Sample records for lengshuiqing intrusive assemblage

  1. A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage...

    Open Energy Info (EERE)

    sulphide-bearing mafic magma from a larger staging chamber. Authors Marian Munteanu, Allan H. Wilson, Yong Yao, Shao-Yong Jiang, Gordon Chunnett, Yaonan Luo, Leonard Mafurutu...

  2. A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 Windthe CommissionEnergyEnergySeismicGeothermal

  3. NonIntrusive Conservative

    E-Print Network [OSTI]

    Läufer, Konstantin

    A Look at Non­Intrusive Conservative Garbage Collection Purdue University Page 1 of 16 A Look at Non­Intrusive Conservative Garbage Collection Gustavo Rodriguez­Rivera Vincent Russo Purdue University {grr,russo@cs.purdue.edu} #12; A Look at Non­Intrusive Conservative Garbage Collection Purdue

  4. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01T23:59:59.000Z

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  5. austurhorn intrusive complex: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Institute (EPRI Hubbard, Susan 5 Security Intrusion & Detection Security Intrusion Computer Technologies and Information Sciences Websites Summary: intrusions, log suspicious...

  6. EUROPEAN CONFERENCE FOR AEROSPACE SCIENCES Semi-intrusive and non-intrusive stochastic methods for

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    4TH EUROPEAN CONFERENCE FOR AEROSPACE SCIENCES Semi-intrusive and non-intrusive stochastic methods, 33400 Talence, France Abstract In this work we present semi-intrusive and non-intrusive techniques and non-intrusive. The intrusive technique consist to write an ad-hoc code by modifying an existing

  7. Acoustic emission intrusion detector

    DOE Patents [OSTI]

    Carver, Donald W. (Knoxville, TN); Whittaker, Jerry W. (Knoxville, TN)

    1980-01-01T23:59:59.000Z

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  8. Intrusion detection sensor testing tools

    SciTech Connect (OSTI)

    Hayward, D.R.

    1994-08-01T23:59:59.000Z

    Intrusion detection sensors must be frequently tested to verify that they are operational, and they must be periodically tested to verify that they are functioning at required performance levels. Concerns involving this testing can include: The significant amount of manpower required, inconsistent results due to variability in methods and personnel, exposure of personnel to hazardous environments, and difficulty in obtaining access to the areas containing some of the intrusion sensors. To address these concerns, the Department of Energy directed Sandia National Labs. to develop intrusion detection sensor testing tools. Over the past two years Sandia has developed several sensor testing tool prototypes. This paper describes the evolution of an exterior intrusion detection sensor tester and automatic data logger, and also describes various interior intrusion detection sensor test fixtures that can be remotely activated to simulate an intruder.

  9. Buried fiber optic intrusion sensor 

    E-Print Network [OSTI]

    Maier, Eric William

    2004-09-30T23:59:59.000Z

    A distributed fiber optic intrusion sensor capable of detecting intruders from the pressure of their weight on the earth's surface was investigated in the laboratory and in field tests. The presence of an intruder above or in proximity...

  10. Gas intrusion into SPR caverns

    SciTech Connect (OSTI)

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

    1995-12-01T23:59:59.000Z

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  11. acquisition intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Next Page Last Page Topic Index 1 Security Intrusion & Detection Security Intrusion Computer Technologies and Information Sciences Websites Summary: intrusions, log suspicious...

  12. Intrusive gravity currents in two-layer

    E-Print Network [OSTI]

    Flynn, Morris R.

    Intrusive gravity currents in two-layer stratified media Morris R. Flynn & Paul F. Linden Dept.avalanche.org/pictures #12;· `Microbursts' pose a non-trivial threat to airplane safety Introduction Impacts on human health;· Whereas gravity currents travel along a solid boundary, intrusive gravity currents or intrusions propagate

  13. Buried fiber optic intrusion sensor

    E-Print Network [OSTI]

    Maier, Eric William

    2004-09-30T23:59:59.000Z

    to the buried sensor induces a phase shift in light propagating along the fiber which allows for the detection and localization of intrusions. Through the use of an ultra-stable erbium-doped fiber laser and phase sensitive optical time domain reflectometry...

  14. Land Assemblage Tax Credit Program (Missouri)

    Broader source: Energy.gov [DOE]

    The Land Assemblage Tax Credit Programs the redevelopment of blighted areas in Missouri into productive use. Redevelopers must incur acquisition costs for at least 50 acres of 75+ acre parcels,...

  15. The Statistical Upper Mantle Assemblage Anders Meibom*

    E-Print Network [OSTI]

    Anderson, Don L.

    Mantle Assemblage', which forms as the result of long-term plate tectonic recycling of sedimentary-3] and noble gases [4] has led to the notion that the source region for "normal" MORB (N-MORB), referred

  16. Effect on Speed Distribution due to Intrusive and Non-Intrusive Portable Speed Measurement Devices

    E-Print Network [OSTI]

    Jasrotia, Romika

    2011-06-02T23:59:59.000Z

    , placing traffic signs, and determining the effectiveness of the countermeasures. To evaluate the effectiveness on speed distribution due to the presence of various intrusive and non-intrusive portable speed measurement devices, automated traffic counters...

  17. Non-intrusive Occupancy Inferencing using Opportunistically Available Sensor Sources

    E-Print Network [OSTI]

    Ting, Kevin H

    2014-01-01T23:59:59.000Z

    10. Chen, Dong, et al. "Non-Intrusive Occupancy MonitoringACM, 15. Zoha, Ahmed, et al. "Non-intrusive load monitoringCalifornia Los Angeles Non-intrusive Occupancy Inferencing

  18. adaptive intrusion data systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    approaches: known pattern Pei, Jian 4 Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems CiteSeer Summary: Next generation cyberspace intrusion...

  19. Intrusion Detection Techniques in Sensor Aikaterini Mitrokotsa

    E-Print Network [OSTI]

    to the network administrator because communication between the access point and the clients is broadcastPDF PROOF Intrusion Detection Techniques in Sensor Networks Aikaterini Mitrokotsa Department Research has been conducted in wired network Intrusion Detection Systems (IDS) for over 25 years. Although

  20. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30T23:59:59.000Z

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  1. Advanced technologies for perimeter intrusion detection sensors

    SciTech Connect (OSTI)

    Williams, J.D.

    1995-03-01T23:59:59.000Z

    The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

  2. Meta-compilation non intrusive du filtrage par contraintes Non intrusive meta-compilation of matching by constraints

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    M´eta-compilation non intrusive du filtrage par contraintes Non intrusive meta´eta-compilation non intrusive du filtrage par contraintes Historique 31 ao^ut 2004 V 0.8 cr´eation du document 15 inria-00280939,version1-20May2008 #12;MANIFICO ­ M´eta-compilation non intrusive du filtrage par

  3. Autonomous Rule Creation for Intrusion Detection

    SciTech Connect (OSTI)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01T23:59:59.000Z

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  4. Intrusion detection in mobile ad hoc networks

    E-Print Network [OSTI]

    Sun, Bo

    2005-08-29T23:59:59.000Z

    .Zone-BasedIntrusionDetectionSystem(ZBIDS)...... 25 1. ZBIDSFramework.................... 25 D.InternalModeloftheIDSAgent............... 29 1. DataCollectionModule................. 30 2. DetectionEngine..................... 31 3. Local Aggregation and Correlation Engine (LACE) . . 32 4. Global... have been widely regarded as being part of the solution to protect today?s computer systems. Research on IDSs began with a report by Anderson [9] followed by Denning?s seminal paper [10], which lays the foundation for most of the current intrusion...

  5. A system for distributed intrusion detection

    SciTech Connect (OSTI)

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

    1991-01-01T23:59:59.000Z

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  6. AIDE - Advanced Intrusion Detection Environment

    SciTech Connect (OSTI)

    Smith, Cathy L.

    2013-04-28T23:59:59.000Z

    Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

  7. antilles assemblage structure: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

  8. assemblage southwestern kerman: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

  9. aquatic insect assemblages: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Assemblages Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance...

  10. assemblages reaction progress: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

  11. Vapor intrusion modeling : limitations, improvements, and value of information analyses

    E-Print Network [OSTI]

    Friscia, Jessica M. (Jessica Marie)

    2014-01-01T23:59:59.000Z

    Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

  12. Non-intrusive fault detection in reciprocating compressors

    E-Print Network [OSTI]

    Schantz, Christopher James

    2011-01-01T23:59:59.000Z

    This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

  13. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  14. Scalability of Non-intrusive Load Monitoring for Shipboard Applications

    E-Print Network [OSTI]

    Paris, James

    2009-01-01T23:59:59.000Z

    The non-intrusive load monitor has been demonstrated as an effective tool for evaluating and monitoring shipboard electro-mechanical systems through analysis of electrical power data. A key advantage of the non-intrusive ...

  15. technology offer Non-Intrusive Remote Oscillator Measurement for

    E-Print Network [OSTI]

    Szmolyan, Peter

    technology offer Non-Intrusive Remote Oscillator Measurement for Distributed Systems based on Flex are quite intrusive: they require physical access to each single node and might interrupt system operation

  16. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect (OSTI)

    Todd Vollmer; Milos Manic

    2009-08-01T23:59:59.000Z

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  17. Non-Intrusive User Interfaces for Interactive Digital Television Experiences

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Non-Intrusive User Interfaces for Interactive Digital Television Experiences Pablo Cesar1 , Dick C.Cruz-Lara@loria.fr, Julien.Ducret@loria.fr Abstract. This paper presents a model and architecture for non-intrusive user to consume and interact with television content. We refer to this model as non-intrusive user interfaces

  18. Non-intrusive Lightweight Agents for Information Management

    E-Print Network [OSTI]

    Graham, Nick

    Non-intrusive Lightweight Agents for Information Management S. Varma D.B. Skillicorn November 1997 a non-intrusive approach to building information management systems, based on software agents. Software is a non-intrusive, lightweight software agent that manages bookmarks web browser pointers to favourite

  19. Developing Performance Models from Non-intrusive Monitoring Traces

    E-Print Network [OSTI]

    Murphy, John

    Developing Performance Models from Non- intrusive Monitoring Traces Daniela Mania, John Murphy transactions within the system at run-time using non-intrusive monitoring. Our belief is this methodology obtained by non-intrusive monitoring of an EJB-based e-commerce application. Moreover, the methodology

  20. Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    1 Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System Fanglu Guo Tzi normalization. Index Terms Packet (traffic) analysis, stateful firewall, network intrusion detection system intrusion detection system (NIDS). Stateful firewall analyzes packets up to their layer 4 headers while NIDS

  1. MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT

    E-Print Network [OSTI]

    Noel, Steven

    MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

  2. Asynchronous intrusion recovery for interconnected web services

    E-Print Network [OSTI]

    Sabatini, David M.

    Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, and tracking down and recovering from such an attack re- quires significant manual effort. Web services for such web services. Aire addresses several challenges, such as propagating repair across services when some

  3. Intrusion Detection via Static Analysis David Wagner

    E-Print Network [OSTI]

    Wagner, David

    Xerox PARC ddean@parc.xerox.com Abstract One of the primary challenges in intrusion detection degree of automation, pro­ tection against a broad class of attacks based on corrupted code. Beginning with Sun's introduction of the Java language and its support of mobile code in 1995, pro­ gramming

  4. Freshwater Flow, Saltwater Intrusion, Paper Mill Effluent, and Fish Assemblage Structure in the Lower Neches River, Texas

    E-Print Network [OSTI]

    Pizano, Rebecca I

    2013-06-11T23:59:59.000Z

    during fall 2011 and summer 2012, after a season of rain. During fall 2011, sites surveyed above the barrier had lower salinity but similarly low dissolved oxygen (DO) levels compared with sites surveyed below the barrier. Salinity levels during fall 2011...

  5. Distributed fiber optic moisture intrusion sensing system

    DOE Patents [OSTI]

    Weiss, Jonathan D. (Albuquerque, NM)

    2003-06-24T23:59:59.000Z

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  6. Non-intrusive refrigerant charge indicator

    DOE Patents [OSTI]

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22T23:59:59.000Z

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  7. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

    1989-08-15T23:59:59.000Z

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  8. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15T23:59:59.000Z

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  9. Nearshore fish assemblages associated with introduced predatory fishes in lakes

    E-Print Network [OSTI]

    Ricciardi, Anthony

    investigated the relationship between the presence of introduced largebodied predatory fishes (largemouth bass: impact; invasive species; native fishes; pike; largemouth bass; rock bass; smallmouth bass; walleyeNearshore fish assemblages associated with introduced predatory fishes in lakes JUSTIN TRUMPICKASa

  10. ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY ASSEMBLAGES

    E-Print Network [OSTI]

    ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY ASSEMBLAGES in Environmental Science and titled "ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY with endophytic fungi. Cheatgrass populations were sampled across North America and endophytes were isolated from

  11. Video Installation Design: Appropriation and Assemblage As Projection Surface Geometry

    E-Print Network [OSTI]

    Weaver, Timothy A.

    2010-07-14T23:59:59.000Z

    This area of research focuses on the use of video projections in the context of fine art. Emphasis is placed on creating a unique video installation work that incorporates assemblage and appropriation as a means to develop multiple complex...

  12. Fish assemblages on coral reefs in Guanaja, Bay Islands, Honduras

    E-Print Network [OSTI]

    Mahendran, Christopher Kandiah

    1999-01-01T23:59:59.000Z

    FISH ASSEMBLAGES ON CORAL REEFS IN GUANAJA, BAY ISLANDS, HONDURAS A Thesis by CHRISTOPHER KANDIAH MAHENDRAN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 1999 Major Subject: Wildlife and Fisheries Sciences FISH ASSEMBLAGES ON CORAL REEFS IN GUANAJA, BAY ISLANDS, HONDURAS A Thesis by CHRISTOPHER KANDIAH MAHENDRAN Submitted to Texas A&M University in partial fulfillment...

  13. The architecture of a network level intrusion detection system

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.; Maccabe, A.; Servilla, M. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1990-08-15T23:59:59.000Z

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  14. automated intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CLASS FILES, VOL. 1, NO. 11, NOVEMBER 2002 1 Hi-DRA: Intrusion Detection for Internet Security Computer Technologies and Information Sciences Websites Summary: for Internet...

  15. adaptive intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Adaptive Model Generation for Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: Adaptive Model Generation for...

  16. Intrusion Detection, Diagnosis, and Recovery with SelfSecuring Storage

    E-Print Network [OSTI]

    Intrusion Detection, Diagnosis, and Recovery with Self­Securing Storage John Strunk, Garth Goodson Carnegie Mellon University Pittsburgh, 15213 Abstract Self­securing storage turns storage devices active parts of intrusion survival strategy. From behind storage interface (e.g., SCSI CIFS), a self

  17. A Network-Processor-Based Traffic Splitter for Intrusion Detection

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    1 A Network-Processor-Based Traffic Splitter for Intrusion Detection Ioannis Charitakis, Kostas processor and evaluated its performance using a combination of experimental evaluation and simulation. Our network-level security and protection, Network Processors, Intrusion Detection I. Charitakis and E. P

  18. The Stabilisation Potential of Individual and Mixed Assemblages of Natural Bacteria and Microalgae

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Stabilisation Potential of Individual and Mixed Assemblages of Natural Bacteria and Microalgae components (heterotrophic bacteria and autotrophic microalgae) in terms of their individual contribution benthic assemblages (prokaryotic, eukaryotic and mixed cultures) of bacteria and microalgae. Mag

  19. Temporal Changes in a Tropical Nekton Assemblage and

    E-Print Network [OSTI]

    Temporal Changes in a Tropical Nekton Assemblage and Performance of a Prawn Selective Gear TING and weights of 39 trials conductedfor a selective prawning gear whose performance in bycatch reduc tionI., 1975; Rob erts, 1978; Allen and Coates, 1990), but is extremely rich in the marine coun terpart

  20. ORIGINAL ARTICLE Diatom assemblages promote ice formation in large

    E-Print Network [OSTI]

    Lee Jr., Richard E.

    ORIGINAL ARTICLE Diatom assemblages promote ice formation in large lakes NA D'souza1,3 , Y evidence for the directed formation of ice by planktonic communities dominated by filamentous diatoms sampled from the ice-covered Laurentian Great Lakes. We hypothesize that ice formation promotes attachment

  1. Fossil evidence for serpentinization fluids fueling chemosynthetic assemblages

    E-Print Network [OSTI]

    Demouchy, Sylvie

    Fossil evidence for serpentinization fluids fueling chemosynthetic assemblages Franck Lartauda,b,1 years, Lost City on the Mid-Atlantic Ridge (MAR) is remarkable both for its alkaline fluids derived from these fluids. Despite high concentrations of reduced chemicals in the fluids, this unique example of a serpenti

  2. EFFECTS OF EGREGIA MENZIESII POPULATIONS ON ROCKY INTERTIDAL BENTHIC ASSEMBLAGES

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Bancroft Hughes Egregia menziesii is a large and robust perennial kelp that creates a structurally complex or the annual life-histories of some algal species. Similar effects of kelp on benthic assemblages have been observed in temperate waters around the world for intertidal kelp or subtidal kelp that lacks floatation

  3. Shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Ramsey, Jack S

    2004-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM ...

  4. A framework for non-intrusive load monitoring and diagnostics

    E-Print Network [OSTI]

    Paris, James, Ph. D. Massachusetts Institute of Technology

    2006-01-01T23:59:59.000Z

    The widespread use of electrical and electromechanical systems places increasing demands on monitoring and diagnostic techniques. The non-intrusive load monitor (NILM) provides a low-cost, low-maintenance way to perform ...

  5. Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks

    E-Print Network [OSTI]

    Hassanzadeh, Amin

    2014-05-03T23:59:59.000Z

    detection can be achieved in such resource constrained environments. The major challenges that hinder the performance of intrusion detection systems (IDS) in WMN are resources (e.g., energy, processing, and storage capabilities) accompanied by the adhoc...

  6. Minimally intrusive strategies for fault detection and energy monitoring

    E-Print Network [OSTI]

    Cox, Robert Williams, 1979-

    2006-01-01T23:59:59.000Z

    This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

  7. Improving shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

  8. Harmonic approaches to non-intrusive load diagnostics

    E-Print Network [OSTI]

    Fuller, Ashley E. (Ashley Eliot)

    2008-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

  9. Rule Mode Selection in Intrusion Detection and Prevention Systems

    E-Print Network [OSTI]

    Boutaba, Raouf

    to maximize the security enforcement levels while avoiding any unnecessary network performance degradation to strike a balance between system security and network performance. Index Terms--Security Performance Evaluation, Security Management, Security Configuration. I. INTRODUCTION Intrusion Detection and

  10. Number of Waste Package Hit by Igneous Intrusion

    SciTech Connect (OSTI)

    M. Wallace

    2004-10-13T23:59:59.000Z

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios.

  11. From Measurements to Sustainable Choices: Non-intrusive Fine-grained Sensing of Resource Usage in Buildings

    E-Print Network [OSTI]

    Jalali. Bahram

    From Measurements to Sustainable Choices: Non-intrusive Fine- grained Sensing of Resource Usage. Example pictures of non-intrusive pipe level water monitoring test-bed and non- intrusive appliance power

  12. Threshold Verification Technique for Network Intrusion Detection System

    E-Print Network [OSTI]

    Faizal, M A; Shahrin, S; Robiah, Y; Rahayu, S Siti; Nazrulazhar, B

    2009-01-01T23:59:59.000Z

    Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for I...

  13. A new technique for non-intrusive in situ measurements of symbiotic

    E-Print Network [OSTI]

    Ilan, Micha

    A new technique for non-intrusive in situ measurements of symbiotic photosynthesis Symbiotic algae the Diving-PAM for underwater photosynthetic measurements lies in the method's non-intrusive nature

  14. Fast and Accurate Embedded Systems Energy Characterization Using Non-intrusive

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Fast and Accurate Embedded Systems Energy Characterization Using Non-intrusive Measurements Nicolas system energy model based on non-intrusive measurements. This model aims at being inte- grated in fast

  15. Embedded Software Energy Characterization: using non-intrusive measures for application

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Embedded Software Energy Characterization: using non-intrusive measures for application source code propose a complete system energy model based on non-intrusive measurements. This model aims at being

  16. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    SciTech Connect (OSTI)

    Feero, Amie J. [Washington River Protection Systems, Richland, WA (United States); Washenfelder, Dennis J. [Washington River Protection Systems, Richland, WA (United States); Johnson, Jeremy M. [USDOE Office of River Protection, Richland, WA (United States); Schofield, John S. [Washington River Protection Systems, Richland, WA (United States)

    2013-11-14T23:59:59.000Z

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  17. Detecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson

    E-Print Network [OSTI]

    Hutchinson, Seth

    the design process. With this in mind, researchers have begun to address security issues specific to controlDetecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson to a remote-controlled system (deemed an "intrusion fault" or "intrusion") despite attempts to conceal

  18. Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System

    E-Print Network [OSTI]

    Sanyal, Sugata

    Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System@rediffmail.com Abstract The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Artificial Immune System along with Genetic algorithm to develop an Intrusion Detection System. Far from

  19. Non-Intrusive Design of Concurrently Self-Testable FSMs Petros Drineas

    E-Print Network [OSTI]

    Drineas, Petros

    Non-Intrusive Design of Concurrently Self-Testable FSMs Petros Drineas£ and Yiorgos Makris.makris @yale.edu Abstract We propose a methodology for non-intrusive design of concurrently self-testable FSMs parity-based state encoding, the proposed method is non-intrusive and does not interfere

  20. Non-intrusive coupling: an attempt to merge industrial and research software capabilities

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Non-intrusive coupling: an attempt to merge industrial and research software capabilities Olivier features required for "real-life" industrial simulations. Non-intrusive coupling is a tentative answer are the basis of most indus- trial computational environments. Non-intrusive coupling [11, 12] is a tentative

  1. A New Approach To Robust Non-Intrusive Traffic Detection at Intersections!

    E-Print Network [OSTI]

    Minnesota, University of

    A New Approach To Robust Non-Intrusive Traffic Detection at Intersections! Chad Stelzig ­ Algorithm Solutions! Background and Terminology !! § "Non-Intrusive Detection Systems"! § Above ground detection accuracy with a non- intrusive system! #12;Global Solutions! Single Sensor Detection Systems! § Any

  2. Supporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision History

    E-Print Network [OSTI]

    Robillard, Martin

    Supporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision in empirical studies of pro- grammers. The revision history is collected non-intrusively, and does not depend. Studying these activities for the sake of finding patterns and analyzing their nature requires non-intrusive

  3. Using Hidden Markov Models for Iterative Non-intrusive Appliance Monitoring

    E-Print Network [OSTI]

    Southampton, University of

    Using Hidden Markov Models for Iterative Non-intrusive Appliance Monitoring Oliver Parson, Hampshire, SO17 1BJ, UK {op106,sg2,mjw,acr}@ecs.soton.ac.uk Abstract Non-intrusive appliance load monitoring appliances. 1 Introduction Non-intrusive appliance load monitoring (NIALM), or energy disaggregation, aims

  4. A Non-Intrusive Monitoring System for Ambient Assisted Living Service Delivery

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Non-Intrusive Monitoring System for Ambient Assisted Living Service Delivery Willy All : Italy (2012)" #12;2 A Non-Intrusive Monitoring System for AAL Service Delivery Previous works from [6 is intrusive, and the massive deployment of sensors in the environment which implies a significant financial

  5. Approximate logic circuits for low overhead, non-intrusive concurrent error detection

    E-Print Network [OSTI]

    Mohanram, Kartik

    Approximate logic circuits for low overhead, non-intrusive concurrent error detection Mihir R for the synthesis of approximate logic circuits. A low overhead, non-intrusive solution for concurrent error as proposed in this paper. A low overhead, non-intrusive solution for CED based on ap- proximate

  6. Non-intrusive coupling: an attempt to merge industrial and research software capabilities

    E-Print Network [OSTI]

    Non-intrusive coupling: an attempt to merge industrial and research software capabilities Olivier features required for "real-life" industrial simulations. Non-intrusive coupling is a tentative answer indus- trial computational environments. Non-intrusive coupling [11, 12] is a tentative answer

  7. A non-intrusive stochastic Galerkin approach for modeling uncertainty propagation in

    E-Print Network [OSTI]

    Zabaras, Nicholas J.

    A non-intrusive stochastic Galerkin approach for modeling uncertainty propagation in deformation or significant additions. In this paper we present an approach called Non-Intrusive Stochastic Galerkin (NISG-Carlo based stochastic analysis of de- formation process although relatively non-intrusive and trivial

  8. IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan

    E-Print Network [OSTI]

    IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan School of Computing to monitor and protect their virtual existence by implementing their own intrusion detection capabilities along with other security technologies within the cloud fabric. Intrusion Detection as a Service (IDSaa

  9. NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System

    E-Print Network [OSTI]

    Ezeife, Christie

    NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System C.I. Ezeife wireless intrusion detection systems, this paper presents a method of applying artificial neural networks mining clas- sification technique to wireless network intrusion detection system. The proposed system

  10. A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1

    E-Print Network [OSTI]

    Lee, Wenke

    A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1 , Wenke Lee2, athomas}@cc.gatech.edu Abstract The current generation of centralized network intrusion detection systems that intrusion detection analysis should be distributed to network node IDS (NNIDS) running in hardware

  11. Distributed fiber optic intrusion sensor system for monitoring long perimeters

    E-Print Network [OSTI]

    Juarez, Juan C.

    2009-06-02T23:59:59.000Z

    Perturbation ........................ 17 G. Frequency Drift Measurement................................................................... 19 III ERBIUM DOPED FIBER LASER CHARACTERIZATION........................ 22 A. Er:Fiber Laser... .................................................................................................... 22 12. Experimental setup for fiber laser used in the intrusion sensor system ............. 24 13. Spectral linewidth scan of Erbium doped fiber laser ......................................... 24 14. Delayed self-heterodyne test setup...

