexity of network infrastructures and the evolution of attacks, identifying and preventing network abuses is getting more and more strategic to ensure an adequate degree of protection from both external and ... Keywords: Anomaly detection, Energy-based models, Intrusion detection, Restricted Boltzmann machine, Semi-supervised learning

Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Alfredo De Santis

2013-12-01T23:59:59.000Z

448

Colon Cancer Screening The Good, the Bad, and the Ugly  

E-Print Network (OSTI)

older than 50 years. There are sev- eral recommended CRC screening tests, including fecal occult blood- vasiveness, discomfort, and accuracy.2 Fecal occult blood testing is the least expensive intrusive test, whereas colo- noscopy is the most accurate but also the most invasive test. Fecal occult blood testing

Ottino, Julio M.

449

News: Data breach activity is getting worse  

Science Conference Proceedings (OSTI)

March was a landmark month for data breaches. TJX, the retail group which has been slowly revealing the scope of the data intrusion that it originally discovered in December, finally unveiled the full extent of the damage. In its annual report filing ...

2007-04-01T23:59:59.000Z

450

Manifold learning visualization of network traffic data  

Science Conference Proceedings (OSTI)

When traffic anomalies or intrusion attempts occur on the network, we expect that the distribution of network traffic will change. Monitoring the network for changes over time, across space (at various routers in the network), over source and destination ... Keywords: data mining, internet traffic anomaly detection & forensics

Neal Patwari; Alfred O. Hero, III; Adam Pacholski

2005-08-01T23:59:59.000Z

451

RENEWABLE ENERGY AND ENVIRONMENTAL SUSTAINABILITY USING BIOMASS FROM DAIRY AND BEEF ANIMAL PRODUCTION  

DOE Green Energy (OSTI)

The three volume report covers the following results: fuel properties of low ash and high ash CB (particularly DB) and MB (mortality biomass and coals, non-intrusive visible infrared (NVIR) spectroscopy techniques for ash determination, dairy energy use surveys at 14 dairies in Texas and Califor

John M. Sweeten, Kalyan Annamalai

2012-05-03T23:59:59.000Z

452

Robust Heteroscedastic Probabilistic Neural Network for multiple source partial discharge pattern recognition - Significance of outliers on classification capability  

Science Conference Proceedings (OSTI)

Among various insulation diagnostic techniques utilized by researchers and personnel handling power equipment, partial discharge (PD) recognition and analysis has emerged as a vital methodology since it is inherently a non-intrusive testing strategy. ... Keywords: Heteroscedastic Probabilistic Neural Network (HRPNN), Neural network (NN), Partial discharge (PD), Probabilistic Neural Network (PNN), Robust Heteroscedastic Neural Network (RHRPNN)

S. Venkatesh; S. Gopal

2011-09-01T23:59:59.000Z

453

Power System Control Centers: Past, Present, FELIX F. WU, FELLOW, IEEE, KHOSROW MOSLEHI, MEMBER, IEEE, AND  

E-Print Network (OSTI)

Basic-Research Funds of China under Grant 2004CB217900), in part by EPRI Worldwide under Contract P03, such as generator or transmission line outages. Because security is commonly used in the sense of against intrusion outages that might occur in the system. This is carried out using a steady-state model of the power system

Tam, Vincent W. L.

454

Efficient multiple objects-oriented event detection over RFID data streams  

Science Conference Proceedings (OSTI)

Complex event processing has been extensively applied in areas such as RFID tracking for supply chain management, fluctuation detection in stock trading, real-time intrusion detection in network monitoring, etc. Most existing research works focus on ... Keywords: NFA, RFID, complex event processing, data stream

Shanglian Peng; Zhanhuai Li; Qiang Li; Qun Chen; Hailong Liu; Yanming Nie; Wei Pan

2010-07-01T23:59:59.000Z

455

A secure monitoring and control system for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

The maintenance of Wireless Sensor Networks (WSNs) can carry high or prohibitive costs, particularly, if the WSN is deployed in unattended areas. Secure monitoring and control of the WSN is vital, however, practical systems are rare and limited with ... Keywords: Monitoring,Wireless sensor networks,Control systems,Intrusion detection,Elliptic curve cryptography