  12. LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED

    E-Print Network [OSTI]

    Smith, Sean W.

    challenge, since on top of the resource restrictions inherent to embedded devices, SCADA systems must to intrusion detection for SCADA systems, and are currently porting Autoscopy to actual power hardware to test operating as part of a SCADA system, where this logic applies to the control of potentially hazardous

  13. Energy Efficient Intrusion Detection in Camera Sensor Networks

    E-Print Network [OSTI]

    Guibas, Leonidas J.

    Energy Efficient Intrusion Detection in Camera Sensor Networks Primoz Skraba1 and Leonidas Guibas2 on low cost, low bandwidth sensors. With dropping costs and advances in imaging technology, there is now of challenges. If used continuously, cameras consume too much energy to operate on battery power. While

  14. Evaluation of Non-intrusive Traffic Detection Technologies Phase III

    E-Print Network [OSTI]

    Minnesota, University of

    TPF-5(171) Evaluation of Non-intrusive Traffic Detection Technologies Ð Phase III #12 not intrude into pavement for installation. ·! Sensors above, below or to the side of the roadway qualify;Miovision #12;Miovision #12;Laser-based sensors #12;PEEK AxleLight #12;TIRTL #12;TIRTL #12;#12;#12;#12;

  15. A Statistical Framework for Intrusion Detection in Ad Hoc Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    with limited processing power. The overall framework provides a good balance between complexity and performance means of electronic com- munication in areas where establishing infrastructure like base stations etc. [5], [6]. These intrusions leverage system vulnerabilities. There are two ways to prevent

  16. Visual monitoring environments, such as intrusion detection systems, debugging

    E-Print Network [OSTI]

    Erbacher, Robert F.

    Abstract Visual monitoring environments, such as intrusion detection systems, debugging environments, and feature extraction systems, require that a user familiar with the target domain examine, most in an efficient form. How the users employ the environment and the type and quantity of data will also affect

  17. UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection

    E-Print Network [OSTI]

    Zhou, Yuanyuan

    targets for terrorists and criminals to break-in. Intrusions can compromise the integrity, confidentiality Slammer Worm in less than seven hours the Internet traffic was overloaded to the point that many private]. Similarly, the ReVirt system [16] can record all actions below the level of the virtual machine, allowing

  18. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect (OSTI)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01T23:59:59.000Z

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  19. Robust and Scalable Trust Management for Collaborative Intrusion Detection

    E-Print Network [OSTI]

    Boutaba, Raouf

    peer. We evaluate our system based on a simulated collaborative host-based IDS network) identify intrusions by comparing observable behavior against suspicious patterns. They can be network-based to evaluate the trustworthiness of participating IDSes, especially when they are host-based. In this work, we

  20. Long-term history of chemosynthetic molluscan assemblages at Gulf of Mexico hydrocarbons seep sites

    E-Print Network [OSTI]

    Warren, Kenneth Anderson

    1995-01-01T23:59:59.000Z

    , Vesicomya cordata, and Calyptogena ponderosa, harbor sulfur-oxidizing symbionts. Seep assemblages from three sites, GB-386, GB-425, and GC-234, were sampled by piston core, in order to determine the long-term history of these assemblages from their preserved...

  1. Stimulation of Alexandrium fundyense growth by bacterial assemblages from the Bay of Fundy

    E-Print Network [OSTI]

    Rooney-Varga, Juliette N.

    on Alexandrium fundyense str. CB301 growth. Methods and Results: Bacterial assemblages were collected from into axenic CB301 cultures. Bacterial assemblages dramatically enhanced CB301 growth. Retrieval and analysis factors that control Alexandrium distributions (e.g. Anderson et al. 1983, 1990a; Rasmussen and Richardson

  2. THE INVERTEBRATE ASSEMBLAGE ASSOCIATED WITH THE GIANT KELP, MACROCYSTIS PYRIFERA, AT SANTA CATALINA

    E-Print Network [OSTI]

    THE INVERTEBRATE ASSEMBLAGE ASSOCIATED WITH THE GIANT KELP, MACROCYSTIS PYRIFERA, AT SANTA CATALINA JAMES A. COYER' ABSTRACT The motile invertebrate assemblage associated with the giant kelp. Macrocysti. Subtidal forests of giant kelp have long attracted the interestofbiologists, beginning with Darwin's (1860

  3. ANNUAL VARIABILITY OF REEF-FISH ASSEMBLAGES IN KELP FORESTS OFF SANTABARBARA, CALIFORNIA

    E-Print Network [OSTI]

    ANNUAL VARIABILITY OF REEF-FISH ASSEMBLAGES IN KELP FORESTS OFF SANTABARBARA, CALIFORNIA ALFRED W. EBELING/ RALPH J. LARSON,2 WILLIAM S. ALEVIZON,3 AND RICHARD N. BRAy 4 ABSTRACT Assemblages of kelp-bed fishes that live in and about the kelp canopy or over the reef bottom were censused by movie strips

  4. Patterns in Functional Structure and Diversity of Stream Fish Assemblages Related to Environmental Factors at Multiple Scales

    E-Print Network [OSTI]

    Pease, Allison Ann

    2011-02-22T23:59:59.000Z

    PATTERNS IN FUNCTIONAL STRUCTURE AND DIVERSITY OF STREAM FISH ASSEMBLAGES RELATED TO ENVIRONMENTAL FACTORS AT MULTIPLE SCALES A Dissertation by ALLISON ANN PEASE Submitted to the Office of Graduate Studies... and Diversity of Stream Fish Assemblages Related to Environmental Factors at Multiple Scales Copyright 2010 Allison Ann Pease PATTERNS IN FUNCTIONAL STRUCTURE AND DIVERSITY OF STREAM FISH ASSEMBLAGES RELATED TO ENVIRONMENTAL...

  5. Animal intrusion status report for fiscal year 1989

    SciTech Connect (OSTI)

    Landeen, D.S.

    1990-08-01T23:59:59.000Z

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  6. Restoration of cross sections above intrusive salt domes

    SciTech Connect (OSTI)

    Brewer, R.C.; Groshong, R.H. Jr. (Univ. of Alabama, Tuscaloosa, AL (United States))

    1993-10-01T23:59:59.000Z

    The applicability of bed-length restoration to the sequence above a vertical intrusion of salt was tested on an experimental model that included deposition of units during uplift. Restoration of the model resulted in an apparently unbalanced cross section due to excess bed length in the pre-growth interval. The excess bed length was due to significant internal strain. For a correct restoration, it is thus important to distinguish between the growth and pre-growth sequences. The thinning index, which quantifies the thinning onto the uplift, aids in making this distinction. A thinning index vs. depth curve has a sharp inflection at the top of the pre-growth sequence. The pre-growth sequence is restored by area balancing. The growth sequence deforms mainly by formation of a crestal graben, with little other strain. Sequential restoration of growth intervals shows the growth history of the dome. When applied to the Pool Creek salt dome from the Mississippi Interior Salt basin, the methods developed for the model served to separate the pre-growth from the growth sequence and to indicate a growth history of vertical intrusion changing through time to vertical intrusion plus regional extension.

  7. Play and tolerance : notions of looseness in social and material assemblages

    E-Print Network [OSTI]

    Voorhees, Jeremy, 1978-

    2004-01-01T23:59:59.000Z

    The material scenario provides the most illustrative of entry points into this collection of evidence embodying the difference between play and tolerance. In a material assemblage, the looseness in a joint (expansion, pin, ...

  8. Relationships of drought and biotic interactions to crayfish assemblage structure in Gulf coastal headwater streams

    E-Print Network [OSTI]

    Healy, Brian Daniel

    2002-01-01T23:59:59.000Z

    . In order to understand abiotic and biotic factors structuring native crayfish assemblages, environmental variables and densities of fishes and crayfishes were quantified simultaneously in 16 East Texas streams during June and October 1999, and February...

  9. Temporal and spatial variability of blenny (Perciformes:Labrisomidae and Blenniidae) assemblages on Texas jetties

    E-Print Network [OSTI]

    Grabowski, Timothy Brian

    2002-01-01T23:59:59.000Z

    habitats at Galveston, Port Aransas, and South Padre Island, Texas, during May 2000 through August 2001; and in Florida, once during December 2001 to characterize assemblage structure. All specimens (n=4555) were identified, enumerated, and measured and a...

  10. Borax Lake Pattern Assemblages on the Shasta-Trinity National Forests, North-Central California

    E-Print Network [OSTI]

    Sundahl, Elaine; Henn, Winfield

    1993-01-01T23:59:59.000Z

    Assemblages on the Shasta-Trinity National Forests, North-I E L D H E N N , Shasta-Trinity National Forests, Redding,CA 96001. X HE Shasta-Trinity National Forests curve around

  11. anomaly-based intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Topic Index 1 Applying Kernel Methods to Anomaly Based Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: . There are two types of...

  12. Development and Testing of Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway

    E-Print Network [OSTI]

    2001-01-01T23:59:59.000Z

    Real-Time Laser-Based Non-Intrusive Detection System forof a laser-based non-intrusive detection system for real-Real-Time Laser-Based Non-Intrusive Detection System for

  13. A Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway

    E-Print Network [OSTI]

    Cheng, Harry H.; Shaw, Ben; Palen, Joe; Wang, Zhaoqing; Chen, Bo

    2002-01-01T23:59:59.000Z

    Real-Time Laser-Based Non-Intrusive Detection System forJoe Palen, "A Laser-Based Non-Intrusive Detection System forReal-Time Laser-Based Non-Intrusive Detection System for

  14. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur for implementation across multiple resource constrained SCADA field devices in the smart grid. The predictable and regular nature of the SCADA communication patterns is exploited to detect intrusions in the field devices

  15. Non-Intrusive Cognitive Radio Networks based on Smart Antenna Technology

    E-Print Network [OSTI]

    Liu, Xin

    spectral efficiency. We investigate a flexible non-intrusive cognitive radio network based on smart antenna to the primary receiver (PR) is either minimized or constrained. Combined with transmission power controlNon-Intrusive Cognitive Radio Networks based on Smart Antenna Technology Senhua Huang, Zhi Ding

  16. An evaluation of fiber optic intrusion detection systems in interior applications

    SciTech Connect (OSTI)

    Vigil, J.T.

    1994-03-01T23:59:59.000Z

    This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

  17. A Game Theoretic Analysis of Intrusion Detection in Access Control Systems

    E-Print Network [OSTI]

    Alpcan, Tansu

    . The security of an access control system is of prime importance and is crucial for a successful operation, decision, and control processes for information security and intrusion detection. Such a mathematicalA Game Theoretic Analysis of Intrusion Detection in Access Control Systems Tansu Alpcan and Tamer

  18. Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu

    E-Print Network [OSTI]

    Ning, Peng

    Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

  19. A Hybrid Artificial Immune System and Self Organising Map for Network Intrusion

    E-Print Network [OSTI]

    Alvarez, Nadir

    A Hybrid Artificial Immune System and Self Organising Map for Network Intrusion Detection Simon T using an artificial immune system. Connections that are flagged as anoma- lous are then categorised://www.sciencedirect.com/science/article/pii/S0020025507005531.] Key words: Artificial immune system; Self Organizing Map; Intrusion detection; Genetic algorithm

  20. SEIF: Secure and Efficient Intrusion-Fault tolerant routing protocol for wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 SEIF: Secure and Efficient Intrusion-Fault tolerant routing protocol for wireless sensor networks Informatique Algiers, Algeria Email: lnoureddine4@gmail.com Abstract--In wireless sensor networks, reliability network, Security, Intrusion tolerance, Fault tolerance, Secure routing. I. INTRODUCTION Wireless Sensor

  1. Nonlinear Propagation of Orbit Uncertainty Using Non-Intrusive Polynomial Chaos

    E-Print Network [OSTI]

    Born, George

    Nonlinear Propagation of Orbit Uncertainty Using Non-Intrusive Polynomial Chaos Brandon A. Jones1. Results presented in this paper use non-intrusive, i.e., sampling-based, methods in combination the use of polynomial chaos expansions (PCEs) for the non- linear, non-Gaussian propagation of orbit state

  2. NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA

    E-Print Network [OSTI]

    Hart, Gus

    NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA by Michael Takeshi Nakata A thesis, Associate Dean College of Physical and Mathematical Sciences #12;ABSTRACT NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA M. Takeshi Nakata Department of Physics and Astronomy Master of Science

  3. COMPRESSIVE SAMPLING FOR NON-INTRUSIVE APPLIANCE LOAD MONITORING (NALM) USING CURRENT WAVEFORMS

    E-Print Network [OSTI]

    Leus, Geert

    COMPRESSIVE SAMPLING FOR NON-INTRUSIVE APPLIANCE LOAD MONITORING (NALM) USING CURRENT WAVEFORMS advanced services like dynamic electricity pricing. The non-intrusive appliance load monitoring (NALM) [1/off status of each appliance from the compressed measurement as if the original non-compressed measurement

  4. An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig

    E-Print Network [OSTI]

    Meier, Michael

    mechanisms (e.g. authentication, encryption, or access control) they provide an automatic detection1 An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig Mail:{thh,mm,koenig}@informatik.tu-cottbus.de Abstract: Intrusion detection systems have proved

  5. A Data Mining Framework for Building Intrusion Detection Models Salvatore J. Stolfo

    E-Print Network [OSTI]

    Yang, Junfeng

    A Data Mining Framework for Building Intrusion Detection Models Wenke Lee Salvatore J. Stolfo Kui W of expert knowledge, changes to IDSs are expensive and slow. In this paper, we describe a data mining, and apply data mining programs to learn rules that accurately capture the behavior of intrusions and normal

  6. A Data Mining Framework for Building Intrusion Detection Models # Salvatore J. Stolfo

    E-Print Network [OSTI]

    Lee, Wenke

    A Data Mining Framework for Building Intrusion Detection Models # Wenke Lee Salvatore J. Stolfo Kui. In this paper, we describe a data mining framework for adaptively building Intrusion Detection (ID) models each network connection or host ses­ sion, and apply data mining programs to learn rules

  7. On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Chen, Ing-Ray

    to that of the experimental testbed. Simulations of larger (50-node) ad hoc networks indicate that monitoring-based intrusion evaluations of IDTs are based on small testbed configura- tions, or simulations which do not incorporate any on monitoring- based intrusion detection for ad hoc networks. Experimental results show that, even for a simple

  8. Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang*

    E-Print Network [OSTI]

    Lang, Sheau-Dong

    by the security managers is how to identify network intrusions and how to evaluate the effectiveness of IDS. 31 Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School and network security are important issues faced by the IT industry. Hackers apply an array of techniques

  9. INSENS: Intrusion-tolerant routing for wireless sensor networks Jing Deng*, Richard Han, Shivakant Mishra

    E-Print Network [OSTI]

    Han, Richard Y.

    to evaluate the cost incurred. q 2005 Published by Elsevier B.V. Keywords: Sensor network; Security; Intrusion an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently, accommodates multipath routing to multiple base stations, enables secure joining/leaving, and incorporates

  10. Nuclear-power-plant perimeter-intrusion alarm systems

    SciTech Connect (OSTI)

    Halsey, D.J.

    1982-04-01T23:59:59.000Z

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  11. Nuclear data needs for non-intrusive inspection.

    SciTech Connect (OSTI)

    Smith, D. L.; Michlich, B. J.

    2000-11-29T23:59:59.000Z

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested.

  12. Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner

    E-Print Network [OSTI]

    Cheung, Steven

    Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong In a model-based intrusion detection approach for protecting SCADA networks, we construct models and a prototype implementation of them for monitoring Modbus TCP networks. Keywords: SCADA security, intrusion

  13. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han

    E-Print Network [OSTI]

    Chuah, Mooi-Choo "Mooi"

    A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J University Bethlehem, PA 18015 Abstract-- Several intrusion detection approaches have been proposed in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM

  14. Network intrusion detector: NID user`s guide V 1.0

    SciTech Connect (OSTI)

    Palasek, R. [ed.

    1994-04-01T23:59:59.000Z

    The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

  15. Effects of droplet size on intrusion of sub-surface oil spills

    E-Print Network [OSTI]

    Chan, Godine Kok Yan

    2013-01-01T23:59:59.000Z

    This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

  16. An analog and digital data acquisition system for Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    Clifford, Zachary Alan

    2009-01-01T23:59:59.000Z

    Non-Intrusive Load Monitoring (NILM) is a method for characterizing and monitoring discrete loads connected to a power distribution system. This can include a ship, a car, or a utility distribution system. The entire concept ...

  17. Interpreting human activity from electrical consumption data through non-intrusive load monitoring

    E-Print Network [OSTI]

    Gillman, Mark Daniel

    2014-01-01T23:59:59.000Z

    Non-intrusive load monitoring (NILM) has three distinct advantages over today's smart meters. First, it offers accountability. Few people know where their kWh's are going. Second, it is a maintenance tool. Signs of wear ...

  18. Diagnostic indicators for shipboard systems using non-intrusive load monitoring

    E-Print Network [OSTI]

    DeNucci, Thomas W

    2005-01-01T23:59:59.000Z

    Field studies have demonstrated that the Non-Intrusive Load monitor (NILM) can provide real-time indication of the condition of electro-mechanical systems on board naval vessels. Results from data collected from engineering ...

  19. Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants

    E-Print Network [OSTI]

    Greene, William C. (William Calvin)

    2005-01-01T23:59:59.000Z

    The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

  20. Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a

    E-Print Network [OSTI]

    Clement, Prabhakar

    of the major environmental issues faced by several coastal cit- ies in India, China, and Mexico [3 intrusion in coastal aquifers and its interconnection to anthropogenic activities is an important envi

  1. Evaluation of Non-Intrusive Load Monitoring for shipboard cycling system diagnostics

    E-Print Network [OSTI]

    Mosman, James P. (James Paul)

    2006-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to determine the operating schedule of all of the major loads on an electrical service. Additionally, the NILM can use its ...

  2. Design and testing of a non-intrusive torque measurement system

    E-Print Network [OSTI]

    Wilson, Edwin Ernest

    1998-01-01T23:59:59.000Z

    This thesis details the initial development of a non-intrusive torque measurement system to measure torque in a rotating driveshaft like those commonly found on internal combustion engine powered irrigation pumping plants. A typical driveshaft used...

  3. Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    McKay, Thomas Duncan

    2006-01-01T23:59:59.000Z

    This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

  4. Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador

    E-Print Network [OSTI]

    Biggs, Juliet

    Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador J. Biggs,1 of the edifice, or temporary, in which case the magma will be released in a future eruption. Citation: Biggs, J

  5. Assessment of Seawater Intrusion Potential From Sea-level Rise in Coastal Aquifers of California

    E-Print Network [OSTI]

    Loáiciga, Hugo A; Pingel, Thomas J; Garcia, Elizabeth S

    2009-01-01T23:59:59.000Z

    2009). Impact of Sea-Level Rise on Sea Water Intrusion inC. (1997). Global Sea Level Rise: A Redetermination. Surveys2007). Effects of sea-level rise on groundwater flow in a

  6. Non-intrusive water utility monitoring and free-space load monitoring

    E-Print Network [OSTI]

    Neuman, Sabrina M

    2011-01-01T23:59:59.000Z

    This work presents a non-intrusive, single-point sensing scheme to monitor the water usage for various loads on a water utility pipe network through the vibration of a pipe near the water intake source. Experiments with ...

  7. Habitat-Related Benthic Macrofaunal Assemblages of Bays and Estuaries of the Western United States

    E-Print Network [OSTI]

    , and sediment grain size, were identified: (A) Puget Sound fine sediment, (B) Puget Sound coarse sediment, (C and oligohaline. The Puget Sound, southern California, and San Francisco Bay assemblages were geographically to small spatial scale habitat heterogeneity and temporal change were both low in Puget Sound, but temporal

  8. Citizen Science System Assemblages: Understanding the Technologies that Support Crowdsourced Science

    E-Print Network [OSTI]

    Crowston, Kevin

    Citizen Science System Assemblages: Understanding the Technologies that Support Crowdsourced@syr.edu ABSTRACT We explore the nature of technologies to support citizen science, a method of inquiry citizen science platforms may be comprised of widely varying functionalities, yet still support relatively

  9. Citizen Science System Assemblages: Toward Greater Understanding of Technologies to Support Crowdsourced

    E-Print Network [OSTI]

    Crowston, Kevin

    Citizen Science System Assemblages: Toward Greater Understanding of Technologies to Support crowston@syr.edu ABSTRACT We explore the nature of technologies to support citizen science, a method different citizen science platforms may be comprised of widely varying functionalities, yet still support

  10. FISH ASSEMBLAGES IN MACROCYSTIS AND NEREOCYSTIS KELP FORESTS OFF CENTRAL CALIFORNIA

    E-Print Network [OSTI]

    FISH ASSEMBLAGES IN MACROCYSTIS AND NEREOCYSTIS KELP FORESTS OFF CENTRAL CALIFORNIA JAMES LEE canopy fonning kelp forests (giant kelp, Macrocystis 'Jl!j1'ifera, and bull kelp, NereolJlJstis luetkeana for substrate and cover within their habitat, such as rock or coral reefs or kelp beds, as well as man

  11. Use of European hare (Lepus europaeus) carcasses by an avian scavenging assemblage in Patagonia

    E-Print Network [OSTI]

    Donázar, José A.

    Use of European hare (Lepus europaeus) carcasses by an avian scavenging assemblage in Patagonia) carcasses by avian scavengers in Argentinean Patagonia. A total of 16 hare carcasses were placed in Africa. Key words: hare carcasses, avian scavengers, Patagonia, Lepus europaeus, raptors INTRODUCTION

  12. ------. 1980. Avian feeding assemblages in Puerto Rico. Carib. J. Sci. 15:21-27.

    E-Print Network [OSTI]

    Losos, Jonathan B.

    NOTES 65 ------. 1980. Avian feeding assemblages in Puerto Rico. Carib. J. Sci. 15. Observations of birds at Cecropia trees in Puerto Rico. Wilson Bull. 84:498-500. Pettersson, M. 1956. Diffusion Rico, Mayaguez Notes on the Ecology and Behavior of Anolis cuvieri (Lacertilia: Iguanidae) in Puerto

  13. Small-scale spatial variation of benthic algal assemblages in a peat bog Katerina Cerna n

    E-Print Network [OSTI]

    Small-scale spatial variation of benthic algal assemblages in a peat bog Katerina Cerna´ n test Peat bog a b s t r a c t Spatial patterns on a very small scale (10 cm), and the effect microhabitat types were investigated. Samples were taken in a peat bog along linear transects on a scale of 10

  14. Chemical and petrological characteristics of the intrusive rocks of the Quitman Mountains, Texas 

    E-Print Network [OSTI]

    Seay, Christopher Sidney

    1973-01-01T23:59:59.000Z

    differentiated rock types from the diorite (1) to the last emplaced granite (9). 42 7. Calcium concentration and fluorine concentration vs. the various differentiated rock types from the diorite (1) to the last emplaced granite (9) 8. Ca percentage plotted... concentration for the various rock types from the diorite (1) to the final granite (9). . . . . . . ~ 53 13. Rb/Sr ratios for the intrusive rock types 56 14. Uranium concentrations for the intrusive rock types for the initially emplaced diorite (1...

  15. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    SciTech Connect (OSTI)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01T23:59:59.000Z

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

  16. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1991-05-15T23:59:59.000Z

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  17. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01T23:59:59.000Z

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  18. Efficacy of Low and High Complexity Vegetation Treatments for Reestablishing Terrestrial Arthropod Assemblages during Montane Wetland Restoration

    E-Print Network [OSTI]

    Holmquist, Jeffrey G; Schmidt-Gengenbach, Jutta; Demetry, Athena

    2014-01-01T23:59:59.000Z

    wetland types—than was observed between any restoration treatment andDual treatment was added to enhance restoration of wetlandTreatments for Reestablishing Terrestrial Arthropod Assemblages during Montane Wetland

  19. Optimal Three-Material Wheel Assemblage of Conducting and Elastic Composites

    E-Print Network [OSTI]

    Andrej Cherkaev

    2011-05-22T23:59:59.000Z

    We describe a new type of three material microstructures which we call wheel assemblages, that correspond to extremal conductivity and extremal bulk modulus for a composite made of two materials and an ideal material. The exact lower bounds for effective conductivity and matching laminates was found in (Cherkaev, 2009) and for anisotropic composites, in (Cherkaev, Zhang, 2011). Here, we show different optimal structures that generalize the classical Hashin-Shtrikman coated spheres (circles). They consist of circular inclusions which contain a solid central circle (hub) and radial spikes in a surrounding annulus, and (for larger volume fractions of the best material) an annulus filled with it. The same wheel assemblages are optimal for the pair of dual problems of minimal conductivity (resistivity) of a composite made from two materials and an ideal conductor (insulator), in the problem of maximal effective bulk modulus of elastic composites made from two linear elastic material and void, and the dual minimum problem.

  20. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    SciTech Connect (OSTI)

    Najm, Habib N. [Sandia National Laboratories, Livermore, CA 94551 (United States); Valorani, Mauro [Mechanical and Aerospace Engineering Dept., Sapienza University of Rome, Rome (Italy)

    2014-08-01T23:59:59.000Z

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. The filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

  1. Reef fish assemblages on hard banks in the northwestern Gulf of Mexico

    E-Print Network [OSTI]

    Dennis, George David

    1985-01-01T23:59:59.000Z

    , and Benny Gallaway of LGL Ecological Research Associates helped me collect specimens on oil plat- forms and at the Flower Garden banks. They also provided instructional help for a fledgling diving scientist and were the most able dive part- ners. My wife... assemblage or at a bank (Pielou, 1975). Additional records of reef fish taken from the hard banks and oil platforms by hook and line, ichthyocides, spear, and trawl are reported in the systematic species account. Sampling locations not reported...