Michael Riecker, Rainer Thome, Dingwen Yuan, Matthias Hollick

2012-10-01T23:59:59.000Z

456

Efficient and effective automated surveillance agents using kernel tricks  

Science Conference Proceedings (OSTI)

Many schemes have been presented over the years to develop automated visual surveillance systems. However, these schemes typically need custom equipment, or involve significant complexity and storage requirements. In this paper we present three software-based ... Keywords: agent, automated, camera, intrusion, kernel, surveillance

Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan

2013-05-01T23:59:59.000Z

457

Automated tools to implement and test Internet systems in reconfigurable hardware  

Science Conference Proceedings (OSTI)

Tools have been developed to automatically integrate and test networking systems in reconfigurable hardware. These tools dynamically generate circuits for Field Programmable Gate Arrays (FPGAs). A library of hardware-accelerated modules has been developed ... Keywords: Field Programmable Gate Array (FPGA), Internet, firewall, network intrusion detection and prevention, networks, reconfigurable hardware, tools

John W. Lockwood; Chris Neely; Chris Zuver; Dave Lim

2003-07-01T23:59:59.000Z

458

Learning to be energy-wise: discriminative methods for load disaggregation  

Science Conference Proceedings (OSTI)

In this paper we describe an ongoing project which develops an automated residential Demand Response (DR) system that attempts to manage residential loads in accordance with DR signals. In this early stage of the project, we propose an approach for identifying ... Keywords: context-awareness, data mining, energy management, non-intrusive, ubiquitous computing

Dwi Rahayu; Balakrishnan Narayanaswamy; Shonali Krishnaswamy; Cyril Labbé; Deva P. Seetharam

2012-05-01T23:59:59.000Z

459

UNICORN: misuse detection for UNICOS  

Science Conference Proceedings (OSTI)

An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other ... Keywords: anomaly detection, computer misuse, auditing, UNICOS, computer security, hacking, intrusion detection, security logs

Gary G. Christoph; Kathleen A. Jackson; Michael C. Neuman; Christine L. B. Siciliano; Dennis D. Simmonds; Cathy A. Stallings; Joseph L. Thompson

1995-12-01T23:59:59.000Z

460

DETECTION OR WARNING SYSTEM  

DOE Patents (OSTI)

This patent application describes a sensitive detection or protective system capable of giving an alarm or warning upon the entrance or intrusion of any body into a defined area or zone protected by a radiation field of suitable direction or extent.

Tillman, J.E.

1951-06-30T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Refining interaction designs through simplicity  

Science Conference Proceedings (OSTI)

With more and more devices in our surroundings, users increasingly-consume applications and digital services which compete for their attention. Therefore, users appreciate simplicity when they interact with them because a less intrusive interaction allows ... Keywords: interaction, mobile devices, simplicity, user-centered design

Pablo Muñoz; Pau Giner; Vicente Pelechano

2010-11-01T23:59:59.000Z

462

Hierarchical multi-pattern matching algorithm for network content inspection  

Science Conference Proceedings (OSTI)

Inspection engines that can inspect network content for application-layer information are urgently required. In-depth packet inspection engines, which search the whole packet payload, can identify the interested packets that contain certain patterns. ... Keywords: Content inspection, Intrusion detection, Network security, Network-level security and protection, Pattern matching, Real-time and embedded systems

Tzu-Fang Sheu; Nen-Fu Huang; Hsiao-Ping Lee

2008-07-01T23:59:59.000Z

463

Processing flows of information: From data stream to complex event processing  

Science Conference Proceedings (OSTI)

A large number of distributed applications requires continuous and timely processing of information as it flows from the periphery to the center of the system. Examples include intrusion detection systems which analyze network traffic in real-time to ... Keywords: Complex event processing, publish-subscribe, stream processing

Gianpaolo Cugola; Alessandro Margara

2012-06-01T23:59:59.000Z

464

HomeTree --- an art inspired mobile eco-feedback visualization  

Science Conference Proceedings (OSTI)

This paper presents HomeTree a prototype of an art-inspired mobile eco-feedback system. The system is implemented on a tablet PC and relies on a non-intrusive energy-monitoring infrastructure to access consumption and power event information. Our prototype ... Keywords: aesthetics, art driven ecofeedback, effective computing, prototyping, sustainability, user interfaces