  2. New Hardware and Software Design of a Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway

    E-Print Network [OSTI]

    2001-01-01T23:59:59.000Z

    Real-Time Laser-Based Non-Intrusive Detection System forReal-Time Laser-Based Non-Intrusive Detection System foroptics. The laser-based non-intrusive detection system uses

  3. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Patents [OSTI]

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11T23:59:59.000Z

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  4. Application of Data Mining to Network Intrusion Detection: Classifier Selection Model

    E-Print Network [OSTI]

    Nguyen, Huy

    2010-01-01T23:59:59.000Z

    As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attention from the research community. The uncertainty to explore if certain algorithms perform better for certain attack classes constitutes the motivation for the reported herein. In this paper, we evaluate performance of a comprehensive set of classifier algorithms using KDD99 dataset. Based on evaluation results, best algorithms for each attack category is chosen and two classifier algorithm selection models are proposed. The simulation result comparison indicates that noticeable performance improvement and real-time intrusion detection can be achieved as we apply the proposed models to detect different kinds of network at...

  5. A research team is developing tools based on the theory of complex systems to analyze the structure and behavior of firms in a non-intrusive, objective, and

    E-Print Network [OSTI]

    Ottino, Julio M.

    and behavior of firms in a non-intrusive, objective, and quantitative way. NORTHWESTERN CHEMICAL AND BIOLOGICAL reveal how people interact and allow mapping of the informal network in a non-intrusive, objective

  6. Non Intrusive Measures for Determining the Minimum Field of View for User Search Task in 3D Virtual Environments

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Non Intrusive Measures for Determining the Minimum Field of View for User Search Task in 3D Virtual on the use of several novel non- intrusive temporal and quantitative measures of visual attention, such as engines. The use of this virtual camera can show interesting results for non-invasive study

  7. Volume 152, number 4,s CHEMICAL PHYSICS LETTERS 18 November 1988 NON-INTRUSIVE MEASUREMENT OF AXIAL ELECTRIC FIELDS

    E-Print Network [OSTI]

    Cohen, Ronald C.

    Volume 152, number 4,s CHEMICAL PHYSICS LETTERS 18 November 1988 NON-INTRUSIVE MEASUREMENT OF AXIAL pertur- bations by sheath accumulation. Non-intrusive mea- surements of the electric fields through for the non- perturbative measurement of the axial electric fields in glow discharges. The A `n, + X I&+ (4

  8. Mining in a Dataflow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok

    E-Print Network [OSTI]

    Lee, Wenke

    Mining in a Data­flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

  9. Mining in a Data-flow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok

    E-Print Network [OSTI]

    Yang, Junfeng

    Mining in a Data-flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

  10. Effect of permeability on cooling of magmatic intrusion in a goethermal reservoir

    SciTech Connect (OSTI)

    Lau, K.H.

    1980-09-01T23:59:59.000Z

    Transient cooling of magmatic intrusion in a geothermal reservoir due to conduction and convection is studied. The effects of overlying cap rock and different horizontal and vertical permeability of the reservoir are considered. Results are compared to the data from Salton Sea Geothermal Field. It is also observed that multiple layers of convection cells exist when horizontal permeability is much larger than the vertical permeability. The sharp dropoff of surface heat flow observed at Salton Sea Geothermal Field is confirmed by numerical results. Based on these numerical results, it is possible to speculate that the age of the intrusive body is about 8000 to 12,000 years.

  11. Integrating Intrusive and Non-intrusive Characterization Methods To Achieve A Conceptual Site Model For The SLDA FUSRAP

    SciTech Connect (OSTI)

    Durham, L.A.; Peterson, J.M. [Argonne National Laboratory, Argonne, IL (United States); Frothingham, D.G.; Frederick, W.T. [U.S. Army Corps of Engineers - Buffalo District, Buffalo, NY (United States); Lenart, W. [U.S. Army Corps of Engineers - Pittsburgh District, Pittsburgh, PA (United States)

    2008-07-01T23:59:59.000Z

    The U.S. Army Corps of Engineers (USACE) is addressing radiological contamination following Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) requirements at the Shallow Land Disposal Area (SLDA) site, which is a radiologically contaminated property that is part of the Formerly Utilized Sites Remedial Action Program (FUSRAP). The SLDA is an 18-hectare (44- acre) site in Parks Township, Armstrong County, Pennsylvania, about 37 kilometers (23 miles) east-northeast of Pittsburgh. According to historical record, radioactive wastes were disposed of at the SLDA in a series of trenches by the Nuclear Materials and Equipment Company (NUMEC) in the 1960's. The wastes originated from the nearby Apollo nuclear fuel fabrication facility, which began operations under NUMEC in the late 1950's and fabricated enriched uranium into naval reactor fuel elements. It is believed that the waste materials were buried in a series of pits constructed adjacent to one another in accordance with an Atomic Energy Commission (AEC) regulation that has since been rescinded. A CERCLA remedial investigation/feasibility study (RI/FS) process was completed for the SLDA site, and the results of the human health risk assessment indicated that the radiologically contaminated wastes could pose a risk to human health in the future. There are no historical records that provide the exact location of these pits. However, based on geophysical survey results conducted in the 1980's, these pits were defined by geophysical anomalies and were depicted on historical site drawings as trenches. At the SLDA site, a combination of investigative methods and tools was used in the RI/FS and site characterization activities. The SLDA site provides an excellent example of how historical documents and data, historical aerial photo analysis, physical sampling, and non-intrusive geophysical and gamma walkover surveys were used in combination to reduce the uncertainty in the location of the trenches. The data and information from these sources were used to refine the conceptual site model, complete the RI/FS, and support the ongoing remedial design and action, which will achieve site closure acceptable to all stakeholders. (authors)

  12. NON-INTRUSIVE MEASUREMENT OF WORKLOAD IN REAL-TIME Markus Guhe*, Wenhui Liao**, Zhiwei Zhu**, Qiang Ji**, Wayne D. Gray* & Michael J. Schoelles*

    E-Print Network [OSTI]

    Gray, Wayne

    NON-INTRUSIVE MEASUREMENT OF WORKLOAD IN REAL-TIME Markus Guhe*, Wenhui Liao**, Zhiwei Zhu**, Qiang method to measure workload that offers several advantages. First, it uses non-intrusive means: cameras to be performed to process these problems. We develop a real-time, non-intrusive system that meas- ures

  13. A Non-intrusive Kalman Filter-Based Tracker for Pursuit Eye Movement* Wael Abd-Almageed M. Sami Fadali George Bebis

    E-Print Network [OSTI]

    Bebis, George

    A Non-intrusive Kalman Filter-Based Tracker for Pursuit Eye Movement* Wael Abd-Almageed M. Sami introduce a new non-intrusive approach to estimating the eye position during pursuit motion of the eye. We been a problem when applying them. Other non- intrusive techniques, such as neural networks [2], have

  14. Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems

    E-Print Network [OSTI]

    Peisert, Sean

    ) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way, distribution au- tomation, network security, intrusion detection systems. I. INTRODUCTION A. Scope and Goals their development with that of an appropriate cyber security frame- work that would prevent attackers from gaining

  15. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule

    E-Print Network [OSTI]

    Chen, Ing-Ray

    . Intrusion detection systems (IDSs) are security appliances that review audit data to identify cyber attacks is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness

  16. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect (OSTI)

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01T23:59:59.000Z

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  17. c Copyright by James Patrick Lyons, 2003 A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    c Copyright by James Patrick Lyons, 2003 #12;A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT SYSTEM DESIGN BY JAMES PATRICK LYONS B.S., University of Pennsylvania, 2000 THESIS Submitted in partial and Family iii #12;Acknowledgments In writing this thesis many people have provided me with invaluable

  18. Sensing Danger: Innate Immunology for Intrusion Detection Uwe Aickelin and Julie Greensmith

    E-Print Network [OSTI]

    Aickelin, Uwe

    Sensing Danger: Innate Immunology for Intrusion Detection Uwe Aickelin and Julie Greensmith School years ago through the so called `Danger Project' (EPSRC GR/S47809/01). Our conclusion then was that AIS developed as part of the Danger Project - the Dendritic Cell Algorithm (DCA) and the Toll-like Receptor

  19. Learning Cost-Sensitve Classification Rules for Network Intrusion Detection using RIPPER

    E-Print Network [OSTI]

    Yang, Junfeng

    Report CUCS-035-1999 Advanced Intelligent Systems CS4721 Spring 1999 Final Project Matthew Miller which can be used to test live network stream input in order to detect intrusions. This is done connections to build a set of connection profile records that can be useful in detection [Lee 99

  20. Real-time processing of a long perimeter fiber optic intrusion system 

    E-Print Network [OSTI]

    Snider, William Timothy

    2009-09-30T23:59:59.000Z

    This thesis reports on recent advances made in real-time intruder detection for an intrusion system developed at Texas A&M University that utilizes a phase-sensitive optical time-domain reflectometer. The system uses light pulses from a highly...

  1. Seawater intrusion and aquifer freshening near reclaimed coastal area of Shenzhen

    E-Print Network [OSTI]

    Jiao, Jiu Jimmy

    to a modern city. Meanwhile, large-scale land reclamation was carried out to meet the needs of various. Keywords Coastal groundwater; land reclamation; seawater intrusion; Shenzhen Introduction The study area and land reclamation are believed to have significant impact on coastal groundwater flow systems both

  2. A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures

    E-Print Network [OSTI]

    Sanders, William H.

    , and highlight the interesting cost/benefit trade-offs that emerge. Index Terms--AMI, threat model, intrusion research is a dif- ficult task, partly because cybersecurity risk is challenging to quantify. As stated in the Roadmap to Achieve Energy Deliv- ery Systems Cybersecurity released by the U.S. Department of Energy (Do

  3. Experimental Petrology of the Kiglapait Intrusion: Cotectic Trace for the Lower Zone at

    E-Print Network [OSTI]

    Brady, John B.

    Experimental Petrology of the Kiglapait Intrusion: Cotectic Trace for the Lower Zone at 5 kbar@geo.umass.edu Journal of Petrology 45(11) # Oxford University Press 2004; all rights reserved JOURNAL OF PETROLOGY VOLUME 45 NUMBER 11 PAGES 2225­2259 2004 doi:10.1093/petrology/egh054 #12;an elusive goal of igneous

  4. Using ACL2 to Verify Security Properties of Specification-based Intrusion Detection Systems

    E-Print Network [OSTI]

    California at Davis, University of

    Using ACL2 to Verify Security Properties of Specification- based Intrusion Detection Systems Tao. These specifications are mainly developed manually, based upon an expert understanding of characteristics of #12;the to normal users [CK01]. In SHIM, specifications are developed in SHIM to constrain the behaviors

  5. A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks

    E-Print Network [OSTI]

    Stavrakakis, Ioannis

    A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering Algorithm and energy of nodes in the cluster formation in order to improve detection accuracy and re- duce energy

  6. Enforcing Trust-based Intrusion Detection in Cloud Computing Using Algebraic Methods

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Enforcing Trust-based Intrusion Detection in Cloud Computing Using Algebraic Methods Amira Bradai scheme for hybrid cloud computing is proposed. We consider a trust metric based on honesty, cooperation detection, Perron Frobenius, cloud computing, hybrid execution, false alarms, security scores. I

  7. HoBIDS: A Data Mining Approach to Host Based Intrusion Detection

    E-Print Network [OSTI]

    Hershkop, Shlomo

    HoBIDS: A Data Mining Approach to Host Based Intrusion Detection Department of Computer Science of a host based IDS built on a data mining framework. This framework allows the system to detect both known and lightweight sensor system with the capabilities of sophisticated data-mining techniques to build a powerful

  8. Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo

    E-Print Network [OSTI]

    Somayaji, Anil

    Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo Computer Science. The key ideas are to use data mining techniques to discover consistent and useful patterns of system experiments on the sendmail system call data and the network tcpdump data, we demonstrate that we can

  9. Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project

    E-Print Network [OSTI]

    Yang, Junfeng

    Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project Salvatore J. Stolfo by sensing a misuse or a breach of a security policy and alerting operators to an ongoing (or, at least on a weekly basis reporting that malicious users still succeed in attacking systems with sometimes devastating

  10. Embedded Markov Process based Model for Performance Analysis of Intrusion Detection and

    E-Print Network [OSTI]

    Boutaba, Raouf

    and evaluates its impact on performance. Through extensive simulations, we validate the proposed model-off between security enforcement levels on one side and network Quality of Service (QoS) requirements on the other. Index Terms--Security Performance Evaluation, Intrusion De- tection and Prevention Systems

  11. Hydrothermal formation of Clay-Carbonate alteration assemblages in the Nili Fossae region of Mars

    E-Print Network [OSTI]

    Brown, Adrian J; Baldridge, Alice M; Crowley, James K; Bridges, Nathan T; Thomson, Bradley J; Marion, Giles M; Filho, Carlos R de Souza; Bishop, Janice L

    2014-01-01T23:59:59.000Z

    The Compact Reconnaissance Imaging Spectrometer for Mars (CRISM) has returned observations of the Nili Fossae region indicating the presence of Mg- carbonate in small (characterize these carbonate-bearing units. We applied absorption band mapping techniques to investigate a range of possible phyllosilicate and carbonate minerals that could be present in the Nili Fossae region. We also describe a clay-carbonate hydrothermal alteration mineral assemblage in the Archean Warrawoona Group of Western Australia that is a potential Earth analog to the Nili Fossae carbonate-bearing rock units. We discuss the geological and biological implications for hydrothermal processes on Noachian Mars.

  12. Compilation of gas intrusion measurements, variations, and consequence modeling for SPR caverns.

    SciTech Connect (OSTI)

    Hinkebein, Thomas E.

    2003-03-01T23:59:59.000Z

    The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H2S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

  13. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01T23:59:59.000Z

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  14. Chemical and petrological characteristics of the intrusive rocks of the Quitman Mountains, Texas

    E-Print Network [OSTI]

    Seay, Christopher Sidney

    1973-01-01T23:59:59.000Z

    is advantaqeous in that it yields pellets not only chemically homo- geneous but physically stable. One disadvantage is 16 that the loss of volatiles during heating is unavoid- able. To test the analytical precision and that of sample preparation technique... CHEMICAL AND PETROLOGICAL CHARACTERISTICS OF THE INTRUSIVE ROCKS OF THE QUITMAN MOUNTAINS, TEXAS A Thesis by CHRISTOPHER SIDNEY SEAY Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement...

  15. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application

    DOE Patents [OSTI]

    Piper, T.C.

    1980-09-24T23:59:59.000Z

    An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  16. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes

    DOE Patents [OSTI]

    Piper, Thomas C. (Idaho Falls, ID)

    1982-01-01T23:59:59.000Z

    An arrangement for deleting liquid in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.072 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  17. Wave-swept rocky shores support a surprisingly diverse assemblage of organisms that includes members of virtually

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Wave-swept rocky shores support a surprisingly diverse assemblage of organisms that includes members of virtually every animal phylum and both algae and vascular plants. In general, wave that hydrodynamic forces can play an important role in limiting the size of wave-swept plants and animals (Denny et

  18. Amazon River water in the northeastern Caribbean Sea and its effect on larval reef fish assemblages during April 2009

    E-Print Network [OSTI]

    Amazon River water in the northeastern Caribbean Sea and its effect on larval reef fish assemblages.S.A. ABSTRACT During April to June 2009, a large bolus of Amazon River water impacted the northeastern Caribbean Ocean waters to the north, with Caribbean surface waters showing intermediate values. Plankton net tows

  19. Functional structure of ant and termite assemblages in old growth forest, logged forest and oil palm plantation in Malaysian Borneo

    E-Print Network [OSTI]

    Luke, Sarah H.; Fayle, Tom M.; Eggleton, Paul; Turner, Edgar C.; Davies, Richard G.

    2014-07-30T23:59:59.000Z

    ORI GIN AL PA PER Functional structure of ant and termite assemblages in old growth forest, logged forest and oil palm plantation in Malaysian Borneo Sarah H. Luke • Tom M. Fayle • Paul Eggleton • Edgar C. Turner • Richard G. Davies Received: 25...

  20. Raoul et al. Small mammals and forest management in China 1 Title: Small-mammal assemblage response to deforestation and

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    to deforestation and afforestation in central China. Running title: Small mammals and forest management in China Deforestation is a major environmental issue driving the loss of animal and plant species. Afforestation has of small-mammal assemblages in an area where forest and associated deforestation habitats dominate

  1. Criticality Potential of Waste Packages Containing DOE SNF Affected by Igneous Intrusion

    SciTech Connect (OSTI)

    D.S. Kimball; C.E. Sanders

    2006-02-07T23:59:59.000Z

    The Department of Energy (DOE) is currently preparing an application to submit to the U.S. Nuclear Regulatory Commission for a construction authorization for a monitored geologic repository. The repository will contain spent nuclear fuel (SNF) and defense high-level waste (DHLW) in waste packages placed in underground tunnels, or drifts. The primary objective of this paper is to perform a criticality analysis for waste packages containing DOE SNF affected by a disruptive igneous intrusion event in the emplacement drifts. The waste packages feature one DOE SNF canister placed in the center and surrounded by five High-Level Waste (HLW) glass canisters. The effective neutron multiplication factor (k{sub eff}) is determined for potential configurations of the waste package during and after an intrusive igneous event. Due to the complexity of the potential scenarios following an igneous intrusion, finding conservative and bounding configurations with respect to criticality requires some additional considerations. In particular, the geometry of a slumped and damaged waste package must be examined, drift conditions must be modeled over a range of parameters, and the chemical degradation of DOE SNF and waste package materials must be considered for the expected high temperatures. The secondary intent of this calculation is to present a method for selecting conservative and bounding configurations for a wide range of end conditions.

  2. Compilation of Gas Intrusion Measurements, Variations, and Consequence Modeling for SPR Caverns

    SciTech Connect (OSTI)

    HINKEBEIN, THOMAS E.

    2003-03-01T23:59:59.000Z

    The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H{sub 2}S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

  3. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    SciTech Connect (OSTI)

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19T23:59:59.000Z

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  4. The design of an intrusion security system using digital processing for alarm indication

    E-Print Network [OSTI]

    Holyoak, Joel Nelson

    1973-01-01T23:59:59.000Z

    signal voltage for any moving ob)ect within the protected ares. After appropriate processing, the signal's amplitude is analog-to- digital converted. Amplitude variations are digitally processed by a Hewlett-Packard 2114B minicomputer. Depending... signal for reliable intrusion detection. lg 'k 0 4J 0 Ol 4J IU a 0 rl 'd C CCI 4 I CI '4 O W 0 CI CV 4J 4J Ql W 0 'tj 19 C H A P T E R III THE DESIGN OF THE LINEAR PROCESSOR The processing of the output voltage signal...

  5. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01T23:59:59.000Z

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  6. Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars

    SciTech Connect (OSTI)

    Villa, Andrea; Mussi, Valerio [Laboratorio MUSP-via Turotti 9, 29122 Piacenza (Italy); Strano, Matteo [Politecnico di Milano-Dipartimento di Meccanica, via La Masa 1, 20156, Milan (Italy)

    2011-05-04T23:59:59.000Z

    The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

  7. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect (OSTI)

    Chen, Yan [Northwesten University] [Northwesten University

    2013-12-05T23:59:59.000Z

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  8. Evaluation and analysis of non-intrusive techniques for detecting illicit substances

    SciTech Connect (OSTI)

    Micklich, B.J.; Roche, C.T.; Fink, C.L.; Yule, T.J.; Demirgian, J.C. [Argonne National Lab., IL (United States); Kunz, T.D.; Ulvick, S.J.; Cui, J. [Houston Advanced Research Center, The Woodlands, TX (United States)

    1995-12-31T23:59:59.000Z

    Argonne National Laboratory (ANL) and the Houston Advanced Research Center (HARC) have been tasked by the Counterdrug Technology Assessment Center of the Office of National Drug Control Policy to conduct evaluations and analyses of technologies for the non-intrusive inspection of containers for illicit substances. These technologies span the range of nuclear, X-ray, and chemical techniques used in nondestructive sample analysis. ANL has performed assessments of nuclear and X-ray inspection concepts and undertaken site visits with developers to understand the capabilities and the range of applicability of candidate systems. ANL and HARC have provided support to law enforcement agencies (LEAs), including participation in numerous field studies. Both labs have provided staff to assist in the Narcotics Detection Technology Assessment (NDTA) program for evaluating drug detection systems. Also, the two labs are performing studies of drug contamination of currency. HARC has directed technical evaluations of automated ballistics imaging and identification systems under consideration by law enforcement agencies. ANL and HARC have sponsored workshops and a symposium, and are participating in a Non-Intrusive Inspection Study being led by Dynamics Technology, Incorporated.

  9. c 2004 by Fabrice Stevens. All rights reserved. VALIDATION OF AN INTRUSION-TOLERANT INFORMATION SYSTEM USING

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    c 2004 by Fabrice Stevens. All rights reserved. #12;VALIDATION OF AN INTRUSION-TOLERANT INFORMATION of Illinois at Urbana-Champaign, 2004 Urbana, Illinois #12;To my parents iii #12;ACKNOWLEDGMENTS I would like to thank my advisor, Professor William H. Sanders, for giving me the op- portunity to work for him. His

  10. The Low-18O Late-Stage Ferrodiorite Magmas in the Skaergaard Intrusion: Result of Liquid Immiscibility, Thermal Metamorphism, or

    E-Print Network [OSTI]

    Bindeman, Ilya N.

    , Eugene, Oregon 97403, U.S.A. (e-mail: bindeman@uoregon.edu) A B S T R A C T We report new laser fluorination oxygen isotope analyses of selected samples throughout the Skaergaard intrusion in East Greenland of a higher-18 O, higher-SiO2 granophyric melt, thereby depleting the residual Fe-rich ferrodiorite magma

  11. DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information via

    E-Print Network [OSTI]

    Reber, Paul J.

    DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information University, Chicago, IL, USA Preferential processing of threat has been implicated in the development and perpetuation of anxiety. We investigated threat processing and anxiety using a subliminal priming paradigm

  12. Numerical Model Investigation for Potential Methane Explosion and Benzene Vapor Intrusion Associated with High-Ethanol Blend

    E-Print Network [OSTI]

    Alvarez, Pedro J.

    ABSTRACT: Ethanol-blended fuel releases usually stimulate methanogenesis in the subsurface, which could conditions exist. Ethanol- derived methane may also increase the vapor intrusion potential of toxic fuel to be modified when dealing with some high ethanol blend fuel (i.e., E20 up to E95) releases. INTRODUCTION

  13. Non-intrusive Low-Rank Separated Approximation of High-Dimensional Stochastic Models

    E-Print Network [OSTI]

    Alireza Doostan; AbdoulAhad Validi; Gianluca Iaccarino

    2012-10-04T23:59:59.000Z

    This work proposes a sampling-based (non-intrusive) approach within the context of low-rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs.

  14. Using the sequential regression (SER) algorithm for long-term signal processing. [Intrusion detection

    SciTech Connect (OSTI)

    Soldan, D. L.; Ahmed, N.; Stearns, S. D.

    1980-01-01T23:59:59.000Z

    The use of the sequential regression (SER) algorithm (Electron. Lett., 14, 118(1978); 13, 446(1977)) for long-term processing applications is limited by two problems that can occur when an SER predictor has more weights than required to predict the input signal. First, computational difficulties related to updating the autocorrelation matrix inverse could arise, since no unique least-squares solution exists. Second, the predictor strives to remove very low-level components in the input, and hence could implement a gain function that is essentially zero over the entire passband. The predictor would then tend to become a no-pass filter which is undesirable in certain applications, e.g., intrusion detection (SAND--78-1032). Modifications to the SER algorithm that overcome the above problems are presented, which enable its use for long-term signal processing applications. 3 figures.

  15. Modeling of Human Intrusion Scenarios at the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Gross, M.B.; Hansen, F.D.; Knowles, M.K.; Larson, K.W.; Thompson, T.W.

    1998-12-04T23:59:59.000Z

    The Waste Isolation Pilot Plant is a mined, geologic repository designed for permanent disposal of transuranic waste. The facility is owned by the United States Department of Energy, and licensed for operations by the Environmental Protection Agency. Compliance with license requirements dictates that the repository must comply with regulatory stipulations that performance assessment calculations include the effects of resource exploitation on probable releases. Scenarios for these releases incorporate inadvertent penetration of the repository by an exploratory drilling operation. This paper presents the scenarios and models used to predict releases from the repository to the biosphere during. an inadvertent intrusion into the waste disposal regions. A summary of model results and conclusions is also presented.

  16. Technical basis document for the steam intrusion from interfacing systems accident

    SciTech Connect (OSTI)

    GOETZ, T.G.

    2003-03-21T23:59:59.000Z

    This technical basis document was developed to support the Documented Safety Analysis (DSA) and describes the risk binning process and the technical basis for assigning risk bins for the steam intrusion from interfacing systems representative accident and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR-level controls. Determination of the need for safety-class SSCs was performed in accordance with DOE-STD-3009-94, ''Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses'', as described in this report.

  17. A semi-intrusive deterministic approach to uncertainty quantification in non-linear fluid flow problems

    SciTech Connect (OSTI)

    Abgrall, Rémi, E-mail: remi.abgrall@inria.fr [Bacchus Team Project, Domaine de Voluceau Rocquencourt - B.P. 105 78153 Le Chesnay (France) [Bacchus Team Project, Domaine de Voluceau Rocquencourt - B.P. 105 78153 Le Chesnay (France); Institut de Mathématiques de Bordeaux, Université de Bordeaux, 351 Cours de la Libération, 33405 Talence (France); Congedo, Pietro Marco [Bacchus Team Project, Domaine de Voluceau Rocquencourt - B.P. 105 78153 Le Chesnay (France) [Bacchus Team Project, Domaine de Voluceau Rocquencourt - B.P. 105 78153 Le Chesnay (France); Institut de Mathématiques de Bordeaux, Université de Bordeaux, 351 Cours de la Libération, 33405 Talence (France)

    2013-02-15T23:59:59.000Z

    This paper deals with the formulation of a semi-intrusive (SI) method allowing the computation of statistics of linear and non linear PDEs solutions. This method shows to be very efficient to deal with probability density function of whatsoever form, long-term integration and discontinuities in stochastic space. Given a stochastic PDE where randomness is defined on ?, starting from (i) a description of the solution in term of a space variables, (ii) a numerical scheme defined for any event ??? and (iii) a (family) of random variables that may be correlated, the solution is numerically described by its conditional expectancies of point values or cell averages and its evaluation constructed from the deterministic scheme. One of the tools is a tessellation of the random space as in finite volume methods for the space variables. Then, using these conditional expectancies and the geometrical description of the tessellation, a piecewise polynomial approximation in the random variables is computed using a reconstruction method that is standard for high order finite volume space, except that the measure is no longer the standard Lebesgue measure but the probability measure. This reconstruction is then used to formulate a scheme on the numerical approximation of the solution from the deterministic scheme. This new approach is said semi-intrusive because it requires only a limited amount of modification in a deterministic solver to quantify uncertainty on the state when the solver includes uncertain variables. The effectiveness of this method is illustrated for a modified version of Kraichnan–Orszag three-mode problem where a discontinuous pdf is associated to the stochastic variable, and for a nozzle flow with shocks. The results have been analyzed in terms of accuracy and probability measure flexibility. Finally, the importance of the probabilistic reconstruction in the stochastic space is shown up on an example where the exact solution is computable, the viscous Burgers equation.

  18. Verifying the secure setup of Unix client/servers and detection of network intrusion

    SciTech Connect (OSTI)

    Feingold, R.; Bruestle, H.R.; Bartoletti, T.; Saroyan, A.; Fisher, J.

    1995-07-01T23:59:59.000Z

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

  19. THE INFLUENCE OF ENVIRONMENTAL FACTORS ON SPATIAL AND TEMPORAL VARIATION OF FISH ASSEMBLAGES IN THE LOWER BRAZOS RIVER, TEXAS

    E-Print Network [OSTI]

    LI, RAYMOND Y.

    -margin assemblage (Table 3). Other species commonly collected (relative abundance > 0.1%) along the river-margin were (in decreasing order of relative abundance) silverband shiner Notropis shumardi, mosquitofish Gambusia affinis, ghost shiner Notropis buchanani....172 Pimephales vigilax bullhead minnow Pim vig 723 237 103 1,879 166 1,518 4,626 16.398 Mugil cephalus striped mullet Mug cep 0 0 6 612 1 0 619 2.194 Gambusia affinis western mosquitofish Gam aff 359 173 732 71 21 39 1,395 4...

  20. Experiments using non-intrusive particle tracing techniques for granular chute flows. Final report

    SciTech Connect (OSTI)

    Rosato, A.D.; Dave, R.N.; Fischer, I.S.

    1998-12-31T23:59:59.000Z

    The objective of this contract was to develop a system capable of non-intrusively tracking the motion of an individual particle for the study of granular flows down inclined chutes. The result of the project is a system capable of following the three-dimensional translational and rotational motion of an individual particle embedded with a flowing granular material. The basic system consists of a sphere embedded with three orthogonal transmitters emitting at different frequencies which induce voltages in an antenna array surrounding the flow regime. Analysis of the induced voltage signals within the framework of a derived model yields both the position and orientation of the sphere. Tests were performed in a small scale model chute as well as in a cylindrical vibrated granular bed, which clearly demonstrates the capability of the system. As a result of discussions at meetings held semi-annually for the Granular Flow Advanced Research Objectives (GFARO) contractors, it was deemed necessary to pursue an additional experimental program as part of this contract related to the measurement of sphere collision properties. The outcome of the work (reported in Appendix C) is the determination of certain properties which are needed for use in computer simulations and theory.

  1. A research tool for long-term and continuous analysis of fish assemblage in coral-reefs using underwater camera footage

    E-Print Network [OSTI]

    Fisher, Bob

    A research tool for long-term and continuous analysis of fish assemblage in coral-reefs using a better understanding of a complex environment such as a coral reef, collecting data for long-term monitoring of these environments is essential. Long-term monitoring of a coral reef environment can however

  2. Establishment of a facility for intrusive characterization of transuranic waste at the Nevada Test Site

    SciTech Connect (OSTI)

    Foster, B.D.; Musick, R.G.; Pedalino, J.P.; Cowley, J.L. [Bechtel Nevada Corp., Las Vegas, NV (United States); Karney, C.C. [Dept. of Energy, Las Vegas, NV (United States); Kremer, J.L.

    1998-01-01T23:59:59.000Z

    This paper describes design and construction, project management, and testing results associated with the Waste Examination Facility (WEF) recently constructed at the Nevada Test Site (NTS). The WEF and associated systems were designed, procured, and constructed on an extremely tight budget and within a fast track schedule. Part 1 of this paper focuses on design and construction activities, Part 2 discusses project management of WEF design and construction activities, and Part 3 describes the results of the transuranic (TRU) waste examination pilot project conducted at the WEF. In Part 1, the waste examination process is described within the context of Waste Isolation Pilot Plant (WIPP) characterization requirements. Design criteria are described from operational and radiological protection considerations. The WEF engineered systems are described. These systems include isolation barriers using a glove box and secondary containment structure, high efficiency particulate air (HEPA) filtration and ventilation systems, differential pressure monitoring systems, and fire protection systems. In Part 2, the project management techniques used for ensuring that stringent cost/schedule requirements were met are described. The critical attributes of these management systems are described with an emphasis on team work. In Part 3, the results of a pilot project directed at performing intrusive characterization (i.e., examination) of TRU waste at the WEF are described. Project activities included cold and hot operations. Cold operations included operator training, facility systems walk down, and operational procedures validation. Hot operations included working with plutonium contaminated TRU waste and consisted of waste container breaching, waste examination, waste segregation, data collection, and waste repackaging.

  3. Cosmic Rays to Acoustics: Non-intrusive Monitoring for Nuclear Applications

    SciTech Connect (OSTI)

    Stanley, S.J.; Scully, P. [Nexia Solutions, H260 Hinton House, Risley, Warrington, WA6 3AS (United Kingdom)

    2007-07-01T23:59:59.000Z

    The radioactive nature of the material handled during nuclear reprocessing or fuel manufacture often makes both process monitoring and process diagnostics most challenging. Fox example, quantifying material inside a radiation shielded storage vessel, locating sediment layers and the associated interfaces represents a difficult challenge. Alternatively, measuring the extent of sludge re-suspension and quantifying the amounts of sludge transferred during a sludge movement campaign also represents a re-occurring problem. Remote non-invasive process monitoring and imaging techniques are most applicable in the nuclear sector as they provide a means to monitor or image the given process, container or vessel allowing a remote interrogation whilst reducing operator dosage uptake. A number of currently used types of non-intrusive process monitoring and imaging techniques are discussed in this paper, each with their associated applications. Firstly, the use of (very) high energy naturally occurring cosmic ray muons for imaging the internal contents of large or radiation shielded vessels is discussed. Secondly, the use of non-invasive acoustic monitoring techniques to detect the presence of a gas-core inside a stirred vessel as well as the detection of flowing solids is described. Finally, the use of electrical resistance tomography for imaging the ease of sludge re-suspension in a storage vessel is also discussed. Within the UK Nuclear Sector, the use of non-invasive imaging and process monitoring techniques in recent years has shown a marked increase. Being able to 'see inside' the process represents a powerful tool allowing the quantification, location and characterisation of material whilst increasing the overall understanding of the given process providing significant safety, economical and operational benefits. (authors)

  4. Changes in Native Aquatic Vegetation, Associated Fish Assemblages, and Food Habits of Largemouth Bass (Micropterus salmoides) Following the Addition of Triploid Grass Carp to Manage Hydrilla (Hydrilla Verticillata) in Lake Conroe, TX

    E-Print Network [OSTI]

    Ireland, Patrick Alexander

    2011-10-21T23:59:59.000Z

    and condition changes of Centrachid species, largemouth diet changes, and changes in the fish assemblages among randomly selected sampling stations between early fall 2007, when grass carp were stocked, and one year later in early fall of 2008. The areas...

  5. In this project, we deal with the simulation and the optimisation of flows when uncertainties exist in the models and/or the data. We only consider non intrusive methods so that existing CFD softwares

    E-Print Network [OSTI]

    Abgrall, Rémi

    uncertainties exist in the models and/or the data. We only consider non intrusive methods so that existing CFD. To this aim, we pursue the study of a non intrusive, accurate method, which is also non sensitive for very non linear systems of PDEs, where the solutions are often discontinuous and/or chaotic

  6. Resolving discrepancies between hydraulic and chemical calibration data for seawater intrusion groundwater flow models by considering climate-driven sea level change.

    SciTech Connect (OSTI)

    J. Chapman; A. Hassan; K. Pohlmann

    2001-10-18T23:59:59.000Z

    Groundwater models of seawater intrusion environments can be calibrated using both hydraulic and chemical information. The possible impact of the long-term transient process of sea level change is difficult to identify, but important to accurate simulation of present conditions. The response times of the pressure and chemical fields to major fluctuations in sea level change are investigated

  7. Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu)

    E-Print Network [OSTI]

    Dickerson, Julie A.

    Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie on a network. It uses simple data mining techniques to process the network input data and help expose metrics administrator. This paper describes the components in the FIRE architecture and explains their roles. Particular

  8. Major shifts in calcareous phytoplankton assemblages through the Eocene-Oligocene transition of Tanzania and their implications for low-latitude primary production

    E-Print Network [OSTI]

    Jones, Tom Dunkley; Bown, Paul R.; Pearson, Paul N.; Wade, Bridget S.; Coxall, Helen K.; Lear, Caroline H.

    Major shifts in calcareous phytoplankton assemblages through the Eocene-Oligocene transition of Tanzania and their implications for low-latitude primary production Tom Dunkley Jones, 1 Paul R. Bown, 2 Paul N. Pearson, 3 Bridget S. Wade, 4 Helen K... carbonate primary production at the onset of global cooling, and (3) a significant increase in nutrient availability in the low-latitude surface ocean through the EOT. Citation: Dunkley Jones, T., P. R. Bown, P. N. Pearson, B. S. Wade, H. K. Coxall, and C. H...

  9. Direct sequential system assemblage

    E-Print Network [OSTI]

    Sandomire, Daniel M. (Daniel Micah)

    1997-01-01T23:59:59.000Z

    Decisions made during the building process have the opportunity to both inform the next set of decisions and provide unexpected and possibly positive features in the final project. Thus, working beyond the minimum definition ...

  10. The advancement of a technique using principal component analysis for the non-intrusive depth profiling of radioactive contamination

    SciTech Connect (OSTI)

    Adams, J. C.; Joyce, M. J. [Engineering Dept., Lancaster Univ., Lancaster. LA1 4YR (United Kingdom); Mellor, M. [Createc Ltd., Derwent Mills Commercial Park, Cockermouth, Cumbria. CA13 0HT (United Kingdom)

    2011-07-01T23:59:59.000Z

    A non-intrusive technique using principal component analysis, to infer the depth of the fission fragment caesium-137, when it is buried under silica sand has been described. Using energy variances within different {gamma}-ray spectra, a complete depth model was produced for a single caesium-137 source buried under 1 mm depths ranging between 5-50 mm. This was achieved using a cadmium telluride detector and a bespoke phantom. In this paper we describe the advancement of the technique by further validating it using blind tests for applications outside of the laboratory, where not only the depth (z) but also the surface (x, y) location of {gamma}-ray emitting contamination is often poorly characterised. At present the technique has been tested at the point of maximum activity above the entrained {gamma}-ray emitting source (where the optimal x, y location is known). This is not usually practical in poorly characterized environments where the detector cannot be conveniently placed at such an optimal location to begin with and scanning at multiple points around the region of interest is often required. Using a uniform scanning time, the point of maximum intensity can be located by sampling in terms of total count rate, and converging on this optimal point of maximum intensity. (authors)

  11. MONITORING DE LA CORROSION EN LIGNE DE LA CORROSION EN LIGNE NON INTRUSIF NON-INTRUSIVE ONLINE CORROSION MONITORING

    E-Print Network [OSTI]

    A. Saluja; J Costain; E. Van Der Leden; C. Laverde

    La corrosion dans l’industrie du procédé est un enjeu majeur et est la cause la plus fréquente des défaillances des équipements et des arrêts forcés des sites industriels. Les défaillances des pipelines ou des réservoirs peuvent être dangereuses, coûteuses et ont des effets graves sur l’environnement. Une défaillance typique est la diminution jusqu’à un seuil critique de l’épaisseur des parois à cause de l’érosion ou de la corrosion interne comme externe. Actuellement, le suivi de la corrosion dans les pipes et les réservoirs utilise le plus souvent une inspection et un suivi manuel, procédure coûteuse notamment en temps. De plus, les zones critiques sont souvent situées dans des emplacements d’accès difficile. Comme ces données ne sont pas automatiquement informatisées, elles sont peu fiables pour des analyses à long terme ou le suivi de la corrosion. L’objectif de cet article est de présenter une nouvelle technologie non intrusive pour le monitoring de la corrosion, utilisant les ultrasons et un software afin de stocker les données, suivre les taux et les tendances de la corrosion, ce qui permet un plan de maintenance avant que la défaillance se produise. Cet article est divisé en deux parties. Dans la première partie nous allons aborder les différents types de corrosion et comment ils se produisent. Dans la

  12. Considerations Related To Human Intrusion In The Context Of Disposal Of Radioactive Waste-The IAEA HIDRA Project

    SciTech Connect (OSTI)

    Seitz, Roger; Kumano, Yumiko; Bailey, Lucy; Markley, Chris; Andersson, Eva; Beuth, Thomas

    2014-01-09T23:59:59.000Z

    The principal approaches for management of radioactive waste are commonly termed ‘delay and decay’, ‘concentrate and contain’ and ‘dilute and disperse’. Containing the waste and isolating it from the human environment, by burying it, is considered to increase safety and is generally accepted as the preferred approach for managing radioactive waste. However, this approach results in concentrated sources of radioactive waste contained in one location, which can pose hazards should the facility be disrupted by human action in the future. The International Commission on Radiological Protection (ICRP), International Atomic Energy Agency (IAEA), and Organization for Economic Cooperation and Development/Nuclear Energy Agency (OECD/NEA) agree that some form of inadvertent human intrusion (HI) needs to be considered to address the potential consequences in the case of loss of institutional control and loss of memory of the disposal facility. Requirements are reflected in national regulations governing radioactive waste disposal. However, in practice, these requirements are often different from country to country, which is then reflected in the actual implementation of HI as part of a safety case. The IAEA project on HI in the context of Disposal of RadioActive waste (HIDRA) has been started to identify potential areas for improved consistency in consideration of HI. The expected outcome is to provide recommendations on how to address human actions in the safety case in the future, and how the safety case may be used to demonstrate robustness and optimize siting, design and waste acceptance criteria within the context of a safety case.

  13. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

    2011-09-01T23:59:59.000Z

    Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

  14. Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2007-06-01T23:59:59.000Z

    In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for extraction of groundwater from the deep carbonate aquifer. Grazing and hunting are unlikely to be potential causes for inadvertent human intrusion into waste areas because of vegetation characteristics and lack of significant game animal populations.

  15. Tracing the magmatic/hydrothermal transition in regional low-strain zones: The role of magma dynamics in strain localization at pluton roof, implications for intrusion-related gold

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    dynamics in strain localization at pluton roof, implications for intrusion-related gold deposits Eric features of a granite-pluton roof; large-scale dykes and a network of gold veins are intensively developed in this roof, recording a succession of mechanical instabilities. Our gravity survey underlines the presence

  16. Monitoring CO 2 sequestration into deep saline aquifer and associated salt intrusion using coupled multiphase flow modeling and time lapse electrical resistivity tomography

    SciTech Connect (OSTI)

    Chuan Lu; CHI Zhang; Hai Hanag; Timothy C. Johnson

    2014-04-01T23:59:59.000Z

    Successful geological storage and sequestration of carbon dioxide (CO2) require efficient monitoring of the migration of CO2 plume during and after large-scale injection in order to verify the containment of the injected CO2 within the target formation and to evaluate potential leakage risk. Field studies have shown that surface and cross-borehole electrical resistivity tomography (ERT) can be a useful tool in imaging and characterizing solute transport in heterogeneous subsurface. In this synthetic study, we have coupled a 3-D multiphase flow model with a parallel 3-D time-lapse ERT inversion code to explore the feasibility of using time-lapse ERT for simultaneously monitoring the migration of CO2 plume in deep saline formation and potential brine intrusion into shallow fresh water aquifer. Direct comparisons of the inverted CO2 plumes resulting from ERT with multiphase flow simulation results indicate the ERT could be used to delineate the migration of CO2 plume. Detailed comparisons on the locations, sizes and shapes of CO2 plume and intruded brine plumes suggest that ERT inversion tends to underestimate the area review of the CO2 plume, but overestimate the thickness and total volume of the CO2 plume. The total volume of intruded brine plumes is overestimated as well. However, all discrepancies remain within reasonable ranges. Our study suggests that time-lapse ERT is a useful monitoring tool in characterizing the movement of injected CO2 into deep saline aquifer and detecting potential brine intrusion under large-scale field injection conditions.

  17. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    SciTech Connect (OSTI)

    Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu

    2008-10-01T23:59:59.000Z

    One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water standards might be exceeded was evaluated. A variety of scenarios and aquifer conditions was considered in a sensitivity evaluation. The scenarios and conditions simulated in Section 4, in particular those describing the geochemistry and mineralogy of potable aquifers, were selected based on the comprehensive geochemical model developed in Section 3.

  18. Development of computer program ENAUDIBL for computation of the sensation levels of multiple, complex, intrusive sounds in the presence of residual environmental masking noise

    SciTech Connect (OSTI)

    Liebich, R. E.; Chang, Y.-S.; Chun, K. C.

    2000-03-31T23:59:59.000Z

    The relative audibility of multiple sounds occurs in separate, independent channels (frequency bands) termed critical bands or equivalent rectangular (filter-response) bandwidths (ERBs) of frequency. The true nature of human hearing is a function of a complex combination of subjective factors, both auditory and nonauditory. Assessment of the probability of individual annoyance, community-complaint reaction levels, speech intelligibility, and the most cost-effective mitigation actions requires sensation-level data; these data are one of the most important auditory factors. However, sensation levels cannot be calculated by using single-number, A-weighted sound level values. This paper describes specific steps to compute sensation levels. A unique, newly developed procedure is used, which simplifies and improves the accuracy of such computations by the use of maximum sensation levels that occur, for each intrusive-sound spectrum, within each ERB. The newly developed program ENAUDIBL makes use of ERB sensation-level values generated with some computational subroutines developed for the formerly documented program SPECTRAN.

  19. Non-intrusive and structure preserving multiscale integration of stiff ODEs, SDEs and Hamiltonian systems with hidden slow dynamics via flow averaging

    E-Print Network [OSTI]

    Tao, Molei; Marsden, Jerrold E

    2009-01-01T23:59:59.000Z

    We introduce a new class of integrators for stiff ODEs as well as SDEs. These integrators are (i) {\\it Multiscale}: they are based on flow averaging and so do not resolve the fast variables but rather employ step-sizes determined by slow variables (ii) {\\it Basis}: the method is based on averaging the flow of the given dynamical system (which may have hidden slow and fast processes) instead of averaging the instantaneous drift of assumed separated slow and fast processes. This bypasses the need for identifying explicitly (or numerically) the slow or fast variables. (iii) {\\it Non intrusive}: A pre-existing numerical scheme resolving the microscopic time scale can be used as a black box and turned into one of the integrators in this paper by simply turning the large coefficients on over a microscopic timescale and off during a mesoscopic timescale. (iv) {\\it Convergent over two scales}: strongly over slow processes and in the sense of measures over fast ones. (v) {\\it Structure preserving}: For stiff Hamiltoni...

  20. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    SciTech Connect (OSTI)

    Tolan, T.L. [Tolan, Beeson and Associates, Kennewick, WA (United States)

    1993-06-01T23:59:59.000Z

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system.

  1. Water intrusion in underground structures

    E-Print Network [OSTI]

    Nazarchuk, Alex

    2008-01-01T23:59:59.000Z

    This thesis presents a study of the permissible groundwater infiltration rates in underground structures, the consequences of this leakage and the effectiveness of mitigation measures. Design guides and codes do not restrict, ...

  2. Non-intrusive cooling system

    DOE Patents [OSTI]

    Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

    2001-05-22T23:59:59.000Z

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  3. re.Assemblage Bridging Traditional Craft

    E-Print Network [OSTI]

    to the significanceofattentiontodetailsuchascraftandwoodqualities. #12; 4 Finally,FusedCraftsisacollectionofartifactsthatareparthandcraftedandpart3D printed

  4. Apparatuses, Globalities, Assemblages: Third Cinema, Now

    E-Print Network [OSTI]

    Benfield, Dalida Maria

    2011-01-01T23:59:59.000Z

    Lighting Ltd. , Foshan/Siemens art program. Fanon, F. (decolonizing-the-digitaldigital- decolonization Siemens. (2010a). “Siemens in China – November 2008. ” Retrieved from

  5. Trace fossil assemblages in selected shelf sandstones

    E-Print Network [OSTI]

    Locke, Kathleen Ann

    1983-01-01T23:59:59.000Z

    and decreasing marine 1nfluence. Individual trace fossil types are more abundant and show a greater d1versity 1n the delta-margin facies; several large, vert1cal crab(?) burrows are P ascot a d th bi g is do 1 t d by ~Ohio o h In the shelf sequences, mostly... ~Zoo h os, f d ly i th iddl -to. outer and outer shelf sequences. Continued study of trace fossils should provide more specific information than the general shelf locations described above. ACKNOWLEDGEMENTS The completion of this thesis marks...

  6. Gravity-Driven Intrusions in Stratified Fluids

    E-Print Network [OSTI]

    Maurer, Benjamin D.

    2011-01-01T23:59:59.000Z

    in upstream kinetic wave energy against the level of neutralincrease in upstream total wave energy against the level ofin upstream potential wave energy against the level of

  7. Gravity-driven intrusions in stratified fluids

    E-Print Network [OSTI]

    Maurer, Benjamin Dudley

    2011-01-01T23:59:59.000Z

    in upstream kinetic wave energy against the level of neutralincrease in upstream total wave energy against the level ofin upstream potential wave energy against the level of

  8. Non-intrusive Termination of Noisy Optimization ?

    E-Print Network [OSTI]

    2011-07-20T23:59:59.000Z

    May 31, 2011 ... and hence examining the solution and/or restarting the optimization .... Specifically, a test is scale invariant in f if it terminates optimization.

  9. Disruptive event analysis: volcanism and igneous intrusion

    SciTech Connect (OSTI)

    Crowe, B.M.

    1980-08-01T23:59:59.000Z

    An evaluation is made of the disruptive effects of volcanic activity with respect to long term isolation of radioactive waste through deep geologic storage. Three major questions are considered. First, what is the range of disruption effects of a radioactive waste repository by volcanic activity. Second, is it possible, by selective siting of a repository, to reduce the risk of disruption by future volcanic activity. And third, can the probability of repository disruption by volcanic activity be quantified. The main variables involved in the evaluation of the consequences of repository disruption by volcanic activity are the geometry of the magma-repository intersection (partly controlled by depth of burial) and the nature of volcanism. Potential radionuclide dispersal by volcanic transport within the biosphere ranges in distance from several kilometers to global. Risk from the most catastrophic types of eruptions can be reduced by careful site selection to maximize lag time prior to the onset of activity. Certain areas or volcanic provinces within the western United States have been sites of significant volcanism and should be avoided as potential sites for a radioactive waste repository. Examples of projection of future sites of active volcanism are discussed for three areas of the western United States. Probability calculations require two types of data: a numerical rate or frequency of volcanic activity and a numerical evaluation of the areal extent of volcanic disruption for a designated region. The former is clearly beyond the current state of art in volcanology. The latter can be approximated with a reasonable degree of satisfaction. In this report, simplified probability calculations are attempted for areas of past volcanic activity.

  10. Hierarchical Task Analysis of Intrusion Detection Systems

    E-Print Network [OSTI]

    Blustein, J.

    .......................... 4 3. Hierarchical Task Analysis ............................ 6 3.1 Network Security Administrator .................... 7 3.2 Functions of Network Security Administrator ....... 7 4. Diagrams on a single or group of persons called Network Security Administrators. They use a wide variety of tools

  11. Intrusion-Tolerant Protection for Critical Infrastructures

    E-Print Network [OSTI]

    Neves, Nuno

    of an organization in the face of accidents and attacks. How- ever, they are not simple firewalls but distributed]. In recent years these systems evolved in several aspects that greatly increased their exposure to cyber-attacks, a critical information infrastructure is formed by facilities, like power transformation substations or cor

  12. Online Display Advertising: Targeting and Intrusiveness

    E-Print Network [OSTI]

    Tucker, Catherine Elizabeth

    We use data from a large-scale field experiment to explore what influences the effectiveness of online advertising. We find that matching an ad to website content and increasing an ad's obtrusiveness independently increase ...