Filipe Quintal; Valentina Nisi; Nuno Nunes; Mary Barreto; Lucas Pereira

2012-11-01T23:59:59.000Z

465

Layered security architecture for masquerade attack detection  

Science Conference Proceedings (OSTI)

Masquerade attack refers to an attack that uses a fake identity, to gain unauthorized access to personal computer information through legitimate access identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant ... Keywords: anomaly detection, intrusion detection system, masquerade detection, user profiling

Hamed Saljooghinejad; Wilson Naik Bhukya

2012-07-01T23:59:59.000Z

466

The Formation and Maintenance of Density Fronts on the U.S. Southeastern Continental Shelf during Winter  

Science Conference Proceedings (OSTI)

Density fronts on the U.S. southeastern continental shelf, during winter, am formed by (i) breakdown of the shelf-break front by Gulf Stream meanders or strong southward winds or both, (ii) shoreward intrusion of upper Gulf Stream warm water by ...

Lie-Yauw Oey

1986-06-01T23:59:59.000Z

467

Interfacial gravity currents. I. Mixing and entrainment B. R. Sutherland  

E-Print Network (OSTI)

generate bores and/or solitary waves. 15--18 Waves and intrusions are dynamically distinguished in the way is less reliable for # #0.005. B. Available potential energy When the fluid in the lock is mixed is extracted and the lock­fluid released. The kinetic energy is ultimately lost due to viscous dissipa­ tion

Sutherland, Bruce

468

J. Fluid Mech. (2004) Copyright c 2004 Cambridge University Press  

E-Print Network (OSTI)

(1968) that the depth of an energy-conserving gravity current is half that of the ambient fluid ahead-zero . Apparently, the process of generating these waves dominates the dynamics governing the motion of the gravityJ. Fluid Mech. (2004) Copyright c 2004 Cambridge University Press 1 Intrusive Gravity Currents

Sutherland, Bruce

469

Interfacial gravity currents. I. Mixing and entrainment B. R. Sutherland  

E-Print Network (OSTI)

generate bores and/or solitary waves.15­18 Waves and intrusions are dynamically distinguished in the way potential energy When the fluid in the lock is mixed, available potential energy is stored which the potential energy of the fluid per unit width of the tank is PEN L ¯N z gz dz, 6 where ¯N is the measured

Sutherland, Bruce

470

Environments Journal of Arid Environments 63 (2005) 223243  

E-Print Network (OSTI)

Multistage Evolution of Dolerites in the Karoo Large Igneous Province, Central South Africa ELSEJurassic sheet-like intrusions (sills and dykes) are abundant in the Karoo Basin in South Africa, and were emplaced as a part of the Karoo Large Igneous Province. Here we discuss the evolutionary history

Altwegg, Res

471

Censored Truncated Sequential Spectrum Sensing for Cognitive Radio Networks  

E-Print Network (OSTI)

lifetime is a strong function of the energy consumption rates of the different sensors, which are in turn in the consumption of a portion of the initial energy of the sensor on edge (4,5) in the first period, makingLifetime-Aware Intrusion Detection under Safeguarding Constraints Ali Iranli, Hanif Fatemi, Massoud

Leus, Geert

472

A NOVEL LEAKAGE-TOLERANT DOMINO LOGIC CIRCUIT WITH FEEDBACK FROM FOOTER TRANSISTOR IN ULTRA  

E-Print Network (OSTI)

lifetime is a strong function of the energy consumption rates of the different sensors, which are in turn in the consumption of a portion of the initial energy of the sensor on edge (4,5) in the first period, makingLifetime-Aware Intrusion Detection under Safeguarding Constraints Ali Iranli, Hanif Fatemi, Massoud

Mahmoodi, Hamid

473

A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications  

Science Conference Proceedings (OSTI)

International standard bodies such as the Parlay Group, 3GPP (Third Generation Partnership Project), and ETSI TISPAN describe an applications middleware in the form of open service access (OSA)/Parlay Application Programming Interfaces and Parlay X Web ... Keywords: Digital signature and encryption, Intrusion detection and prevention (IDP) system, Middleware vulnerabilities and security threats, SQL Injection attacks, Security assertion markup language (SAML)

Muhammad Sher; Thomas Magedanz

2007-11-01T23:59:59.000Z

474

Improving NFA-based signature matching using ordered binary decision diagrams  

Science Conference Proceedings (OSTI)

Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite automata. Existing representations of finite automata present a well-known ... Keywords: NIDS, ordered binary decision diagrams, signature matching

Liu Yang; Rezwana Karim; Vinod Ganapathy; Randy Smith

2010-09-01T23:59:59.000Z

475

BLID sensor evaluation at a 500-kV substation: an interim report  

SciTech Connect

A joint Sandia Laboratories-Bonneville Power Administration (BPA) evaluation of a buried-line intrusion detection (BLID) sensor is being performed at a 500-kV switching substation. Measurements of the electrical environment and the effects of the environment on the sensor are described.