  13. Intrusion detection and monitoring for wireless networks.

    SciTech Connect (OSTI)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01T23:59:59.000Z

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  14. Beyond Reactive Management of Network Intrusions

    E-Print Network [OSTI]

    students · Visiting scholars from Canada, Italy, South Africa, Korea, India, Japan, Spain, Germany, Sweden

  15. Intrusion Recovery Using Selective Re-execution

    E-Print Network [OSTI]

    Kim, Taesoo

    RETRO repairs a desktop or server after an adversary compromises it, by undoing the adversary's changes while preserving legitimate user actions, with minimal user involvement. During normal operation, RETRO records an ...

  16. Inverse Modeling for Coastal Seawater Intrusion

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    , USA) #12;INTRODUCTION · Inverse modeling ­ standard tool for groundwater modeling ­ uncommonD3D.1 ­ 2D and 3D finite-element code for simulating variable-density groundwater problems · UCODE 3 and given time (i.e. at one observation location) on one of the parameters in the groundwater model

  17. Analysis of the Pass Cavallo shipwreck assemblage, Matagorda Bay, Texas

    E-Print Network [OSTI]

    Borgens, Amy Anne

    2004-09-30T23:59:59.000Z

    at Goliad. The vessel wrecked at the entrance of the historic Pass Cavallo while evading capture from a Mexican brig-of-war in November of 1835....

  18. The analysis and conservation of the Belle footwear assemblage

    E-Print Network [OSTI]

    Randolph, Anthony G., Jr

    2003-01-01T23:59:59.000Z

    Nautical archaeology can be loosely defined as the study of the material remains of ships and their contents as a component of a broader cultural system. The oceans and lakes of the world are replete with shipwrecks from all eras, and these sites...

  19. OIKOS 96: 169181, 2002 Are land bird assemblages functionally saturated?

    E-Print Network [OSTI]

    Medellín, Rodrigo

    in Mexico He´ctor Go´mez de Silva and Rodrigo A. Medelli´n Go´mez de Silva, H. and Medelli´n, R. A. 2002 such patterns in their regional species pools. H. Go´mez de Sil6a and R. A. Medelli´n, Instituto de Ecologi

  20. The assemblage of exchange : housing, industry and the potential mall

    E-Print Network [OSTI]

    Eng, Ronald J. (Ronald Jan)

    1994-01-01T23:59:59.000Z

    This thesis is interested in examining a contemporary generative method for approaching design in urban areas. It considers the levels of interactions in the city in which the questions of architecture are clearly affected ...

  1. ORIGINAL PAPER Seasonal progression of diatom assemblages in surface waters

    E-Print Network [OSTI]

    relative to other periods of the study, although carbon export was relatively low. Melt water flux the Palmer Long Term Ecological Research (Pal-LTER) project have documented a 40% decrease in mean duration Bordeaux 1, Av. Des Facultes, 33405 Talence Cedex, France A. Clarke British Antarctic Survey, High Cross

  2. Epifaunal Assemblages on Deep-water Corals in Roatan, Honduras

    E-Print Network [OSTI]

    Lavelle, Katherine

    2012-10-30T23:59:59.000Z

    45 Discussion 48 References 51 Summary 53 Appendices 57 v List of Tables Table 1. Absolute abundance of coral morphospecies at study sites (AKR= Anthony?s Key, GBB= Gibson Bight..., HMB= Half Moon Bay, LBE= Luna Beach, LWR= Lawson?s Rock, OLS= Old Loafer?s, SDM= Sueno del Mar, SDR= Sueno del Bahia). Table 2. Absolute abundance of epifaunal species at study sites (AKR= Anthony?s Key, GBB= Gibson Bight, HMB= Half Moon Bay, LBE...

  3. Analysis of the Pass Cavallo shipwreck assemblage, Matagorda Bay, Texas 

    E-Print Network [OSTI]

    Borgens, Amy Anne

    2004-09-30T23:59:59.000Z

    A survey conducted in February of 1998 located an anomaly originally believed to be the remains of L'Aimable. L'Aimable was one of four ships utilized by Rene-Robert Cavelier, Sieur de La Salle, for his voyage to colonize ...

  4. Choreographic assemblages : an archaeology of movement and space

    E-Print Network [OSTI]

    Can, Chiu-Fai, 1974-

    2003-01-01T23:59:59.000Z

    Time and movement always played a vital role in architecture, and it also takes significance in my work. This interest leads me to the investigation of choreography and dance notation in relation to space. By using notation, ...

  5. assemblage copepoda crustacea: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an...

  6. Calcareous nannoplankton and benthic foraminiferal assemblages from the Nazar Canyon

    E-Print Network [OSTI]

    .g. upwelling, internal waves, and turbidity currents), the distance From Deep-sea to Coastal Zones: Methods waves) may be locally promoting favourable conditions for calcareous nannoplankton, as shown by high the coast shifts from an N ­ S to a NE ­ SW orientation, probably capturing most of the long-shore sediment

  7. assemblage combustible nucleaire: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an...

  8. FISH ASSEMBLAGES ASSOCIATED WITH PLATFORMS AND NATURAL REEFS

    E-Print Network [OSTI]

    Love, Milton

    the lease or pipeline right-of-way to a condition that meets the requirements of the regulations. The BOEMRE of Ocean Energy Management, Regulation and Enforcement Pacific OCS Region Camarillo, CA, 93010 August 2010 of Ocean Energy Management, Regulation and Enforcement, U. S. Department of Interior and approved

  9. Performance of species richness estimators across assemblage types

    E-Print Network [OSTI]

    remains a topic of much debate (Brose et al., 2003). Attempts to quantify species diversity often include

  10. Habitat associations of fish assemblages in the Sulphur River, Texas

    E-Print Network [OSTI]

    Morgan, Michael Neal

    2002-01-01T23:59:59.000Z

    As part of an instream flow study, information on summer distribution of fishes and habitat variables was collected from six sites at each of three flows in the Sulphur River, Texas. I evaluated (1) spatiotemporal relationships between instream...

  11. Multispecies diel transcriptional oscillations in open ocean heterotrophic bacterial assemblages

    E-Print Network [OSTI]

    Marin, R.

    Oscillating diurnal rhythms of gene transcription, metabolic activity, and behavior are found in all three domains of life. However, diel cycles in naturally occurring heterotrophic bacteria and archaea have rarely been ...

  12. LATE ORDOVICIAN CLIMBING DUNE ASSEMBLAGES, THE SIGNATURE OF GLACIAL OUTBURST ?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , jean-loup.rubino@total.com 4NOC, Libya, Y-Boujazia@yahoo.com Meltwater-related processes have long been of the Western Murzuq Basin/ Tassili n'Ajjer area (southern Libya ­ Algeria boundary), this presentation aims

  13. LATE ORDOVICIAN CLIMBING DUNE ASSEMBLAGES : THE SIGNATURE OF GLACIAL OUTBURST?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    · Channel axis SW-NE · 4 internal erosion-based subunits Wadi Inlalen example · Steady & uniform · Lower · Transfert toward adjacent eddy-related side bars Smaller scale analogue channel in modern wadi sandy flood · In places, accretion surfaces Wadi Aramat & Alun example Depositional facies Depositional model · Unconfined

  14. ant dispersal assemblages: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    surface) with numerous colonies of the ascidian Diazona violacea, and the polychaete Sabella pavonina. This study highlights, also for a Mediterranean seamount, the potential...

  15. assemblage growth rate: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    surface) with numerous colonies of the ascidian Diazona violacea, and the polychaete Sabella pavonina. This study highlights, also for a Mediterranean seamount, the potential...

  16. Substorm onset by new plasma intrusion: THEMIS spacecraft observations

    E-Print Network [OSTI]

    California at Berkeley, University of

    based data sets [e.g., McPherron et al., 1973; Lyons, 1995; Angelopoulos et al., 2008; Lui, 2008 be missed in earlier studies. They surveyed the 2008 THEMIS tail season data and found that more than 80 Department of Atmospheric and Oceanic Science, University of California, Los Angeles, Los Angeles, California

  17. Numerical modeling of seawater intrusion into endorheic hydrological systems

    E-Print Network [OSTI]

    Lyakhovsky, Vladimir

    concentration to brine through evaporation, the dense brine starts to flow below the encroaching seawater body. Below it an interface is recognized between the encroaching seawater body and a brine body underneath

  18. Building Intrusion Detection with a Wireless Sensor Network

    E-Print Network [OSTI]

    Braun, Torsten

    supported by the National Competence Center in Research on Mobile Information and Communication Systems. In order to save energy for communication, the system provides all nodes with some adaptive short: Is it possible to develop an energy-efficient reliable building surveillance system? Can the data volume

  19. Improving shipboard maintenance practices using non-intrusive load monitoring

    E-Print Network [OSTI]

    Piber, Mark A. (Mark Augustin)

    2007-01-01T23:59:59.000Z

    (cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

  20. Intrusive Galerkin methods with upwinding for uncertain nonlinear hyperbolic systems

    SciTech Connect (OSTI)

    Tryoen, J., E-mail: tryoenj@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France); LIMSI-CNRS, 91403 Orsay cedex (France); Le Maitre, O., E-mail: olm@limsi.f [LIMSI-CNRS, 91403 Orsay cedex (France); CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ndjinga, M., E-mail: michael.ndjinga@cea.f [CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ern, A., E-mail: ern@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France)

    2010-09-01T23:59:59.000Z

    This paper deals with stochastic spectral methods for uncertainty propagation and quantification in nonlinear hyperbolic systems of conservation laws. We consider problems with parametric uncertainty in initial conditions and model coefficients, whose solutions exhibit discontinuities in the spatial as well as in the stochastic variables. The stochastic spectral method relies on multi-resolution schemes where the stochastic domain is discretized using tensor-product stochastic elements supporting local polynomial bases. A Galerkin projection is used to derive a system of deterministic equations for the stochastic modes of the solution. Hyperbolicity of the resulting Galerkin system is analyzed. A finite volume scheme with a Roe-type solver is used for discretization of the spatial and time variables. An original technique is introduced for the fast evaluation of approximate upwind matrices, which is particularly well adapted to local polynomial bases. Efficiency and robustness of the overall method are assessed on the Burgers and Euler equations with shocks.

  1. Mathematical methods for non-intrusive load monitoring

    E-Print Network [OSTI]

    Remscrim, Zachary (Zachary N.)

    2010-01-01T23:59:59.000Z

    The calculation of the Discrete Fourier Transform (DFT) of a discrete time signal is a fundamental problem in discrete-time signal processing. This thesis presents algorithms that use methods from number theory and algebra ...

  2. Method and apparatus for distributed intrusion protection system...

    Office of Scientific and Technical Information (OSTI)

    for ultra high bandwidth networks Re-direct Destination: A method for providing security to a network having a data stream with a plurality of portions of data, each having...

  3. ccsd00000575 Intrusion and extrusion of water in hydrophobic mesopores

    E-Print Network [OSTI]

    , France d Laboratoire de Physique de la Mati#18;ere Condens#19;ee et Nanostructures, Universit#19;e Claude, devoted to the storage or dissipation of mechanical energy, has begun to develop [3]. This ap- plication as de#12;ned by IUPAC, and the energetic characteristics of devices based on this process are directly

  4. A Continuous Time Bayesian Network Approach for Intrusion Detection

    E-Print Network [OSTI]

    Xu, Jing

    2010-01-01T23:59:59.000Z

    also challenges network administrators to deal with identitya fact of life for network administrators. Detecting attackscan help the network administrator tell whether the current

  5. anomaly intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Creation via Clustering Anomalies Gilbert R. Hendry and Shanchieh J. Yang apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work...

  6. A Multiple Model Cost-Sensitive Approach for Intrusion Detection

    E-Print Network [OSTI]

    Lee, Wenke

    that are optimized for user-de#12;ned cost metrics. Empirical experiments in o#11;- line analysis show a reduction of approximately 97% in operational cost over a single model approach, and a reduction of approximately 30 the initial results of our current research in extending our data mining framework to build cost

  7. Non-Intrusive Electric Load Monitoring in Commercial Buildings

    E-Print Network [OSTI]

    Norford, L. K.; Mabey, N.

    , W.T.; Cameron, lR. and Dow, A.B. 1988. "On line diagnostics of large induction motors." Vibrations and Audible Noise in Alternating Current Machines, Belmans, R.; Binns, K.; Geysen, W.; and Vandenput, A., eds. Kluwer Academic Publishers. 140... review of elecnic motor literature indicated that samples of elecnical current taken at slightly faster than twice the 60 Hz fundamental can be used to detect several indicators of incipient motor failure. Tests were initiated to determine whether...

  8. Continuous Time Bayesian Networks for Host Level Network Intrusion Detection

    E-Print Network [OSTI]

    Shelton, Christian R.

    R. Shelton Department of Computer Science and Engineering University of California, Riverside continuous time Bayesian networks learned from historic non-attack data and flag future event sequences whose. In this paper, we look at the problem of detecting such attacks at the host level. Instead of constructing

  9. Methods for non-intrusive sensing and system monitoring

    E-Print Network [OSTI]

    Schantz, Christopher James

    2014-01-01T23:59:59.000Z

    Improving the efficiency of collection, transmission, and consumption of resources is the focus of a wide swath of engineering research. Current technological solutions for capturing or mitigating energy and resource waste ...

  10. Shipboard fluid system diagnostics using non-intrusive load monitoring

    E-Print Network [OSTI]

    Mitchell, Gregory R. (Gregory Reed)

    2007-01-01T23:59:59.000Z

    Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

  11. ... Bleue comme une orange ou l'intrusion du design

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    / the more the product is incongruent, the more it is perceived as genetically modified and the less, incongruency, aesthetic preferences, genetically modified organism. hal-00547770,version1-17Dec2010 #12, 3/ color change is perceived as more worrying than shape change. Key words Design, food products

  12. Contact metamorphism of Precambrian gneiss by the Skaergaard Intrusion

    E-Print Network [OSTI]

    Bufe, N. Aaron; Holness, Marian B.; Humphreys, Madeleine C.S.

    2014-07-01T23:59:59.000Z

    they coexist, the bright rims on Qtz1b are commonly widest where they are adjacent to Qtz2 grains (Fig. 4a and b). The outermost parts of Qtz2 grains generally have fine- scale oscillatory zoning, with a pattern related to present- day grain boundaries (Fig. 4c... flood basalts into a fault-bounded magma chamber (Nielsen, 2004) (Fig. 1). The magma crystallized as a closed system, forming three sequences of cumulates (Fig. 2): the volumetrically dominant Layered Series, which crystallized upwards from the floor...

  13. Bloom Filter Based Intrusion Detection for Smart Grid

    E-Print Network [OSTI]

    Parthasarathy, Saranya

    2012-07-16T23:59:59.000Z

    SCADA server and field devices in power system. The approach is tested for attacks like HMI compromise and Man-in-the-Middle. Bloom Filter is chosen because of its strong space advantage over other data structures like hash tables, linked lists etc...

  14. A Continuous Time Bayesian Network Approach for Intrusion Detection

    E-Print Network [OSTI]

    Xu, Jing

    2010-01-01T23:59:59.000Z

    3 for more details). The ESS for any variable X in a CTBNwhen event P i can happen. The ESS we need are M P i |U Pi :occur when U = U p i , the ESS M P i |U Pi is just M P i ,

  15. Automatic compilation framework for Bloom filter based intrusion detection

    E-Print Network [OSTI]

    Najjar, Walid A.

    the FPGA fabric of a CSoC device. In the execution model underlying ROCCC, sequential computations are carried out on the microprocessor in the CSoC, while the compute intensive code segments are mapped onto

  16. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...

    Energy Savers [EERE]

    to be dropped. Additionally, if the Cisco ASA with a Cisco IPS SSP software module running an affected version of software is configured in High-Availability mode (HA), a...

  17. Non-intrusive characterization of heat transfer fluid aerosol formation

    E-Print Network [OSTI]

    Krishna, Kiran

    2001-01-01T23:59:59.000Z

    Heat transfer fluids are widely used in the chemical process industry and are available in a wide range of properties. These fluids are flammable above their flash points and can cause explosions. Though the possibility of aerosol explosions has...

  18. Distributed fiber optic intrusion sensor system for monitoring long perimeters 

    E-Print Network [OSTI]

    Juarez, Juan C.

    2009-06-02T23:59:59.000Z

    A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from...

  19. Automatic intrusion recovery with system-wide history

    E-Print Network [OSTI]

    Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

    2014-01-01T23:59:59.000Z

    Compromises of our computer systems are inevitable. New software vulnerabilities are discovered and exploited daily, but even if the software is bug-free, administrators may inadvertently make mistakes in configuring ...

  20. Minimizing Intrusiveness in Home Energy Measurement David Lachut

    E-Print Network [OSTI]

    Rollins, Sami

    management in homes. Like smart meters, most solar or other renewable deployments allow homeowners in homes. Like smart meters, most solar or other renewable deployments al- low homeowners to carefully on the market that enable measure- ment of energy usage, either at the scale of the entire home or individual

  1. Pasture and Soil Management Following Tidal Saltwater Intrusion

    E-Print Network [OSTI]

    Provin, Tony; Redmon, Larry; McFarland, Mark L.; Feagley, Sam E.

    2009-05-26T23:59:59.000Z

    When land is flooded by saltwater, as after a hurricane tidal surge, it can long-term effects on soil productivity and fertility. This publication explains how to reclaim flooded pasture land. Having soil tested for salinity is an important step....

  2. Decentralized Detector Generation in Cooperative Intrusion Detection Systems

    E-Print Network [OSTI]

    Alpcan, Tansu

    mechanisms, distributed monitoring-detection-prevention with self- * properties and a security simulation/evaluation) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e

  3. Performance Analysis in Intrusion Detection and Prevention Systems

    E-Print Network [OSTI]

    Boutaba, Raouf

    between system security and network performance. Index Terms--Security Performance Evaluation, Security. The evaluation of the IDPS performance for any given security configuration is a crucial step for improving real-checking process along with its consequent action (i.e., alert or drop) on the resulting security of the network

  4. CV-1b: Magmatic - Intrusive | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL Gas Recovery Biomass Facility Jump to:ROW

  5. Intrusion Margins and Associated Fractures | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInterias Solar Energy Jump to:IESInterval Data Systems IncInc

  6. August 18, 2015 Webinar - Probabilistic Analysis of Inadvertent Intrusion

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,3973 Audit Report: OAS-FS-14-03 December 12, 20130-0353 Audit4and

  7. Intrusion Detecting Using Secure Signatures - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn OtherEnergyBPA-Film-Collection Sign In

  8. An Intelligent Tutor for Intrusion Detection on Computer Systems An Intelligent Tutor for Intrusion Detection on Computer Systems

    E-Print Network [OSTI]

    and not especially common, practice with simulators is valuable. Simulators can efficiently drill students on rare-recognition rules to itself infer the problems, planning methods to figure how best to fix them, plan

  9. Large Monitoring Systems: Data Analysis, Design and Deployment

    E-Print Network [OSTI]

    Rajagopal, Ram

    2009-01-01T23:59:59.000Z

    groups: intrusive and non-intrusive. Intrusive sensors arefor traffic monitoring. Non-intrusive sensors require lessones. An example of a non-intrusive sensor is a digital

  10. The copper artifact assemblage from an Ottoman period shipwreck in the Red Sea

    E-Print Network [OSTI]

    Willis, Kathryn Ewalt

    2002-01-01T23:59:59.000Z

    . . . . . 58 vIu CHAPTER Page Pots. . . . . . . . ?. . ??, . ?????, , Lids. . Basins . . . . . . . . . . . . . . . . . . . . . . , . . . , Unique Large Vessel . . Small Vessels. Dishes . Cooking Pans . Trays. . Pitchers . . Strainers...

  11. Spatial and temporal variation in fish assemblage structure at Village Creek

    E-Print Network [OSTI]

    Moriarty, Loren Joan

    1995-01-01T23:59:59.000Z

    . . . . . . . . . . . 50 22. Length frequency distributions mesohabitat and season. of Gambusia affinis by 59 23. Length frequency distributions mesohabitat and season. of Etheostoma vivax by . . 60 24. Length frequency distributions mesohabitat and season... COLLECTED AT VILLAGE CREEK, PRESENTED IN DESCENDING ORDER OF SITE OCCURRENCE. pecies ypnne a venusta Pimephales vigilax Gambusia affinis Fundulus olivaceus Notropis sabinae Notropis texanus Lepomis macrochirus Etheostoma vivax Labidesthes sicculus...

  12. Environmental factors influencing fish assemblage structure in a naturally saline river system

    E-Print Network [OSTI]

    Dictson, Nikkoal Jean

    2000-01-01T23:59:59.000Z

    . Scientific Name Common Name Code Total Cyprinella lutrensis Gambusia affinis Lepomis megalotis Cypdinodon rubrofluviatilis Pimephales promelas Pimephales vigilax Fundulus zebrinus Lepomis cyanellus Lepomis humilis Amerius melas Lepomis macrochirus...

  13. Composition, structure, and habitat associations of fish assemblages of the Dolan Falls Preserve

    E-Print Network [OSTI]

    Valdes Cantu, Nora Edith

    1995-01-01T23:59:59.000Z

    , representing 13 families, and 27 species (Table 2). Based on the entire collection, Cyprinella venusra, Dionda argentosa, Norropis amabilis, Cyprlnella proserpina, and Gambusla affinis were the five most abundant species (Figure 3), comprising 85. 5... Cyprineiio prosperi na Gambusia affinis Etheostoma grahami Notropis stramineus Cypri nodon eximi us Lepomis megaiotis Cichlasoma cyanogutuatum Moxostoma congestum Micropterus dolomieu Dionda diaboii Mi cropterus salmoi des Lepisosteus osseus...

  14. Benthic Assemblage Variability in the Upper San Francisco Estuary: A 27-Year Retrospective

    E-Print Network [OSTI]

    Peterson, Heather A; Vayssieres, Marc

    2010-01-01T23:59:59.000Z

    Special thanks go to Ted Sommer for his support of thisFishes Feyrer F, Nobriga ML, Sommer TR. 2007. Multi- decadalEstuaries 20(3):504–520. Sommer T, Armor C, Baxter R, Breuer

  15. Benthic Assemblage Variability in the Upper San Francisco Estuary: A 27-Year Retrospective

    E-Print Network [OSTI]

    Peterson, Heather A; Vayssieres, Marc

    2010-01-01T23:59:59.000Z

    which lead from the Pacific Ocean to an inland river delta,San Joaquin River Pacific Ocean 10 m 16 km Water Export

  16. Benthic Assemblage Variability in the Upper San Francisco Estuary: A 27-Year Retrospective

    E-Print Network [OSTI]

    Peterson, Heather A; Vayssieres, Marc

    2010-01-01T23:59:59.000Z

    composition from the two peri- ods (?av = 0.01, p = 0.42).composition from the two peri- ods (?av = 0.06, p = 0.3).

  17. Effects Of Sea Otter Colonization On Soft-Sediment Intertidal Prey Assemblages In Glacier Bay, Alaska

    E-Print Network [OSTI]

    Weitzman, Benjamin Phillip

    2013-01-01T23:59:59.000Z

    structuring in soft-sediment systems over a multi-decadalcaloric demands. In soft-substrate systems, recolonizing seainfluences of otters on soft-sediment systems in Glacier Bay

  18. Effects of Grassland Restoration on Avian Assemblage Characteristics and Dickcissel Nesting Success in Texas

    E-Print Network [OSTI]

    Lituma, Christopher M.

    2010-07-14T23:59:59.000Z

    ?2008. C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s W a s h i n g t on 34 0 0. 81 W a s h i n g t on 29 0. 43 0. 69 N a v a r r o 34 0. 13 0. 82 C ol or a do 29 0. 3 0. 8 N a... v a r r o 32 0. 11 0. 63 A n de r s on 26 .6 0. 11 0. 77 N a v a r r o 29 .7 0. 04 0. 84 N a v a r r o 22 .5 0. 18 0. 75 N a v a r r o 24 .5 0. 26 0. 74 N a v a r r o 21 .9 0. 6 0. 32 N a v a r r o 18 .4 0. 33 0. 72 N a v a r r o 17 .6 0. 31 0. 76 N...

  19. The influence of littoral zone structural complexity on fish assemblages in Lake Conroe, TX

    E-Print Network [OSTI]

    Trial, Perry Felix

    1999-01-01T23:59:59.000Z

    the centroid for Spring. Centroids for threadfin shad and yellow bass lie in an intermediate position between Spring and Summer. The centroids for black crappie (Porno@i s nigromaculatus), gizzard shad (Dorasoma cepedianum), channel catfish (Ictalurus...

  20. Discordance between living and death assemblages as evidence for anthropogenic ecological change

    E-Print Network [OSTI]

    Boyce, C. Kevin

    '' in settings of documented anthropogenic eutrophication (AE) than in areas where AE and other human impacts with eutrophication (anomalous abundance of seagrass-dwellers and/or scarcity of organic-loving species in the death. ecological baseline eutrophication marine communities paleoecology Human activities affect living systems

  1. Changes in seagrass polychaete assemblages after invasion by Caulerpa racemosa var. cylindracea

    E-Print Network [OSTI]

    Martin, Daniel

    , si bien algunas de especies coincidentes difieren claramente en abundancia. La biomasa de C. racemosa

  2. Analysis of diet and feeding strategies within an assemblage of estuarine

    E-Print Network [OSTI]

    .6. The diet ofA. suppositus was dominated by harpacticoids. poly- chaete larvae, and the calanoid Gladio

  3. UNCORRECTEDPROOF 1 Fecundity determines the extinction threshold in a Canadian assemblage

    E-Print Network [OSTI]

    Holland, Jeffrey

    suggested to have negative effects on forest species. We determined 13 the extinction threshold for 12, species caught moving outside forest habitat had lower extinction thresholds than 19 species not caught habitat loss affects the 39extinction risk of different species is therefore an 40important part

  4. Authenticity, Authority, and Assemblage Masculinity: Geek Identity and Hardware Production in Networked Spaces

    E-Print Network [OSTI]

    Ross, Ian W.

    2014-01-01T23:59:59.000Z

    his seminal text on media fandom Textual Poachers, discussesbe associated with the levels of fandom seen in the kinds oforiented digital sites of fandom that I discuss throughout

  5. Dynamics of larval fish assemblages over a shallow coral reef in the Florida Keys

    E-Print Network [OSTI]

    Sponaugle, Su

    J. Fortuna Ã? K. Grorud Ã? T. Lee Communicated by P.W. Sammarco, Chauvin S. Sponaugle (&) Ã? J. Fortuna

  6. Evaluation of the paraphyletic assemblages within Lonchophyllinae, with description of a new tribe and genus

    E-Print Network [OSTI]

    Parlos, Julie A.; Timm, Robert M.; Swier, Vicki J.; Zeballos, Horacio; Baker, Robert J.

    2014-01-28T23:59:59.000Z

    of these karyotypes, previously not available for L. cadenai and L. concava, are shown in Fig. 1. Sequence divergence.—All intraspecific se- quence divergence values were less than 2.5%, with the exception of those for Platalina as well as populations representing...UM of texas tech University Table 1. Karyotype data obtained from the literature or described herein. Locality data are provided when available. Abbreviations are: L. = Lonchophylla, H. = Hsunycteris, 2N = diploid number, FN = fundamental number, Suriname...

  7. Authenticity, Authority, and Assemblage Masculinity: Geek Identity and Hardware Production in Networked Spaces

    E-Print Network [OSTI]

    Ross, Ian W.

    2014-01-01T23:59:59.000Z

    firearm legislation and the politics of the group specifically has clearly been affected by the group’s appropriation of 3D printing

  8. N d'ordre 2013ISAL0017 Anne 2013 Assemblages innovants en lectronique de

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    utilisant la technique de « Spark Plasma Sintering » Présentée devant L'Institut National des Sciences

  9. PERSPECTIVE Human impacts on the speciesarea relationship in reef fish assemblages

    E-Print Network [OSTI]

    Myers, Ransom A.

    attention (e.g. Brose et al. 2004; Drakare et al. 2006; Marti´n & Goldenfeld 2006) as ecologists continue

  10. The analysis of the Conde de Tolosa and the Nuestra Senora de Guadalupe olive jar assemblage

    E-Print Network [OSTI]

    James, Stephen Robert

    1985-01-01T23:59:59.000Z

    recovered in the New World. Analysis of these containers imparts a wealth of information critical to the understanding of this widely used and diffused ceramic type. Besides revealing a previously unreported form the study suggests needed changes in both.... A. , for his time and trouble with maps, provenience and general information; to all the people of the Domincan Republic for their buenas aventuras and smiles given during our stay on the island; to all my friends, colleagues and professors, who...

  11. Integrated metatranscriptomic and metagenomic analyses of stratified microbial assemblages in the North Pacific Subtropical Gyre

    E-Print Network [OSTI]

    Shi, Yanmei

    As part of an ongoing survey of microbial community gene expression in the ocean, we sequenced and compared ~38?Mbp of community transcriptomes and ~157?Mbp of community genomes from four bacterioplankton samples, along a ...

  12. Acculturation in the Upper Middle Missouri Valley as Reflected in Modified Bone Assemblages

    E-Print Network [OSTI]

    Weston, Timothy

    1986-05-01T23:59:59.000Z

    Villages National Historic Site (KNRI) located just north of the town of Stanton, North Dakota at the mouth of the Knife River (Fig. 1). The park was created by an act of Congress In 1974 In order to preserve significant archaeological resources... Villages National Historic Site (KNRI) located just north of the town of Stanton, North Dakota at the mouth of the Knife River (Fig. 1). The park was created by an act of Congress In 1974 In order to preserve significant archaeological resources...

  13. Effects of Grassland Restoration on Avian Assemblage Characteristics and Dickcissel Nesting Success in Texas 

    E-Print Network [OSTI]

    Lituma, Christopher M.

    2010-07-14T23:59:59.000Z

    ?2008. C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s W a s h i n g t on 34 0 0. 81 W a s h i n g t on 29 0. 43 0. 69 N a v a r r o 34 0. 13 0. 82 C ol or a do 29 0. 3 0. 8 N a... v a r r o 32 0. 11 0. 63 A n de r s on 26 .6 0. 11 0. 77 N a v a r r o 29 .7 0. 04 0. 84 N a v a r r o 22 .5 0. 18 0. 75 N a v a r r o 24 .5 0. 26 0. 74 N a v a r r o 21 .9 0. 6 0. 32 N a v a r r o 18 .4 0. 33 0. 72 N a v a r r o 17 .6 0. 31 0. 76 N...

  14. Influence of invasive palms on terrestrial arthropod assemblages in desert spring habitat

    E-Print Network [OSTI]

    Holmquist, Jeffrey G; Schmidt-Gengenbach, Jutta; Slaton, Michele R

    2011-01-01T23:59:59.000Z

    and seasons were Diptera, Hemiptera, and Araneae, and eightin descending order, Diptera, Hemiptera, and Acari, versusDiptera, Araneae, and Hemiptera in palms (Table 2).

  15. Terrestrial and Aquatic Macroinvertebrate Assemblages as a Function of Wetland Type across a Mountain Landscape

    E-Print Network [OSTI]

    Holmquist, Jeffrey G; Jones, Jennifer R; Schmidt-Gengenbach, Jutta; Pierotti, Lyra F; Love, Jason P

    2011-01-01T23:59:59.000Z

    invertebrates (Diptera and Hemiptera) relative to otherall more abundant in flow, and Hemiptera and mosquitos wereOrthoptera Plecoptera Hemiptera Mordellidae Neuroptera

  16. Aquatic Vertebrate Assemblages in the Middle Trinity River Basin, with Emphasis on Turtles

    E-Print Network [OSTI]

    Riedle, Jimmy

    2014-05-03T23:59:59.000Z

    between the two study sites, turtle species richness decreased, whereas habitat overlap between species increased. I analyzed the capture efficiency of 7 trap types used throughout the course of this project and found that effectiveness of each trap type...

  17. Ecology of the predator assemblage affecting nest success of passerines in Sierra Nevada, California

    E-Print Network [OSTI]

    Cocimano, Maria C.

    2010-07-14T23:59:59.000Z

    were surveyed since 1997 (15 from 1997 to 2006, plus 6 added in 2003). My study areas were located in montane meadows in central Sierra Nevada, California, USA, including El Dorado, Placer, Nevada, and Sierra counties. The area presents a... the line intercept method (Bonham 1989), using a pole (200 cm tall ? 1.25 cm diameter). I took measurements every 3 meters, including vegetation type, as each species of plant that touched the pole (willow, other shrub species, grass/forbs, aspen, alder...

  18. Changes in species assemblages and diets of Collembola along a gradient of metal pollution

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    coenological trends along a gradient of metal pollution, downwind of a zinc smelter located in the North. The total zinc content of the topsoil varied from 4000 to 35 000 mg/kg according to distance to the smelter (mainly caused by death or stunting of planted trees in the vicinity of the smelter) explained most

  19. The diversity and abundance of North American bird assemblages fail to track changing productivity

    E-Print Network [OSTI]

    Dobson, LL; La Sorte, FA; Manne, LL; Hawkins, BA

    2015-01-01T23:59:59.000Z

    species richness and energy availability in the Northand K. J. Gaston. 2005. Species– energy relationships at theA. H. 2004. Species–energy relationships and habitat

  20. Fish assemblage structure along environmental gradients in a coastal plain drainage: influences from a reservoir

    E-Print Network [OSTI]

    Herbert, Matthew Earl

    1999-01-01T23:59:59.000Z

    ). Discharge was calculated for each stream reach every 4-7 weeks when streams were at baseflow conditions and unaffected by transitory runoff fiom storm events (Gordon et al 1992). Baseflow sampling conditions were determined by examining hydrographic... 16. 1 5, 5 10. 3 29. 5 3. 1 4. 6 3, 4 5. 1 10. 4 54 5. 5 50, 0 11. 1 5. 6 5. 6 55. 7 22. 8 2, 8 11. 8 60. 6 7. 5 5. 4 2. 2 32, 6 100, 9 3. 0 20. 0 59. 6 2, 4 8. 8 2. 7 14. 5 6. 1 -6. 9 2-14 &0. 1-0. 1 5. 9-6. 7 4...

  1. Convergence of temperate and tropical stream fish assemblages Carla Ibaez1,2

    E-Print Network [OSTI]

    Boyer, Edmond

    , France 2 Instituto de Ecología - UMSA, Unidad de limnología, Casilla: 10077, La Paz, Bolivia 3 Cemagref sites. This divergence can be linked to differences in energy availability between temperate

  2. End-2-End Evaluation of IP Multimedia Services, a User Perceived Quality of Service Approach

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    NON-INTRUSIVE SUBJECTIVE METHODS OBJECTIVE METHODS INTRUSIVE PARAMETER BASED SEQUENCE BASED SEQUENCE

  3. Real-time processing of a long perimeter fiber optic intrusion system

    E-Print Network [OSTI]

    Snider, William Timothy

    2009-09-30T23:59:59.000Z

    with the traditional OTDR, making it orders of magnitude more sensitive to perturbations along the fiber [4, 6, 7]. The block diagram for the ?-OTDR can be seen in Fig. 2. 5 Fig. 2. Block diagram for ?-OTDR. EDFA=erbium doped fiber amplifier, BPF...

  4. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    E-Print Network [OSTI]

    Tierney, Brian L

    2008-01-01T23:59:59.000Z

    Mai, M. , Paxson, V. , Sommer, R. : Dynamic Application-24) (1999) 2435–2463 3. Sommer, R. , Paxson, V. : ExploitingA. , Paxson, V. , Sommer, R. : Operational Experiences with

  5. Intrusion of radioactive industrially polluted water from North Sea into central Baltic Sea

    SciTech Connect (OSTI)

    Vakulovskiy, S.M.; Nikitin, A.I.

    1985-02-01T23:59:59.000Z

    The problem of penetration of radioactive industrially polluted water into the central Baltic Sea was studied. The content of Cs-134 as determined in water near the bottom of deep water trenches along the path traveled by North Sea water entering the Baltic. Samples were taken at 5 locations, with Cs-134 concentrated from samples of several thousands of liters. It was found that radioactive pollution caused by the entry of water from the North Sea extends through the system of deep water depressions into the Baltic as far as the Gotland trench. The greatest degree of contamination is found in the Arkona depression adjacent to the straits. The concentration of Cs-134 in the Gdansk trench is one-half as great and in the Gotland trench one-third as great as in the Arkona depression. Radioactive contamination in the Baltic is attributed to discharge of radioactive wastes by plants at Windscale.

  6. Modelling of Seawater Intrusion in Coastal Area of North Goa C. P. Kumar*

    E-Print Network [OSTI]

    Kumar, C.P.

    ) Introduction India has been blessed with a vast stretch of coastline. Many urban centres of the country. National Water Policy ­ 2002 also stresses that "Over exploitation of ground water should be avoided river and Nerul creek (around 74 km2 ) and covered by Survey of India toposheets number 48E/10, 48E/14

  7. Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems

    E-Print Network [OSTI]

    Parvania, Masood; Koutsandria, Georgia; Muthukumar, Vishak; Peisert, Sean; McParland, Chuck; Scaglione, Anna

    2014-01-01T23:59:59.000Z

    Security protocols against cyber attacks in the distributioncyber security weak- ness and system fragility of power distribution

  8. An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    University of California, Santa Barbara {vigna,sumitg,kavitha,ebelding,kemm}@cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy the stream of audit data to identify evidence of the occurrence of the modeled attacks. Misuse and anomaly

  9. An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks

    E-Print Network [OSTI]

    Belding-Royer, Elizabeth M.

    University of California, Santa Barbara vigna,sumitg,kavitha,ebelding,kemm¡ @cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy "signatures") that are matched against the stream of audit data to identify evidence of the oc- currence

  10. active non-intrusive inspection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    considerations for eating, drinking, and sleeping in space. learn about the microgravity environment of the station and how it affects every-day activities including play...

  11. doi:10.1038/nature04507 Uplift, Thermal Unrest, and Magma Intrusion at

    E-Print Network [OSTI]

    of the caldera floor connecting the two resurgent domes (Sour Creek, SC and Mallard Lake, ML, in Fig. 1) changed-sealed and leaking hydrothermal fluid reservoir that traps volatiles exsolved from a crystallizing rhyolitic magma7

  12. Recent Approaches to Non-intrusive Load Monitoring Techniques in Residential Settings

    E-Print Network [OSTI]

    Sekercioglu, Y. Ahmet

    settings to manage peak consumption periods [5]. This issue, called "Demand Response" (DR), is one to a home is required. Fluctuations in the aggregate power consumption signals are used to mathematically of electricity demand while giving incentives to consumers in the form of reduced pricing. However, load shedding

  13. Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks

    DOE Patents [OSTI]

    Goranson, Craig A.; Burnette, John R.; Greitzer, Frank L.; McMillan, Bryan H.

    2013-10-15T23:59:59.000Z

    A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data stream is interrogated to determine the presence of predetermined characteristics associated with at least one of the portions of data within the data stream. At least one of the portions of data is then characterized, based upon the portion of data exhibiting a predetermined combination of characteristics, wherein the predetermined combination of characteristics is related to the sensitivity of the portion of data. The portions of the data stream are then distributed into a plurality of different channels, each of the channels associated with different level of sensitivity.

  14. Agent-Based Distributed Intrusion Alert System Arjita Ghosh and Sandip Sen

    E-Print Network [OSTI]

    Sen, Sandip

    , we discuss our proactive agent-based early warning system that uses coordinated surveillance threat detection: We want our system to be an early warning system that, in addition to its ability in addition to other functionalities of an IDS: (a) early warning when pre-attack activities are detected, (b

  15. Study of Kinematics of Extreme Waves Impacting Offshore and Coastal Structures by Non Intrusive Measurement Techniques

    E-Print Network [OSTI]

    Song, Youn Kyung

    2013-11-07T23:59:59.000Z

    Extreme wave flows associated with a large scale wave breaking during interactions with marine structures or complex coastal geography of is one of the major concerns in a design of coastal and ocean structures. In order to properly understand...

  16. Electric load information system based on non-intrusive power monitoring

    E-Print Network [OSTI]

    Lee, Kwangduk Douglas, 1970-

    2003-01-01T23:59:59.000Z

    Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

  17. Intrusive Projection Methods with Upwinding for Uncertain Nonlinear Hyperbolic Systems6

    E-Print Network [OSTI]

    . Tryoen), olm@limsi.fr (O. Le Ma^itre), michael.ndjinga@cea.fr (M. Ndjinga), ern@cermics.enpc.fr (A. Ern

  18. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions

    E-Print Network [OSTI]

    Lee, Wenke

    , Rahul A. Nimbalkar 1 , Kam K. Yee 1 , Sunil B. Patil 1 , Pragneshkumar H. Desai 1 , Thuan T. Tran 1

  19. Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    facilities such as water distribution infrastructures, electricity generation plants and oil refineries need industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs industry and government, leading to several efforts to increase secu- rity in these industrial networks

  20. ccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores

    E-Print Network [OSTI]

    Boyer, Edmond

    Laboratoire de Physique de la Mati`ere Condens´ee et Nanostructures, Universit´e Claude Bernard, 6 rue Amp to the storage or dissipation of mechanical energy, has begun to develop [3]. This ap- plication is based as defined by IUPAC, and the energetic characteristics of devices based on this process are directly related

  1. Using the non-intrusive load monitor for shipboard supervisory control

    E-Print Network [OSTI]

    Bennett, Patrick Lawrence

    2007-01-01T23:59:59.000Z

    Field studies have demonstrated that it is possible to evaluate the state of many shipboard systems by analyzing the power drawn by electromechanical actuators [1], [2], [3], [4], [5]. One device that can perform such an ...

  2. An experimental investigation of the sensitivity of a buried fiber optic intrusion sensor

    E-Print Network [OSTI]

    Kuppuswamy, Harini

    2006-04-12T23:59:59.000Z

    laser emitting single longitudinal mode light and exhibiting low frequency drift are passed through one end of the buried fiber. The backscattered light emerging from the same fiber end was monitored using a photodetector. The phase changes produced...

  3. Buoyancy and stratification in Boussinesq flow with applications to natural ventilation and intrusive gravity currents

    E-Print Network [OSTI]

    Flynn, Morris R.

    2006-01-01T23:59:59.000Z

    between the interior and exterior spaces, we assume q s 0exterior openings and the upper interconnecting opening ‘t’ to optimize the depth of each space

  4. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    SciTech Connect (OSTI)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01T23:59:59.000Z

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  5. A survey of intrusion detection in wireless network applications Robert Mitchell, Ing-Ray Chen

    E-Print Network [OSTI]

    Chen, Ing-Ray

    tool that can defend against the real-world cyber attacks threatening critical systems. These attacks include the Stuxnet attack on Iranian engineering facilities [1,2], proof of concept attacks on insulin pumps [3] and cardiac devices [4], the DoS attack on a German power grid opera- tor [5

  6. SMIT: Uma Arquitetura Tolerante a Intrus~oes Baseada em Virtualizac~ao

    E-Print Network [OSTI]

    Correia, Miguel

    . Sistemas financeiros, de controle de gerac¸~ao e distribuic¸~ao de energia, de controle de dispositivos a necessidade de, no m´inimo, 3f + 1 r´eplicas para tolerar faltas bizantinas [Lamport et al. 1982

  7. Non-intrusive vibration monitoring in US Naval and US Coast Guard ships

    E-Print Network [OSTI]

    Gerhard, Katherine Leigh

    2013-01-01T23:59:59.000Z

    In 2011, the Laboratory for Electromagnetic and Electronic Systems proposed a new type of vibration monitoring system, entitled vibration assessment monitoring point with integrated recovery of energy or VAMPRIE, in their ...

  8. A retrot current sensor for non-intrusive power monitoring at the circuit breaker

    E-Print Network [OSTI]

    Vickery, Daniel Robert

    2011-01-01T23:59:59.000Z

    This thesis presents a new sensor for power monitoring that measures current flow in a circuit breaker without permanent modification of the breaker panel or the circuit breaker itself. At the breaker panel, an inductive ...

  9. Buoyancy and stratification in Boussinesq flow with applications to natural ventilation and intrusive gravity currents

    E-Print Network [OSTI]

    Flynn, Morris R.

    2006-01-01T23:59:59.000Z

    by combined wind and thermal forces. Building Environ. , 36:by buoyancy forces assisted by wind. J. Fluid Mech. , 426:wind forcing, internal heat gains) to provide the motive force

  10. Initial Experiences with occampi Simulations of Blood Clotting on the Minimum Intrusion Grid

    E-Print Network [OSTI]

    Kent, University of

    automatically across a set of processing nodes. Index Terms---grid, simulation, occam­pi, blood­clot, nanite I Nanite Assemblers) [6]. Current models contain tens of thousands of concur­ rent processes; however, we properties of systems containing millions of interacting agents --- nanites or biological organelles (such

  11. Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems

    E-Print Network [OSTI]

    Cho, Sung-Bae

    and Elman neural network. [6] compares frequency, data mining, and HMM. Results in [5] and [6] show that exploiting temporal sequence information of events leads to better performance and hidden Markov model (HMM. Forrest at New Mexico University for modeling and evaluating invisible events based on system calls. HMM

  12. A comprehensive system for non-intrusive load monitoring and diagnostics

    E-Print Network [OSTI]

    Paris, James, Ph. D. Massachusetts Institute of Technology

    2013-01-01T23:59:59.000Z

    Energy monitoring and smart grid applications have rapidly developed into a multi-billion dollar market. The continued growth and utility of monitoring technologies is predicated upon the ability to economically extract ...

  13. Development of real time non-intrusive load monitor for shipboard fluid systems

    E-Print Network [OSTI]

    Branch, Perry L. (Perry Lamar)

    2008-01-01T23:59:59.000Z

    Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

  14. Research papers Natural intrusions of hypoxic, low pH water into nearshore marine

    E-Print Network [OSTI]

    Denny, Mark

    ecosystems Upwelling a b s t r a c t A decade-long time series recorded in Central California demonstrates-frequency internal waves pushing deep, upwelled water into nearshore habitats. We found no relationship between arose at the onset of the spring upwelling season, and fluctuations were strongly semidiurnal

  15. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    , College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power with a real-world power plant simulator. The experiment results show that SRID can detect various false data] worm spread across Iran nuclear infrastructure and occupied the headline of news and media, we

  16. Assessment of Seawater Intrusion Potential From Sea-level Rise in Coastal Aquifers of California

    E-Print Network [OSTI]

    Loáiciga, Hugo A; Pingel, Thomas J; Garcia, Elizabeth S

    2009-01-01T23:59:59.000Z

    basin of the Salinas Valley Groundwater Basin (No. 3-4.08,of the large Salinas Valley Groundwater Basin of Monterey

  17. An Outcrop Example of Large-scale Conglomeratic Intrusions Sourced from

    E-Print Network [OSTI]

    .g., Murchison, 1827; Diller, 1889; Newsom, 1903). A recent resurgence in the analysis and interpretation-Nygaard, 2001) and drill-core data sets (e.g., Dixon et al., 1995; Hillier and Cosgrove, 2002; Purvis et al

  18. Comparison of Two Intrusion Detection Schemes for Sparsely Connected Ad Hoc Networks M. Chuah, P. Yang

    E-Print Network [OSTI]

    Chuah, Mooi-Choo "Mooi"

    ] uses a variant of Telsa [8] to provide source authentication for DSR. All the above approaches suggest

  19. Oxygen isotopic disequilibrium in plagioclasecorundumhercynite xenoliths from the Voisey's Bay Intrusion, Labrador, Canada

    E-Print Network [OSTI]

    Oxygen isotopic disequilibrium in plagioclase­corundum­hercynite xenoliths from the Voisey's Bay to skeletal. Ion microprobe analyses indicate that oxygen isotopic equilibrium was neither established during corundum is characterized by 18 O values between 2.5 and 7.6. Oxygen isotopic equilibration with mantle

  20. Evaluating impacts of CO2 gas intrusion into a confined sandstone aquifer: Experimental results

    SciTech Connect (OSTI)

    Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

    2014-12-31T23:59:59.000Z

    Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnership Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

  1. An experimental investigation of the sensitivity of a buried fiber optic intrusion sensor 

    E-Print Network [OSTI]

    Kuppuswamy, Harini

    2006-04-12T23:59:59.000Z

    A distributed fiber optic sensor with the ability of detecting and locating intruders on foot and vehicles over long perimeters (>10 km) was studied. The response of the sensor to people walking over or near it and to vehicles driving nearby...

  2. A retrofit 60 Hz current sensor for non-intrusive power monitoring at the circuit breaker

    E-Print Network [OSTI]

    Clifford, Zachary

    We present a new sensor for power monitoring that measures current flow in a circuit breaker without permanent modification of the breaker panel or the circuit breaker itself. The sensor consists of three parts: an inductive ...

  3. Non-intrusive beam power monitor for high power pulsed or continuous wave lasers

    DOE Patents [OSTI]

    Hawsey, Robert A. (Oak Ridge, TN); Scudiere, Matthew B. (Oak Ridge, TN)

    1993-01-01T23:59:59.000Z

    A system and method for monitoring the output of a laser is provided in which the output of a photodiode disposed in the cavity of the laser is used to provide a correlated indication of the laser power. The photodiode is disposed out of the laser beam to view the extraneous light generated in the laser cavity whose intensity has been found to be a direct correlation of the laser beam output power level. Further, the system provides means for monitoring the phase of the laser output beam relative to a modulated control signal through the photodiode monitor.

  4. Fault Detection and Diagnostics for Non-Intrusive Monitoring Using Motor Harmonics

    E-Print Network [OSTI]

    Orji, Uzoma A.

    Harmonic analysis of motor current has been used to track the speed of motors for sensorless control. Algorithms exist that track the speed of a motor given a dedicated stator current measurement, for example. Harmonic ...

  5. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems

    E-Print Network [OSTI]

    Chen, Ing-Ray

    within radio range Na b (t) Attacker strength detected at time t in Beta(, ) in Beta(, ) Number of ranging operations per node per TIDS Et Energy for transmission per node Er Energy for reception per node Ea Energy for analyzing data per node Es Energy for sensing per node Eo Initial system energy TIDS

  6. Thermal Constraints on the Emplacement Rate of a Large Intrusive Complex: The Manaslu Leucogranite, Nepal

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , Nepal Himalaya. C. ANNEN1*, B. SCAILLET2 AND R. S. J. SPARKS3 1 SECTION DES SCIENCES DE LA TERRE The emplacement of the Manaslu leucogranite body (Nepal, Himalaya) has been modelled as the accretion

  7. Buoyancy and stratification in Boussinesq flow with applications to natural ventilation and intrusive gravity currents

    E-Print Network [OSTI]

    Flynn, Morris R.

    2006-01-01T23:59:59.000Z

    Hybrid buildings combine passive summer-time cooling by natural venti- lation with active winter-time heating by conventional HVAC systems.

  8. Appears in 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005)

    E-Print Network [OSTI]

    and computing re- sources, worms provide potential vehicles for DDoS at- tacks, as seen in the case of So. A recent analyti- cal study also showed that when deployed at appropriate points in the network, rate of the various schemes. Our study is based on real traffic traces collected from the border of a network

  9. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy|Service

  10. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability

  11. Reconstructing the Assemblage of Iron Artifacts from the Late Hellenistic Shipwreck at K?z?lburun, Turkey

    E-Print Network [OSTI]

    Rash, Kimberly 1981-

    2012-11-27T23:59:59.000Z

    Artifacts found within the context of a shipwreck offer valuable insight into specific events surrounding a vessel’s journey and also have broader implications regarding the time period of the ship’s sinking. A collection of iron objects, excavated...