1979-05-01T23:59:59.000Z

476

Perimeter sensor evaluation at a 500-kV substation. Interim report  

SciTech Connect

A joint Sandia Laboratories-Bonneville Power Administration (BPA) evaluation of exterior perimeter intrusion sensors is being performed at a 500-kV switching substation. Measurements of the electrical environment and the effects of the environment on the sensors are described.

Griffith, R.D.

1978-08-01T23:59:59.000Z

477

Weaver, P.P.E., Schmincke, H.-U., Firth, J.V., and Duffield, W. (Eds.), 1998 Proceedings of the Ocean Drilling Program, Scientific Results, Vol. 157  

E-Print Network (OSTI)

of feldspar crystals from 58 samples of welded ignimbrites, lava flows, fallout tephra layers, and intrusive, and fallout tephra, as well as rare basanite and nephelinite dikes and lavas were erupted between 13.29 Ma spectrum of igneous rocks, as well as frequent explosive rhyolitic, trachytic, and phonolitic fallout ashes

478

Evaluation of commercially available lighting design software  

Science Conference Proceedings (OSTI)

This report addresses the need for commercially available lighting design computer programs and evaluates several of these programs. Sandia National Laboratories uses these programs to provide lighting designs for exterior closed-circuit television camera intrusion detection assessment for high-security perimeters.

McConnell, D.G.

1990-09-01T23:59:59.000Z

479

Acoustics sound systems for baseball  

Science Conference Proceedings (OSTI)

Acoustic considerations impact the design of sound systems for baseball stadiums in several important ways. Intrusion by the sound system into adjacent residential communities must often be minimized. Excess attenuation greatly increases the required high frequency component of acoustic power for sound travelling long distances

2001-01-01T23:59:59.000Z

480

Video analytics algorithm for detecting objects crossing lines in specific direction using blob-based analysis  

Science Conference Proceedings (OSTI)

This paper presents a video analytics algorithm for detecting event of objects crossing predetermined line-of-interest in the scene in specific direction. A fast blob-based analysis is formulated to detect the event, combined with the object detection ... Keywords: line intrusion, surveillance system, tripwire, video analytics, virtual boundary, wrong direction detection

Zulaikha Kadim; Liang kim meng; Norshuhada Samudin; Khairunnisa Mohamed Johari; Khairil Hafriza; Choong Teck Liong; Hon Hock Woon

2012-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "lengshuiqing intrusive assemblage" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

7, 80178033, 2007 burning-tropopause  

E-Print Network (OSTI)

ACPD 7, 8017­8033, 2007 Biomass burning-tropopause mixing J. Brioude et al. Title Page Abstract Discussions Mixing between a stratospheric intrusion and a biomass burning plume J. Brioude1 , O. R. Cooper1.brioude@noaa.gov) 8017 #12;ACPD 7, 8017­8033, 2007 Biomass burning-tropopause mixing J. Brioude et al. Title Page

Paris-Sud XI, Université de

482

Termite and boring insect ground barrier for the protection of wooden structures  

DOE Patents (OSTI)

A method and device are disclosed which prevent the intrusion of insects onto wood structures by using a controlled release device capable of releasing insecticide. In the disclosed method, the device maintains a minimal effective level of insecticide for a predetermined period of time.

Voris, Peter Van (Richland, WA); Cataldo, Dominic A. (Kennewick, WA)

1998-01-01T23:59:59.000Z

483

NILM Applications for the Energy-Efficient Home  

SciTech Connect

We present a forecast for systems-focused applications of non-intrusive load monitoring (NILM), which meet the needs of homeowners, the technology sector, the service sector, and/or utilities. We discuss both near- and long-term applications.

Christensen, D.; Earle, L.; Sparn, B.