  12. Isolation and Characterization of Mobile Genetic Elements from Microbial Assemblages Obtained from the Field Research Center Site

    SciTech Connect (OSTI)

    Patricia Sobecky; Cassie Hodges; Kerri Lafferty; Mike Humphreys; Melanie Raimondo; Kristin Tuttle; Tamar Barkay

    2004-03-17T23:59:59.000Z

    Considerable knowledge has been gained from the intensive study of a relatively limited group of bacterial plasmids. Recent efforts have begun to focus on the characterization of, at the molecular level, plasmid populations and associated mobile genetic elements (e.g., transposons, integrons) occurring in a wider range of aquatic and terrestrial habitats. Surprisingly, however, little information is available regarding the incidence and distribution of mobile genetic elements extant in contaminated subsurface environments. Such studies will provide greater knowledge on the ecology of plasmids and their contributions to the genetic plasticity (and adaptation) of naturally occurring subsurface microbial communities. We requested soil cores from the DOE NABIR Field Research Center (FRC) located on the Oak Ridge Reservation. The cores, received in February 2003, were sampled from four areas on the Oak Ridge Site: Area 1, Area 2, Area 3 (representing contaminated subsurface locales) and the background reference sites. The average core length (24 in) was subdivided into three profiles and soil pH and moisture content were determined. Uranium concentration was also determined in bulk samples. Replicate aliquots were fixed for total cell counts and for bacterial isolation. Four different isolation media were used to culture aerobic and facultative microbes from these four study areas. Colony forming units ranged from a minimum of 100 per gram soil to a maximum of 10,000 irrespective of media composition used. The vast majority of cultured subsurface isolates were gram-positive isolates and plasmid characterization was conducted per methods routinely used in the Sobecky laboratory. The percentage of plasmid incidence ranged from 10% to 60% of all isolates tested. This frequency appears to be somewhat higher than the incidence of plasmids we have observed in other habitats and we are increasing the number of isolates screened to confirm this observation. We are also characterizing the plasmid populations at the molecular level. Isolates cultured from the background control site exhibited the lowest occurrence of plasmids (10%). Aliquots of samples were also used in enrichment assays to isolate metal resistant subsurface isolates. Samples were subjected to three different metals (chromium, mercury and cadmium) at two different concentrations and incubated following a conditioning period in which samples were amended with a carbon, nitrogen and phosphorus source. Isolates were plated on metal selection, purified to single isolates and plasmid content determined.

  13. Phytoplankton and bacterial assemblages in ballast water of U.S. military ships as a function of port of origin,

    E-Print Network [OSTI]

    . At least one of four pathogenic eubacteria (Listeria monocytogenes, Escherichia coli, www, Baltimore, MD 21201, USA e Florida State University Coastal and Marine Laboratory, St. Teresa, FL 32358, USA, Stoneville, MS 38776, USA g Center for Marine Science, University of North Carolina at Wilmington, Wilmington

  14. 1 NORDREGIO NEWS PUBLICATION ISSUE 1, FEBRUARY 2014 Cities are complex assemblages of people, houses, roads, bridges,

    E-Print Network [OSTI]

    Guillas, Serge

    of Neighbourhoods: Experience from DGNB New Urban Districts in Denmark, Jesper Ole Jensen, discusses the Danish Certifica- tion of Neighbourhoods: Experience from DGNB New Urban Districts in Denmark By Jesper Ole Jensen ............................................ 7 Urban Planning and Big Data ­ Taking LUTi Models to the Next Level? By Joan Serras, Melanie

  15. Fish Assemblage and Food Web Structure in Whedos (Shallow Floodplain Habitats) of the Oueme River, West Africa

    E-Print Network [OSTI]

    Jackson, Andrew

    2012-10-19T23:59:59.000Z

    In the Oueme River, a lowland river in Benin, Africa, artificial ponds constructed in the floodplain (whedos) are colonized during the high-water period by a presumably random sample of fishes from the river channel. As water slowly recedes from...

  16. Comparison of benthic macroinvertebrate assemblages associated with salt marshes in low and high salinity areas of Galveston Bay

    E-Print Network [OSTI]

    Pool, Suzan Samantha

    1999-01-01T23:59:59.000Z

    Two study areas in Galveston Bay, Texas were chosen to assess the species composition and abundance of benthic macroinvertebrates in salt marshes that are utilized by juvenile brown shrimp. The objectives of the study were to compare the benthic...

  17. An assemblage of fragments : history, revolutionary aesthetics and global capitalism in Vietnamese/American literature, films and visual culture

    E-Print Network [OSTI]

    Võ, Ch'o'ng-?ài H?òng

    2009-01-01T23:59:59.000Z

    York: Phaidon Press, 2008. Heng, Russell H. Of the State,Press and Media in Vietnam. Heng, R. H. Of the State, ForTransforming Society. Russell H. Heng, Of the State, For the

  18. Assessing the Oceanographic Conditions and Distribution of Reef Fish Assemblages Throughout the Galápagos Islands Using Underwater Visual Survey Methods

    E-Print Network [OSTI]

    Durkacz, Stephanie

    2014-12-12T23:59:59.000Z

    in the GMR. From Edgar et al. (2004a). ................. 35  Figure 11. Average SST around Galápagos in Summer 2013.. ....................................... 37  Figure 12. Average SST anomalies around Galápagos in Summer 2013 ........................ 38.... 2007). The Galápagos Islands are the only tropical archipelago that is found on the intersection of several warm- and cool-water ocean currents (Edgar et al. 2004a). The Figure 1. Major oceanographic currents around the Galápagos Islands...

  19. An assemblage of fragments : history, revolutionary aesthetics and global capitalism in Vietnamese/American literature, films and visual culture

    E-Print Network [OSTI]

    Võ, Ch'o'ng-?ài H?òng

    2009-01-01T23:59:59.000Z

    as long as the Cinematography Department’s Censorship Bureaudrama. The Vietnamese Cinematography Department’s Censorshipof epic-style cinematography and complexly choreographed and

  20. Does Long-term Grazing by Pack Stock in Subalpine Wet Meadows Result in Lasting Effects on Arthropod Assemblages?

    E-Print Network [OSTI]

    Holmquist, Jeffrey G; Schmidt-Gengenbach, Jutta; Haultain, Sylvia A

    2010-01-01T23:59:59.000Z

    richness (29), followed by Hemiptera (12), Hymenoptera (12),dominated by Diptera and Hemiptera at the order level (Tableorder differed. Only Diptera and Hemiptera were found in all

  1. Character of the diatom assemblage spanning a depositional transition in the Eastern Equatorial Pacific Ocean at 6.6 Ma

    E-Print Network [OSTI]

    Brookshire, Brian Neville, Jr.

    2005-02-17T23:59:59.000Z

    of Panama, and the associated oceanographic adjustment that occurred during Neogene. Particularly, the interruption of flow between the Pacific and Atlantic Oceans effected equatorial flow and water mass characteristics, and the locus of deep... of the Caribbean Plate about 8 Ma 12. The final closure of the Isthmus of Panama estimated from records of land mammal migration, isotopic shifts, and changes in biogenic sedimentation rates 4,5,13,14, commenced about 11 Ma and terminated between 3.5 and 4.5 Ma...

  2. Character of the diatom assemblage spanning a depositional transition in the Eastern Equatorial Pacific Ocean at 6.6 Ma 

    E-Print Network [OSTI]

    Brookshire, Brian Neville, Jr.

    2005-02-17T23:59:59.000Z

    Approximately 6.6 million years ago in the Eastern Equatorial Pacific a large increase in biogenic mass accumulation rates (MAR?s) occurred. This increased level of biogenic mass accumulation persisted until about 4.4 Ma ...

  3. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    Coulomb criteria and evaluated using the appropriate (i.e. dry or immersed) repose and wall friction

  4. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    Coulomb criteria and evaluated using the appropriate (i.e. dry or immersed) repose and wall friction

  5. Patterns of fish assemblage structure and dynamics in waters of the Savannah River Plant. Comprehensive Cooling Water Study final report

    SciTech Connect (OSTI)

    Aho, J.M.; Anderson, C.S.; Floyd, K.B.; Negus, M.T.; Meador, M.R.

    1986-06-01T23:59:59.000Z

    Research conducted as part of the Comprehensive Cooling Water Study (CCWS) has elucidated many factors that are important to fish population and community dynamics in a variety of habitats on the Savannah River Plant (SRP). Information gained from these studies is useful in predicting fish responses to SRP operations. The overall objective of the CCWS was (1) to determine the environmental effects of SRP cooling water withdrawals and discharges and (2) to determine the significance of the cooling water impacts on the environment. The purpose of this study was to: (1) examine the effects of thermal plumes on anadromous and resident fishes, including overwintering effects, in the SRP swamp and associated tributary streams; (2) assess fish spawning and locate nursery grounds on the SRP; (3) examine the level of use of the SRP by spawning fish from the Savannah River, this objective was shared with the Savannah River Laboratory, E.I. du Pont de Nemours and Company; and (4) determine impacts of cooling-water discharges on fish population and community attributes. Five studies were designed to address the above topics. The specific objectives and a summary of the findings of each study are presented.

  6. Distribution and diversity of ostracode assemblages from the Hamlin Shale and the Americus Limestone (Permian, Wolfcampian) in northeastern Kansas

    E-Print Network [OSTI]

    Peterson, R. M.; Kaesler, R. L.

    1980-07-11T23:59:59.000Z

    Shale have been recognized: lagoonal, carbonate mudflat, intertidal shoal and beach, and non- marine. Four lithofacies are recognized in the Americus Limestone: tidal mudflat, lagoonal, carbonate shoal, and basinal. The uppermost Hamlin Shale... bassleri, and Carbonita in- flata; 3) lagoons and tidal mudflats of the Hamlin Shale, characterized by Parapar- chites humerosus; 4) lagoons of the Americus Limestone, also characterized by Paraparchites humerosus and by Bairdia beedei; 5) mixed quiet...

  7. Evaluating Flake Assemblage and Stone Tool Distributions at a Large Western Stemmed Tradition Site Near Yucca Mountain, Nevada

    E-Print Network [OSTI]

    Haynes, Gregory M

    1996-01-01T23:59:59.000Z

    community above 1,200 m. (Beatley 1976). Temperatures fluc-in Anthrofwlogy No. 4. Beatley, Janice 1976 Vascular Plants

  8. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    high societal impacts (Beatley et al. 2002). Slope failuresof Civil Engineers, New York Beatley T, Brower D, Schwab A (

  9. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    high societal impacts (Beatley et al. 2002). Slope failuresof Civil Engineers, New York Beatley T, Brower D, Schwab A (

  10. Preservation of exceptional vertebrate assemblages in Middle Permian fluviolacustrine mudstones of Kotel'nich, Russia: stratigraphy, sedimentology,

    E-Print Network [OSTI]

    Benton, Michael

    of Kotel'nich, Russia: stratigraphy, sedimentology, and taphonomy Michael J. Benton a, , Andrew J. Newell b

  11. Experimentation on Prisoners: Persistent Dilemmas in Rights and Regulations

    E-Print Network [OSTI]

    Reiter, Keramet A

    2009-01-01T23:59:59.000Z

    narrow categories of non-intrusive, low-risk, individuallytesting, or completely non-intrusive testing such as “studies that are non-intrusive and present absolutely no

  12. Real-time Vehicle Reidentification System for Freeway Performance Measurements

    E-Print Network [OSTI]

    Jeng, Shin-Ting

    2007-01-01T23:59:59.000Z

    system are considered “non-intrusive detection systems”detection systems, non-intrusive detection systems areproblem. Among the non- intrusive detection systems ILDs,

  13. Audio visual information fusion for human activity analysis

    E-Print Network [OSTI]

    Thagadur Shivappa, Shankar

    2010-01-01T23:59:59.000Z

    been focussed on developing non- intrusive sensors such asof committing to non-intrusive and natural interfaces, thewhich contradicts the non-intrusive nature of Three speakers

  14. Understanding biogeobatteries: Where geophysics meets microbiology

    E-Print Network [OSTI]

    Revil, A.

    2010-01-01T23:59:59.000Z

    J. Castermant (2007), Non-intrusive determination of theoil offers a promising non-intrusive method of detection forenvironments and a non-intrusive or minimally invasive way

  15. A Nation Under Joint Custody: How Conflicting Family Models Divide US Politics

    E-Print Network [OSTI]

    Wehling, Eva Elisabeth

    2013-01-01T23:59:59.000Z

    keyed; Subcomponent: Non-intrusive parenting) 7. Siblingskeyed; Sub- component: Non-intrusive governing) 7. Americansexample, open guidance, non-intrusive parenting, and bonds

  16. Strategies for Successful Implementation of Virtual Weigh and Compliance Systems in California

    E-Print Network [OSTI]

    Regan, Amelia

    2006-01-01T23:59:59.000Z

    two types, intrusive and non-intrusive (Mimbela and Klein,On the other hand, non-intrusive sensors are mounted

  17. Making the Most of Thin Data: A Hardware-Software Approach

    E-Print Network [OSTI]

    Martin, Paul Daniel

    2013-01-01T23:59:59.000Z

    system for enabling non-intrusive water flow detection.designed to enable non-intrusive water flow monitoring.and dis- advantages. Non-intrusive disaggregation approaches

  18. Hierarchical Modeling for Population-Based Heat Exchanger Design

    E-Print Network [OSTI]

    Geb, David

    2013-01-01T23:59:59.000Z

    Catton, I. , 2001, "NON-INTRUSIVE HEAT TRANSFER COEFFICIENTCatton, I. , 2010, "Non- Intrusive Heat Transfer Coefficientthis section, the non-intrusive induction heating transient

  19. Impact of Energy Disaggregation on Consumer Behavior

    E-Print Network [OSTI]

    Chakravarty, Prateek; Gupta, Abahy

    2013-01-01T23:59:59.000Z

    Nagasaka, K. , 2006. Non-intrusive electric appliances loadenergy management with its non-intrusive and cost effectiveis based on a non-intrusive pattern recognition technique.

  20. Design and Optimization of Monitoring and Feedback Systems in Wireless Health

    E-Print Network [OSTI]

    Rofouei, Mahsan

    2012-01-01T23:59:59.000Z

    wearable contexts as a non- intrusive monitoring system instructure which allows non-intrusive measurement. Walkingin wearable contexts as a non-intrusive monitoring system in

  1. Soot formation in high pressure laminar diffusion flames Ahmet E. Karatas *, mer L. Glder

    E-Print Network [OSTI]

    Gülder, Ömer L.

    , both intrusive and non- intrusive, most commonly used in soot experiments including the laser induced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 824 2.2. Non-intrusive techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 823 2.1. Intrusive techniques

  2. Automatic Performance Visualization of Distributed Real-time systems

    E-Print Network [OSTI]

    Harmon, Trevor; Klefstad, Raymond

    2006-01-01T23:59:59.000Z

    execution deadlines. • Non-intrusive monitoring—The currentknown as Real-time Non-Intrusive (RTNI) monitoring. This

  3. Low-cost Appliance State Sensing for Energy Disaggregation

    E-Print Network [OSTI]

    Wu, Tianji

    2012-01-01T23:59:59.000Z

    and Steven B. Leeb. “Non-intrusive electrical load monitor-in recent years, namely non-intrusive appliance load

  4. Consistency-based System Security Techniques

    E-Print Network [OSTI]

    Wei, Sheng

    2013-01-01T23:59:59.000Z

    level characterization using non-intrusive delay and powerthe study with a non-intrusive gate-level characterization

  5. Support Services Division Refer to end of document for revisions August 2007.1

    E-Print Network [OSTI]

    of non-intrusive and intrusive type survey work that may be required, as part of a feasibility study

  6. An Autoethnography of a First-Time School District Superintendent: Experiences in Governance, Fiscal Stress, and Community Relations

    E-Print Network [OSTI]

    Rose, III, Stanley

    2011-01-01T23:59:59.000Z

    such processes must be non-intrusive, longitudinal, andsuch processes must be non-intrusive, longitudinal, and

  7. Intrusion Tolerance 18 PublishedbytheieeeComPutersoCiety1540-7993/08/$25.002008ieeeieeeseCurity&PrivaCy

    E-Print Network [OSTI]

    Neves, Nuno

    - structures such as power, water, gas, oil, and trans- portation. Therefore, the threat is no longer against of security, essentially by obscurity. However, critical infrastructure companies are now using stan- dard protocols are normally encapsulated on top of UdP- TCP/IP. The common defense, "the hackers don't know our

  8. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 4th Keystroke Biometric Intrusion Detection

    E-Print Network [OSTI]

    Tappert, Charles

    user has entered a specific set of data. Keylogging collects specific data about the input and method

  9. Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development

    E-Print Network [OSTI]

    Balakrishnan, Vikram

    2013-01-01T23:59:59.000Z

    in and notifies the smart meter, via wireless connection orcosts. Back to our smart meters, it is easy to see howdevelopment. Modern smart meters already incorporate FPGAs

  10. Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis

    E-Print Network [OSTI]

    Luo, Dong, 1966-

    2001-01-01T23:59:59.000Z

    Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

  11. The origin and evolution of granites: an in-situ study of zircons from Scottish Caledonian intrusions 

    E-Print Network [OSTI]

    Appleby, Sarah Kristina

    2008-01-01T23:59:59.000Z

    Granitic magmatism in collision belts is widely regarded as a major mechanism for generating continental crust. This hypothesis can be tested by identifying the source rocks of granitic magmas, and in particular the ...

  12. Parental responses of hispid cotton rats (Sigmodon hispidus) to intrusion by red imported fire ants (Solenopsis invicta) into simulated nests

    E-Print Network [OSTI]

    Ferris, Kathleen Patricia

    1994-01-01T23:59:59.000Z

    on Native Invert brates. Fire ants prey upon a number of invertebrates, including boll weevils (Anthonomus grandis) (Sterling, 1978), sugarcane borers (Eldana ~h' ) (Ada acta(. , 1981), dpeca ee 1 (C 4i ddhacl (D tchet d Sheppard, 1981). In addition, fire... by unearthing a mound and placing it into a talcum coated bucket for transport to the laboratory. The colonies were housed later in a fluon-coated (Teflon) pan consisting of several 105 mm petri dishes to house the queens and her brood. In order to maintain...

  13. Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development

    E-Print Network [OSTI]

    Balakrishnan, Vikram

    2013-01-01T23:59:59.000Z

    for the LED Lamp. . . . . . . . . . . . . 6.13 Predictionfor the LED Lamp. . . . . . . . . . . . . Prediction tableappliances, including a) LED lamp, b) incandescent lamp, c)

  14. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2012 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; McDonald, Benjamin S.; Robinson, Sean M.; Gilbert, Andrew J.; White, Timothy A.; Pitts, W. Karl; Misner, Alex C.; Seifert, Allen

    2012-11-01T23:59:59.000Z

    Progress in the second year of this project is described by the series of technical reports and manuscripts that make up the content of this report. These documents summarize successes in our goals to develop our robust image-hash templating and material-discrimination techniques and apply them to test image data.

  15. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01T23:59:59.000Z

    J.M, 1977, Seismic stratigraphic interpretation of clasticvia integrated interpretation of seismic, magnetic andand Interpretations .. 2.4.1 Seismic

  16. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01T23:59:59.000Z

    via integrated interpretation of seismic, magnetic andInterpretations .. 2.4.1 Seismic2.4 RESULTS AND INTERPRETATIONS 2.4.1 Seismic Stratigraphy

  17. Non-Intrusive Load Identification for Smart Outlets Sean Barker, Mohamed Musthag, David Irwin, and Prashant Shenoy

    E-Print Network [OSTI]

    Shenoy, Prashant

    broad sectors of energy consumption--industry and transportation [1]. As a result, even small@ecs.umass.edu Abstract--An increasing interest in energy-efficiency com- bined with the decreasing cost of embedded, and then manually update the outlets meta-data in software whenever a new device is plugged into the outlet. Correct

  18. Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development

    E-Print Network [OSTI]

    Balakrishnan, Vikram

    2013-01-01T23:59:59.000Z

    PowCap with PLC: Lookingti] “Power Line Communication (PLC) Solutions. ” http://overview.page? DCMP=plc&HQS=plc. [Tsu99] K. Tsuda. “Subspace

  19. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01T23:59:59.000Z

    and Glascock, M.D. , 2002, Petrology of Alarcon Rise lavas,and Glascock, M.D. , 2002, Petrology of Alarcon Rise lavas,Batiza, R. , 1978, Geology, petrology and geochemistry of

  20. KIGLAPAIT BIBLIOGRAPHY 13 October 2011 1969 The Kiglapait Layered Intrusion, Labrador. Geol. Soc. Amer. Memoir 112, 204 pp.

    E-Print Network [OSTI]

    Bradley, Raymond S.

    of the anorthositic Nain Complex, Labrador. J. Petrology 18, 399-430. (First ever pressure estimates for anorthosites Petrology 64, 32-52. 5. 1979a Kiglapait geochemistry I: Systematics, sampling, and density. J. Petrology 20. 1979b Kiglapait geochemistry II: Petrography. J. Petrology 20, 591-624. 7. 1979c Huntington, H. D

  1. Parental magma of the Skaergaard intrusion: constraints from melt inclusions in primitive troctolite blocks and FG-1 dykes

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Developments in petrology 15. Elsevier, Amsterdam McBirneyin East Greenland, Part III. The petrology of the Skaergaard441–477 Hoover JD (1989b) Petrology of the marginal border

  2. WHAT A PROACTIVE RECOMMENDATION SYSTEM NEEDS: Relevance, Non-Intrusiveness, and a New Long-Term Memory

    E-Print Network [OSTI]

    Bogers, Toine

    and documents based on text being written or read. Watson (Budzik and Hammond, 1999) is another PRS (or IMA

  3. Boiling heat transfer in a vertical microchannel: Local estimation during flow boiling with a non intrusive method

    E-Print Network [OSTI]

    Boiling heat transfer in a vertical microchannel: Local estimation during flow boiling with a non the results of experimental and numerical studies concerning boiling heat transfer inside vertical in minichannels for several gravity levels (µg, 1g, 2g). To fully understand the high heat transfer potential

  4. Parental magma of the Skaergaard intrusion: constraints from melt inclusions in primitive troctolite blocks and FG-1 dykes

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Contrib Mineral Petrol (2010) 159:61–79 DOI 10.1007/s00410-SiO 2 content Contrib Mineral Petrol (2010) 159:61–79 Fig. 9to the Contrib Mineral Petrol (2010) 159:61–79 Fig. 10 a

  5. CYBER THREAT ANALYSIS A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK INTRUSION DETECTION)

    E-Print Network [OSTI]

    Kumar, Vipin

    60000 90 91 92 93 94 95 96 97 98 99 00 01 Today computers control power, oil and gas deliveryCYBER THREAT ANALYSIS ­ A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK-of-systems technologies will enable decisive maneuver, both horizon- tal and vertical, during day and night, and in all

  6. Non-Intrusive Experiemental Investigation of Multi-Scale Flow Behavior in Rod Bundle with Spacer-Grids

    E-Print Network [OSTI]

    Dominguez Ontiveros, Elvis Efren

    2011-08-08T23:59:59.000Z

    Experiments investigating complex flows in rod bundles with spacer grids that have mixing devices (such as flow mixing vanes) have mostly been performed using single-point measurements. Although these measurements allow local comparisons...

  7. Field Demonstration of a Real-time Non-intrusive Monitoring System for Condition-based Maintenance

    E-Print Network [OSTI]

    Proper, Ethan

    2009-01-01T23:59:59.000Z

    The performance of important electrical loads on mission critical systems like warships or off-shore platforms is often tracked by dedicated monitoring equipment. Individual monitoring of each load is expensive and risky. ...

  8. Integrating intrusive and nonintrusive characterization methods to achieve a conceptual site model for the SLDA FUSRAP site - 8265.

    SciTech Connect (OSTI)

    Durham, L. A.; Peterson, J. M.; Frothingham, D. G.; Frederick, W. T.; Lenart, W.; Environmental Science Division; U. S. Army Corps of Engineers, Pittsburg District; U. S. Army Corps of Engineers, Buffalo District

    2008-01-01T23:59:59.000Z

    The US Army Corps of Engineers (USACE) is addressing radiological contamination following Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) requirements at the Shallow Land Disposal Area (SLDA) site, which is a radiologically contaminated property that is part of the Formerly utilized Sites Remedial Action Program (FUSRAP). The SLDA is an 18-hectare (44-acre) site in Parks township, Armstrong County, Pennsylvania, about 37 kilometers (23 miles) east-northeast of Pittsburgh. According to historical record, radioactive wastes were disposed of at the SLDA in a series of trenches by the Nuclear Materials and Equipment Company (NUMEC) in the 1960s. The wastes originated from the nearby Apollo nuclear fuel fabrication facility, which began operations under NUMEC in the late 1950s and fabricated enriched uranium into naval reactor fuel elements. It is believed that the waste materials were buried in a series of pits constructed adjacent to one another in accordance with an Atomic Energy Commission (AEC) regulation that has since been rescinded. A CERCLA remedial investigation/feasibility study (RI/FS) process was completed for the SLDA site, and the results of the human health risk assessment indicated that the radiologically contaminated wastes could pose a risk to human health in the future. There are no historical records that provide the exact location of these pits. However, based on geophysical survey results conducted in the 1980s, these pits were defined by geophysical anomalies and were depicted on historical site drawings as trenches. At the SLDA site, a combination of investigative methods and tools was used in the RI/FS and site characterization activities. The SLDA site provides an excellent example of how historical documents and data, historical aerial photo analysis, physical sampling, and nonintrusive geophysical and gamma walkover surveys were used in combination to reduce the uncertainty in the location of the trenches. The data and information from these sources were used to refine the conceptual site model, complete the RI/FS, and support the ongoing remedial design and action, which will achieve site closure acceptable to all stakeholders.

  9. Role of intrusion-induced salt mobility in controlling the formation of the enigmatic `Silverpit Crater', UK Southern North Sea

    E-Print Network [OSTI]

    Triassic, Bunter Shale Formation seals. The prospective, gas-prone Bunter Sandstone Formation reservoirs@staffmail.ed.ac.uk) ABSTRACT: Seismic interpretation of well-calibrated, overlapping, high-fidelity, 3D seismic data volumes the interpretation of 3D seismic data in 2002, controversy has surrounded the genesis of the `Silverpit Crater' (SC

  10. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01T23:59:59.000Z

    Bouma, A.H. , 1962, Sedimentology of some flysch deposits: aGulf of California: sedimentology, mass physical properties

  11. Marine air intrusion into the Adelie Land sector of East Antarctica: A study using the regional climate model (MAR)

    E-Print Network [OSTI]

    Gallée, Hubert

    , and often, precipitation in the coastal regions. Extratropical cyclones also advect cloud cover ahead of them as they track eastward. The presence of clouds greatly effects the reflected radiation of the atmosphere. In summer their main impact is to decrease the short wave radiation coming to Earth, while

  12. Single-cell genomics reveal metabolic strategies for microbial growth and survival in an oligotrophic aquifer

    SciTech Connect (OSTI)

    Wilkins, Michael J.; Kennedy, David W.; Castelle, Cindy; Field, Erin; Stepanauskas, Ramunas; Fredrickson, Jim K.; Konopka, Allan

    2014-02-01T23:59:59.000Z

    Bacteria from the genus Pedobacter are a major component of microbial assemblages at Hanford Site and have been shown to significantly change in abundance in response to the subsurface intrusion of Columbia River water. Here we employed single cell genomics techniques to shed light on the physiological niche of these microorganisms. Analysis of four Pedobacter single amplified genomes (SAGs) from Hanford Site sediments revealed a chemoheterotrophic lifestyle, with the potential to exist under both aerobic and microaerophilic conditions via expression of both aa3­?type and cbb3-type cytochrome c oxidases. These SAGs encoded a wide-range of both intra-and extra­-cellular carbohydrate-active enzymes, potentially enabling the degradation of recalcitrant substrates such as xylan and chitin, and the utilization of more labile sugars such as mannose and fucose. Coupled to these enzymes, a diversity of transporters and sugar-binding molecules were involved in the uptake of carbon from the extracellular local environment. The SAGs were enriched in TonB-dependent receptors (TBDRs), which play a key role in uptake of substrates resulting from degradation of recalcitrant carbon. CRISPR-Cas mechanisms for resisting viral infections were identified in all SAGs. These data demonstrate the potential mechanisms utilized for persistence by heterotrophic microorganisms in a carbon-limited aquifer, and hint at potential linkages between observed Pedobacter abundance shifts within the 300 Area subsurface and biogeochemical shifts associated with Columbia River water intrusion.

  13. Blackbox Stencil Interpolation Method For Model Reduction

    E-Print Network [OSTI]

    Peraire, Jaime

    ... ... ... c1 c2 c3 high dimensions three dimensions {c1, c2, c3} 1111111111111111511111111111 #12;Non-Intrusive & Intrusive Non-Intrusive ROM [3] Simulator: Blackbox Surrogate Map inputs to {c1, c2, · · · } Intrusive ROM;Challenges Non-Intrusive ROM Blackbox: potentially worse accuracy Curse of dimensionality in inputs Intrusive

  14. The artifact assemblage from the Pepper Wreck: an early seventeenth century Portuguese East-Indiaman that wrecked in the Tagus River

    E-Print Network [OSTI]

    Brigadier, Sara R

    2002-01-01T23:59:59.000Z

    some of the ship's navigational instruments, Asian trade goods such as pepper and porcelain dishes, and personal items. Other materials recovered include everything from modern signage and trash to hundreds of ceramic sherds and balls of lead shot...

  15. NUMERICAL MODELING OF THE DISRUPTION OF COMET D/1993 F2 SHOEMAKER-LEVY 9 REPRESENTING THE PROGENITOR BY A GRAVITATIONALLY BOUND ASSEMBLAGE OF RANDOMLY SHAPED POLYHEDRA

    SciTech Connect (OSTI)

    Movshovitz, Naor; Asphaug, Erik; Korycansky, Donald, E-mail: nmovshov@ucsc.edu [Department of Earth and Planetary Sciences, University of California, Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States)

    2012-11-10T23:59:59.000Z

    We advance the modeling of rubble-pile solid bodies by re-examining the tidal breakup of comet Shoemaker-Levy 9, an event that occurred during a 1.33 R encounter with Jupiter in 1992 July. Tidal disruption of the comet nucleus led to a chain of sub-nuclei {approx}100-1000 m diameter; these went on to collide with the planet two years later. They were intensively studied prior to and during the collisions, making SL9 the best natural benchmark for physical models of small-body disruption. For the first time in the study of this event, we use numerical codes treating rubble piles as collections of polyhedra. This introduces forces of dilatation and friction, and inelastic response. As in our previous studies we conclude that the progenitor must have been a rubble pile, and we obtain approximately the same pre-breakup diameter ({approx}1.5 km) in our best fits to the data. We find that the inclusion of realistic fragment shapes leads to grain locking and dilatancy, so that even in the absence of friction or other dissipation we find that disruption is overall more difficult than in our spheres-based simulations. We constrain the comet's bulk density at {rho}{sub bulk} {approx} 300-400 kg m{sup -3}, half that of our spheres-based predictions and consistent with recent estimates derived from spacecraft observations.

  16. Scripta Fac. Sci. Nat. Univ. Masaryk. Brun., Volume 36, Geology. Brno, 2007. 57 The Early Miocene micromammalian assemblage from Mokr 1/2001 Turtle

    E-Print Network [OSTI]

    Horacek, Ivan

    and in deposits of the main brown coal seam (Merkur-North) or in the limestone quarry and erosive relicts of hot

  17. The observation of the morphology of the fibrous molecular assem-blages and the NiP microtubes was carried out using a Hitachi S-

    E-Print Network [OSTI]

    Sottos, Nancy R.

    ] S. E. Frazier, J. A. Bedford, J. Hower, M. E. Kenney, Inorg. Chem. 1967, 6, 1693. [2] C. R. Martin

  18. Paleomycology of the Princeton Chert II. Dark-septate fungi in the aquatic angiosperm Eorhiza arnoldii indicate a diverse assemblage of root-colonizing fungi during the Eocene

    E-Print Network [OSTI]

    Klymiuk, Ashley A.; Taylor, Thomas N.; Taylor, Edith L.; Krings, Michael

    2013-09-01T23:59:59.000Z

    -8137.2010.03611.x O’Keefe JM, Hower JC, Finkelman RF, Drew JW, Stucker JD. 2011. Petrographic, geochemical and mycological aspects of Miocene coals from the Nova´ky and Handlova´ mining districts, Slovakia. Int J Coal Geol 87:268–281, doi:10.1016/j.coal.2011...

  19. Explorations in additive, associative design : an assemblage of collective use of forms for part of the M.I.T. West Campus

    E-Print Network [OSTI]

    Fung, Vivian

    1985-01-01T23:59:59.000Z

    My thesis is an attempt at synthesizing a series of observations of built and unbuilt environments which exemplify the elusive physical qualities of harmonic diversity - unity with variety. This synthesis will be the basis ...

  20. Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils

    E-Print Network [OSTI]

    Blazewicz, Steven Joseph

    2012-01-01T23:59:59.000Z

    G+C Content and Isotope Enrichment on DNA Density. AppliedG+C Content and Isotope Enrichment on DNA Density. Appliedenrichment in 13 C-CO 2 was from biologically mediated isotope

  1. Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils

    E-Print Network [OSTI]

    Blazewicz, Steven Joseph

    2012-01-01T23:59:59.000Z

    in Gulf of Mexico gas hydrates: comparative analysis of DNA-Sediment from a marine gas hydrate area coupled AOM tothat were also from gas hydrate areas, but lower rates (

  2. The influence of physicochemical factors and wind-induced resuspension on microalgal and zooplankton community assemblages in a shallow coastal embayment, South Bay, TX, USA

    E-Print Network [OSTI]

    Stone, Jennifer Sue

    2006-08-16T23:59:59.000Z

    and October but these maximums were not significantly different from the other months sampled. Microphytobenthic biomass peaked during the summer months, while diatom biomass also peaked in February. Zooplankton abundances peaked in October, while nauplii...

  3. Tuna-Dolphin-Bird Feeding Assemblages in the Galapagos Islands and Their Response to the Physical Characteristics of the Upper Water Column

    E-Print Network [OSTI]

    Johnston, Michelle

    2012-10-19T23:59:59.000Z

    , regardless of season or ENSO index. High salinity, cold water west of Isla Isabela indicated topographic upwelling of the Equatorial Undercurrent. Tropical Surface Waters from the Panama Current were detected north of the Equatorial Front to the east...

  4. Diatom species composition and abundance in water column assemblages from five drill sites in Prydz Bay, Antarctica, Ocean Drilling Program Leg 119: distributional patterns 

    E-Print Network [OSTI]

    Kang, Sung-Ho

    1989-01-01T23:59:59.000Z

    , 1958; Frenguelli and Orlando, 1958; Manguin, 1960; Cassie, 1963, Hargraves, 1968; Hasle, 1969; Fenner e! al. , 1976). Quantitative diatom studies have become numemus, but there are still few available for the Antarctic region. Although phytoplankton... studies have covered extensive areas of the Southern Ocean (Hart, 1942; Boden, 1949; Hasle, 1956, 1969; Marumo, 1957; Kozlova, 1966; Zernova, 1970; Steyaert, 1973a, b, 1974; and Jacques er al. , 1979), while very few are related to inshore waters. Only...

  5. Diatom species composition and abundance in water column assemblages from five drill sites in Prydz Bay, Antarctica, Ocean Drilling Program Leg 119: distributional patterns

    E-Print Network [OSTI]

    Kang, Sung-Ho

    1989-01-01T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . . 25 6. Contour plots of total full diatom abundance (cells 1 I x 104) in the upper 200 m along the transect at the Prydz Bay drill sites, 18 Jan. - 3 Feb. 1988. (A) Temporal distribution, (B) Spatial distribution.... . . . . . . . . . . . . . . . . . . . 27 7, Contourplotsof total empty diatom abundance (cells 1 I x 104) in the upper 200 m along the transect at the Prydz Bay drill sites, 18 Jan. - 3 Feb. 1988. (A) Temporal distribution, (B) Spatial distribution...

  6. Reconstructing the Habitat Mosaic of Australopithecus robustus: Evidence from Quantitative Morphological Analysis of Bovid Teeth

    E-Print Network [OSTI]

    Brophy, Juliet

    2012-02-14T23:59:59.000Z

    . The fossil bovids abundances were compared across the assemblages over time in order to define the environmental mosaic in each assemblage and to determine if environmental heterogeneity existed across the assemblages. The relative abundances of the bovid...

  7. Applying 3D Human Model in a Posture Recognition System

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    - ture : intrusive and non-intrusive techniques. Intrusive techniques usually track body markers to recognise the posture of a person. Non-intrusive techniques observe a person with one or several cameras is not always cooperative. So in this paper, we will focus in non-intrusive techniques to determine human

  8. Journal of Financial Crime --Vol. 6 No. 1 --Computer Crime COMPUTER CRIME

    E-Print Network [OSTI]

    Overill, Richard E.

    intrusive, it may flag non- intrusive anomalous activities and miss non-anom- alous intrusive activities, or tha non-intrusive activity may be flagged due to fortuitous similarity to a known pattern or signatureJournal of Financial Crime -- Vol. 6 No. 1 -- Computer Crime COMPUTER CRIME Intrusion Detection

  9. Wetland plant influence on sediment ecosystem structure and trophic function

    E-Print Network [OSTI]

    Whitcraft, Christine René

    2007-01-01T23:59:59.000Z

    nodosa meadow in the Canary Islands: assemblage structure,nodosa meadow in the Canary Islands: assemblage structure,Griffen et al. Bay (Canary Islands) Lagoon (Mexico)

  10. Wetland Plant Influence on Sediment Ecosystem Structure and Trophic Function

    E-Print Network [OSTI]

    Whitcraft, Christine R.

    2007-01-01T23:59:59.000Z

    nodosa meadow in the Canary Islands: assemblage structure,of polychaete species Bay (Canary Islands) Brito et al. 4nodosa meadow in the Canary Islands: assemblage structure,

  11. Diode laser measurement of H?O, CO?, and temperature in gas turbine exhaust through the application of wavelength modulation spectroscopy

    E-Print Network [OSTI]

    Leon, Marco E.

    2007-01-01T23:59:59.000Z

    an accurate, fast, and non-intrusive solution for speciesan accurate, fast, and non-intrusive solution for speciesuse, because it is fast, non-intrusive, and accurate. It has

  12. An adaptive iterative method for solving stochastic PDEs

    E-Print Network [OSTI]

    Hackbusch, Wolfgang

    and memory compared to many state-of-the-art stochastic intrusive and non-intrusive methods. 1 #12; A new intrusive approach for constructing low-rank solutions to stochastic partial dif- ferential

  13. CAFE : a framework for cell application development

    E-Print Network [OSTI]

    Hammer, Joseph Keith

    2007-01-01T23:59:59.000Z

    no less. Third, CAFE is non-intrusive. One of the originala lightweight, flexible, and non-intrusive framework thatCAFE’s effectiveness and non-intrusive nature in a sizable

  14. AEROSPACE TECHNOLOGY REVIEW FOR LBL WINDOW/PASSIVE SOLAR PROGRAM FINAL REPORT

    E-Print Network [OSTI]

    Viswanathan, R.

    2011-01-01T23:59:59.000Z

    solar energy systeml. Non-intrusive n1easurernent tech-with the flow. Thus non-intrusive techniques are desirable;medical arena for non-intrusive blood flow measurements(50-

  15. Nanograting-based compact VUV spectrometer and beam profiler for in-situ characterization of high-order harmonic generation light sources

    E-Print Network [OSTI]

    Kornilov, Oleg

    2010-01-01T23:59:59.000Z

    is well suited for non-intrusive routine characterization ofbeen reported for a compact, non- intrusive tool for in-situthat allows for fast, non-intrusive in-situ characterization

  16. Assessment of organic compound exposures, thermal comfort parameters, and HVAC system-driven air exchange rates in public school portable classrooms in California

    E-Print Network [OSTI]

    Shendell, Derek Garth

    2010-01-01T23:59:59.000Z

    a non-invasive, non-intrusive, non-disruptive quantitativea non-invasive, non-intrusive, non-disruptive methodology toarrived. This protocol was non-intrusive and non-disruptive.

  17. Stability of Gas-Fluidized Beds

    E-Print Network [OSTI]

    Mandich, Kevin Matthew

    a series of wall-mounted, non-intrusive pressure taps, thethat the taps were non-intrusive Signal Processing Softwaresignal obtained using non-intrusive probes in the wall of

  18. A High-Fidelity Energy Monitoring and Feedback Architecture for Reducing Electrical Consumption in Buildings

    E-Print Network [OSTI]

    Jiang, Xiaofan

    2010-01-01T23:59:59.000Z

    information system based on non-intrusive power monitoring.infer power usage using non-intrusive means such as magneticthe obvious benefit of non-intrusive measurement. However,

  19. Normandy University National Institute of Applied Sciences of Rouen

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    : Intrusive technology with piezo-electric sensors and magnetometers and Non Intrusive technology with a vision camera and a laser scanner. For this research work, a non-intrusive technology, particularly

  20. ER-12-1 completion report

    SciTech Connect (OSTI)

    Russell, C.E.; Gillespie, D.; Cole, J.C.; Drellack, S.L. [and others

    1996-12-01T23:59:59.000Z

    The objective of drillhole ER-12-1 was to determine the hydrogeology of paleozoic carbonate rocks and of the Eleana Formation, a regional aquitard, in an area potentially downgradient from underground nuclear testing conducted in nearby Rainier Mesa. This objective was addressed through the drilling of well ER-12-1 at N886,640.26 E640,538.85 Nevada Central Coordinates. Drilling of the 1094 m (3588 ft) well began on July 19, 1991 and was completed on October 17, 1991. Drilling problems included hole deviation and hole instability that prevented the timely completion of this borehole. Drilling methods used include rotary tri-cone and rotary hammer drilling with conventional and reverse circulation using air/water, air/foam (Davis mix), and bentonite mud. Geologic cuttings and geophysical logs were obtained from the well. The rocks penetrated by the ER-12-1 drillhole are a complex assemblage of Silurian, Devonian, and Mississippian sedimentary rocks that are bounded by numerous faults that show substantial stratigraphic offset. The final 7.3 m (24 ft) of this hole penetrated an unusual intrusive rock of Cretaceous age. The geology of this borehole was substantially different from that expected, with the Tongue Wash Fault encountered at a much shallower depth, paleozoic rocks shuffled out of stratigraphic sequence, and the presence of an altered biotite-rich microporphyritic igneous rock at the bottom of the borehole. Conodont CAI analyses and rock pyrolysis analyses indicate that the carbonate rocks in ER-12-1, as well as the intervening sheets of Eleana siltstone, have been thermally overprinted following movement on the faults that separate them. The probable source of heat for this thermal disturbance is the microporphyritic intrusion encountered at the bottom of the hole, and its age establishes that the major fault activity must have occurred prior to 102.3+0.5 Ma (middle Cretaceous).

  1. Spatial and temporal dynamics of the microbial community in the Hanford unconfined aquifer

    SciTech Connect (OSTI)

    Lin, Xueju; McKinley, James P.; Resch, Charles T.; Kaluzny, Rachael M.; Lauber, C.; Fredrickson, Jim K.; Knight, Robbie C.; Konopka, Allan

    2012-03-29T23:59:59.000Z

    Pyrosequencing analysis of 16S rRNA genes was used to study temporal dynamics of groundwater Bacteria and Archaea over 10 months within 3 well clusters separated by ~30 m and located 250 m from the Columbia River on the Hanford Site, WA. Each cluster contained 3 wells screened at different depths ranging from 10 to 17 m that differed in hydraulic conductivities. Representative samples were selected for analyses of prokaryotic 16S and eukaryotic 18S rRNA gene copy numbers. Temporal changes in community composition occurred in all 9 wells over the 10 month sampling period. However, there were particularly strong effects near the top of the water table when the seasonal rise in the Columbia River caused river water intrusion at the top of the aquifer. The occurrence and disappearance of some microbial assemblages (such as Actinobacteria ACK-M1) were correlated to river water intrusion. This seasonal impact on microbial community structure was greater in the shallow saturated zone than deeper in the aquifer. Spatial and temporal patterns for several 16S rRNA gene operational taxonomic units associated with particular physiological functions (e.g.methane oxidizers and metal reducers) suggests dynamic changes in fluxes of electron donors and acceptors over an annual cycle. In addition, temporal dynamics in eukaryotic 18S rRNA gene copies and the dominance of protozoa in 18S clone libraries suggest that bacterial community dynamics could be affected not only by the physical and chemical environment, but also by top-down biological control.

  2. Using occupancy to reduce energy consumption of buildings

    E-Print Network [OSTI]

    Balaji, Bharathan

    2011-01-01T23:59:59.000Z

    This technique, called Non-Intrusive Load Monitor- ing(NILM)loads in a building is Non- Intrusive Load Monitoring(NILM)[

  3. An experimental study of a vertical tube gas-fluidized bed

    E-Print Network [OSTI]

    Mandich, Kevin Matthew

    2010-01-01T23:59:59.000Z

    G. V. 2000. A novel non-intrusive probe of particle motionBleek, C. M. 2002. Non- intrusive determination of bubble

  4. americium recovery service: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    25 Next Page Last Page Topic Index 1 Asynchronous intrusion recovery for interconnected web services Biology and Medicine Websites Summary: Asynchronous intrusion recovery for...

  5. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    6- HAs 3 Se 6-2 HAsS 2 (aq) AsSe(OH)(HSe) AsS(OH)(HS) Total= 3H 2 AsO 4- + 6HSe - + 7H + AsSe(OH)(SeH) - + 0.5O 2 (g) +

  6. Int. J. Engg, Sc. & Mgmt. / Vol. II / Issue II / Jul-Dec 2012 ISSN: 2231-3273 A HYBRID APPROACH TOWARDS INTRUSION DETECTION

    E-Print Network [OSTI]

    Sanyal, Sugata

    the network or the distributed computing infrastructure from malicious attacks like DDoS attack, key-logging

  7. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    70 (June 2000), 235–238. Hower, J.C. and J. D. Robertson (concentration in the coal (Hower and Robertson, 2003).

  8. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    minerals have not been completely dissolved (a very slow process), the contaminationmineral for Pb. We focus in this sensitivity case only on the potential for Pb contamination;

  9. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    Esdaile, J.D. (1966), The lead oxide-lead sulfate system. J.1958), The structure of lead oxide monohydrate. Vestn.of formation of lead(II) oxide carbonates by scanning

  10. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    Evaluation and mitigation of landfill gas impacts on cadmium325 Landfill Gasgroundwater flow paths. 5.2 Landfill Gas Impacts McGrath et

  11. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    Changes in Response to CO2 Leakage from Deep Geologicalstudy mineral trapping for CO2 disposal in deep arenaceousconstituents as function of P(CO2)? function of P(CO2)? – –

  12. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    the warrior Weld, Black Warrior Basin, Northwestern Alabama.with coals in the Black Warrior Basin of Northwestern

  13. Reducing booster-pump-induced contaminant intrusion in Indian water systems with a self-actuated, back-pressure regulating valve

    E-Print Network [OSTI]

    Taylor, David Donald James

    2014-01-01T23:59:59.000Z

    Intermittently-operated water systems struggle to equitably and effectively distribute clean water to customers. One common customer response to intermittency is to supplement the water system's pressure by using a household, ...

  14. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect (OSTI)

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02T23:59:59.000Z

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  15. Non-intrusive measurement of particle charge: Electrostatic dry coal cleaning. Technical progress report No. 8, April 1, 1993--June 30, 1993

    SciTech Connect (OSTI)

    Not Available

    1993-09-01T23:59:59.000Z

    As we reported in the Technical Progress Report No. 7, there are surges of electric current in the charging loop during triboelectrification of all particles. A high speed data acquisition and analysis system was developed to monitor and record the current pattern. There is no known report on such charge-discharge surges in the literature. The mechanism for it is yet to be understood. The on-line computerized electric current measurement also leads to an observation of charging effects as a function of particle feeding rate. It is shown that feed rate greatly alters particle charge. Such an effect is mostly overlooked by researchers and it could have a important role in process design where the feed rate would be maximized. The initial results for coal and mineral particles demonstrated that the average charge was lower when the feed rate was increased. Further investigation is scheduled to identify potential controlling factors, eg, the solid volume fraction and particle number density could be important process factors. The study of charging velocity and particle size was continued. It was found that particle charge was linearly dependent on the charging velocity for all samples investigated. However, the slope of this linear dependence varied for particles having different diameters. In addition, the charge-velocity relationships were dependent on feeding rates. Hence, the data discussed below include these interrelationships.

  16. Non-intrusive measurement of particle charge: Electrostatic dry coal cleaning. Technical progress report No. 11, January 1, 1994--March 31, 1994

    SciTech Connect (OSTI)

    Not Available

    1994-06-01T23:59:59.000Z

    As has been previously reported, the charge measurement portion of this project has been broadened to include direct measurement techniques which yield an average particle charge per unit mass. These methods, which now include current measurements from the charging loop, an electrolytic collection solution and a Faraday cage have been employed to expand the charge measurement capabilities over those that were originally developed using the PDPA. The effects of gas velocity, humidity and temperature as well as particle size on charge was evaluated for different coals and silica. The charge accumulated on silica particles was linearly dependent on their velocity in the tribocharger for the velocities and mass loadings which were investigated. For coals, a linear increase in charge occurred over a more limited velocity range. Transport gas humidity had a much stronger effect on the charge established on silica particles than on coal particles.

  17. A Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway

    E-Print Network [OSTI]

    Cheng, Harry H.; Shaw, Ben; Palen, Joe; Wang, Zhaoqing; Chen, Bo

    2002-01-01T23:59:59.000Z

    N No interrupt? N Store wiper position Y XdcpIntHandling()output_port_a( 0x3f ); // store wiper position. break; if(port_a( 0x3f ); // store wiper position if (xdcp_cs_buffer =

  18. Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves

    E-Print Network [OSTI]

    Correia, Miguel

    }@lasige.di.fc.ul.pt, {mpc, nuno}@di.fc.ul.pt Abstract Critical infrastructures like the power grid are essen- tially different resilience requirements. 1. Introduction Critical infrastructures (CI) like the power grid are es. At least one tool specifically designed to find vulnerabilities in these infrastructures is known to exist

  19. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    B.L. Phillips, and J.B. Parise (2007), The structure ofD.R. Strongin, and J.B. Parise (2007), Similarities in 2-

  20. GEOPHYSICAL RESEARCH LETTERS, VOL. 27, NO. 23, PAGES 3857-3860, DECEMBER 1, 2000 Climatology of Intrusions into the Tropical Upper

    E-Print Network [OSTI]

    Polvani, Lorenzo M.

    winds, observed over the Pacific and Atlantic Oceans during northern fall to spring, are important westerlies over the Pa- cific and Atlantic Oceans. These "westerly ducts" are im- portant for extratropical]. Because of their penetration deep into the tropics, intru- sion events can potentially have a large impact