2012-11-01T23:59:59.000Z

484

A Study on the PV System for Simulation Representing Characteristics of DSSC  

Science Conference Proceedings (OSTI)

It is an important factor for the honeypot decoy system to accurately analyze on intrusion information and precisely locate them. As there are some conflict and cooperation relationship among the collected data by honeypot system, it needs to fuse the ... Keywords: Dye-Sensitized Solar Cell, PV system, DLL block, Microsoft Visual C++, PSIM

Won-Yong Chae; Kyoung-Jun Lee; Ho-Sung Kim; Dong-Gil Lee; Hee-Je Kim

2010-05-01T23:59:59.000Z

485

Integrated alarm annunciation and entry control systems -- Survey results  

SciTech Connect

This report provides the results and analyses of a detailed survey undertaken in Summer 1993 to address integrated intrusion detection alarm annunciation and entry control system issues. This survey was undertaken as a first attempt toward beginning to answer questions about integrated systems and commercial capabilities to meet or partially meet US Department of Energy (DOE) site needs.

Clever, J.J.; Arakaki, L.H.; Monaco, F.M.; Juarros, L.E.; Quintana, G.R.

1993-10-01T23:59:59.000Z

486

JJ, IAP Cambridge January 20101 Fusion Energy & ITER:Fusion Energy & ITER  

E-Print Network (OSTI)

Safety ­­ No run away effectNo run away effect ­ No proliferation ·· WastesWastes ­­ Neutron induced activationBurning plasmas __''s! +s! + couplingcoupling withwith transporttransport ·· Non intrusive diagnosticsNon organisationorganisation International Organisation: Independent, treaty based as UN or UNESCO 7 partners, 32 countries 450

487

Dark flash photography  

Science Conference Proceedings (OSTI)

Camera flashes produce intrusive bursts of light that disturb or dazzle. We present a prototype camera and flash that uses infra-red and ultra-violet light mostly outside the visible range to capture pictures in low-light conditions. This "dark" flash ... Keywords: computational photography, dark flash, multi-spectral imaging, spectral image correlations

Dilip Krishnan; Rob Fergus

2009-07-01T23:59:59.000Z

488

A holistic approach to service survivability  

Science Conference Proceedings (OSTI)

We present SABER (Survivability Architecture: Block, Evade, React), a proposed survivability architecture that blocks, evades and reacts to a variety of attacks by using several security and survivability mechanisms in an automated and coordinated fashion. ... Keywords: intrusion detection, overlay networks, survivability

Angelos D. Keromytis; Janak Parekh; Philip N. Gross; Gail Kaiser; Vishal Misra; Jason Nieh; Dan Rubenstein; Sal Stolfo

2003-10-01T23:59:59.000Z

489

Configuration-based IDS for advanced metering infrastructure  

Science Conference Proceedings (OSTI)

Smart grid deployment initiatives have been witnessed in the past recent years. Smart grids provide bi-directional communication between meters and headend system through Advanced Metering Infrastructure (AMI). Recent studies highlight the threats targeting ... Keywords: advanced metering infrastructure, intrusion detection systems, smart grid

Muhammad Qasim Ali, Ehab Al-Shaer

2013-11-01T23:59:59.000Z

490

Flow processing and the rise of commodity network hardware  

Science Conference Proceedings (OSTI)

The Internet has seen a proliferation of specialized middlebox devices that carry out crucial network functionality such as load balancing, packet inspection and intrusion detection. Recent advances in CPU power, memory, buses and network connectivity ... Keywords: architecture, flow processing, internet, virtualization

Adam Greenhalgh; Felipe Huici; Mickael Hoerdt; Panagiotis Papadimitriou; Mark Handley; Laurent Mathy

2009-03-01T23:59:59.000Z

491

Reducing false positives in anomaly detectors through fuzzy alert aggregation  

Science Conference Proceedings (OSTI)

In this paper we focus on the aggregation of IDS alerts, an important component of the alert fusion process. We exploit fuzzy measures and fuzzy sets to design simple and robust alert aggregation algorithms. Exploiting fuzzy sets, we are able to robustly ... Keywords: Aggregation, Anomaly detection, Fuzzy measures, Fuzzy sets, Intrusion detection, Multisensor fusion

Federico Maggi; Matteo Matteucci; Stefano Zanero

2009-10-01T23:59:59.000Z

492

A novel technique of recognising multi-stage attack behaviour  

Science Conference Proceedings (OSTI)

With the increasing amount of security audit data, management and analysis of it become a critical and challenging issue. Security alerts and threat analysis project (SATA) aims at analysing security events and detecting security threat. In this ... Keywords: attack plan recognition, correlativity, intrusion detection, multi-stage attacks, security alerts, security threats, threat analysis

Li Wang; Yao Li; Zhi-tang Li

2010-12-01T23:59:59.000Z

493

Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment  

Science Conference Proceedings (OSTI)

With the growing deployment of host and network intrusion detection systems, managing alerts from these systems becomes critically important. A promising approach is to develop a cooperation module between several IDS to achieve alerts correlation and ... Keywords: alert correlation, prerequisites and consequences, hyper-alert type, vulnerability tuple

Wen Long; Yang Xin; Yixian Yang

2009-07-01T23:59:59.000Z

494

Survey A model-based survey of alert correlation techniques  

Science Conference Proceedings (OSTI)

As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely ... Keywords: Alert correlation, Fault localization, Intrusion detection systems, Network management systems, SCADA systems

Saeed Salah; Gabriel Maciá-FernáNdez; JesúS E. DíAz-Verdejo

2013-04-01T23:59:59.000Z

495

MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences  

Science Conference Proceedings (OSTI)

Most of the prevalent anomaly detection systems use some training data to build models. These models are then utilized to capture any deviations resulting from possible intrusions. The efficacy of such systems is highly dependent upon a training data ... Keywords: anomaly detection, data cleaning, motifs

Gaurav Tandon; Philip Chan; Debasis Mitra

2004-10-01T23:59:59.000Z

496

Weighting versus pruning in rule validation for detecting network and host anomalies  

Science Conference Proceedings (OSTI)

For intrusion detection, the LERAD algorithm learns a succinct set of comprehensible rules for detecting anomalies, which could be novel attacks. LERAD validates the learned rules on a separate held-out validation set and removes rules that cause ... Keywords: anomaly detection, machine learning, rule pruning, rule weighting

Gaurav Tandon; Philip K. Chan

2007-08-01T23:59:59.000Z

497

Monitoring smartphones for anomaly detection  

Science Conference Proceedings (OSTI)

In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection ... Keywords: anomaly detection, monitoring, smartphones

Aubrey-Derrick Schmidt; Frank Peters; Florian Lamour; Christian Scheel; Seyit Ahmet Çamtepe; Sahin Albayrak

2009-02-01T23:59:59.000Z

498

A bi-modal face recognition framework integrating facial expression with facial appearance  

Science Conference Proceedings (OSTI)

Among many biometric characteristics, the facial biometric is considered to be the least intrusive technology that can be deployed in the real-world visual surveillance environment. However, in facial biometric, little research attention has been paid ... Keywords: Biometrics, Facial appearance, Facial expression, Fusion techniques, Human Computer Interface (HCI), Multimodal biometrics

Pohsiang Tsai; Longbing Cao; Tom Hintz; Tony Jan

2009-09-01T23:59:59.000Z

499

IRA-WDS: A GIS-based risk analysis tool for water distribution systems  

Science Conference Proceedings (OSTI)

This paper presents the development of a new software tool IRA-WDS. This GIS-based software predicts the risks associated with contaminated water entering water distribution systems from surrounding foul water bodies such as sewers, drains and ditches. ... Keywords: Contaminant intrusion, Developing countries, GIS, Intermittent water supply, Risk assessment, Tight coupling, Water supply

K. Vairavamoorthy; Jimin Yan; Harshal M. Galgale; Sunil D. Gorantiwar

2007-07-01T23:59:59.000Z

500

Evading stepping-stone detection under the cloak of streaming media with SNEAK  

Science Conference Proceedings (OSTI)

Network-based intrusions have become a serious threat to the users of the Internet. To help cover their tracks, attackers launch attacks from a series of previously compromised systems called stepping stones. Timing correlations on incoming and outgoing ... Keywords: Stepping-stone detection, Time-based watermarking, Traffic analysis

Jaideep D. Padhye; Kush Kothari; Madhu Venkateshaiah; Matthew Wright

2010-09-01T23:59:59.000Z