Sample records for lengshuiqing intrusive assemblage

  1. A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage...

    Open Energy Info (EERE)

    sulphide-bearing mafic magma from a larger staging chamber. Authors Marian Munteanu, Allan H. Wilson, Yong Yao, Shao-Yong Jiang, Gordon Chunnett, Yaonan Luo, Leonard Mafurutu...

  2. A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) | Open Energy

  3. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01T23:59:59.000Z

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  4. Intrusion detection sensor testing tools

    SciTech Connect (OSTI)

    Hayward, D.R.

    1994-08-01T23:59:59.000Z

    Intrusion detection sensors must be frequently tested to verify that they are operational, and they must be periodically tested to verify that they are functioning at required performance levels. Concerns involving this testing can include: The significant amount of manpower required, inconsistent results due to variability in methods and personnel, exposure of personnel to hazardous environments, and difficulty in obtaining access to the areas containing some of the intrusion sensors. To address these concerns, the Department of Energy directed Sandia National Labs. to develop intrusion detection sensor testing tools. Over the past two years Sandia has developed several sensor testing tool prototypes. This paper describes the evolution of an exterior intrusion detection sensor tester and automatic data logger, and also describes various interior intrusion detection sensor test fixtures that can be remotely activated to simulate an intruder.

  5. Rapid deployment intrusion detection system

    SciTech Connect (OSTI)

    Graham, R.H.

    1997-08-01T23:59:59.000Z

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs.

  6. Gas intrusion into SPR caverns

    SciTech Connect (OSTI)

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

    1995-12-01T23:59:59.000Z

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  7. (Intrusion Path Analysis)

    SciTech Connect (OSTI)

    Hardwick, R D

    1989-01-01T23:59:59.000Z

    The design and implementation of an Intrusion Path Analysis (IPA) function came about as a result of the upgrades to the security systems at the Savannah River Site (SRS), near Aiken, South Carolina. The stated requirements for IPA were broad, leaving opportunity for creative freedom during design and development. The essential elements were that it: be based on alarm and sensor state data; consider insider as well as outsider threats; be flexible and easily enabled or disabled; not be processor intensive; and provide information to the operator in the event the analysis reveals possible path openings. The final design resulted from many and varied conceptual inputs, and will be implemented in selected test areas at SRS. It fulfils the requirements and: allows selective inclusion of sensors in the analysis; permits the formation of concentric rings of protection around assets; permits the defining of the number of rings which must be breached before issuing an alert; evaluates current sensor states as well as a recent, configurable history of sensor states; considers the sensors' physical location, with respect to the concentric rings; and enables changes for maintenance without software recompilation. 3 figs.

  8. acquisition intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Next Page Last Page Topic Index 1 Security Intrusion & Detection Security Intrusion Computer Technologies and Information Sciences Websites Summary: intrusions, log suspicious...

  9. Buried fiber optic intrusion sensor

    E-Print Network [OSTI]

    Maier, Eric William

    2004-09-30T23:59:59.000Z

    to the buried sensor induces a phase shift in light propagating along the fiber which allows for the detection and localization of intrusions. Through the use of an ultra-stable erbium-doped fiber laser and phase sensitive optical time domain reflectometry...

  10. Land Assemblage Tax Credit Program (Missouri)

    Broader source: Energy.gov [DOE]

    The Land Assemblage Tax Credit Programs the redevelopment of blighted areas in Missouri into productive use. Redevelopers must incur acquisition costs for at least 50 acres of 75+ acre parcels,...

  11. The Statistical Upper Mantle Assemblage Anders Meibom*

    E-Print Network [OSTI]

    Anderson, Don L.

    Mantle Assemblage', which forms as the result of long-term plate tectonic recycling of sedimentary-3] and noble gases [4] has led to the notion that the source region for "normal" MORB (N-MORB), referred

  12. Intrusion Detection Techniques in Sensor Aikaterini Mitrokotsa

    E-Print Network [OSTI]

    to the network administrator because communication between the access point and the clients is broadcastPDF PROOF Intrusion Detection Techniques in Sensor Networks Aikaterini Mitrokotsa Department Research has been conducted in wired network Intrusion Detection Systems (IDS) for over 25 years. Although

  13. The geochemical evolution of the Sonju Lake intrusion: assimilation and fractional crystallization in a layered mafic intrusion near Finland, Mn.

    E-Print Network [OSTI]

    Dayton, Ryan N.

    2011-01-01T23:59:59.000Z

    ??The Sonju Lake Intrusion, located within the Beaver Bay Complex near Finland, MN, is the most completely differentiated intrusion related to the Midcontinent Rift System… (more)

  14. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30T23:59:59.000Z

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  15. Advanced technologies for perimeter intrusion detection sensors

    SciTech Connect (OSTI)

    Williams, J.D.

    1995-03-01T23:59:59.000Z

    The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

  16. Automated intrusion recovery for web applications

    E-Print Network [OSTI]

    Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology

    2013-01-01T23:59:59.000Z

    In this dissertation, we develop recovery techniques for web applications and demonstrate that automated recovery from intrusions and user mistakes is practical as well as effective. Web applications play a critical role ...

  17. Intrusion detection in mobile ad hoc networks

    E-Print Network [OSTI]

    Sun, Bo

    2005-08-29T23:59:59.000Z

    Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a cooperative and friendly network environment and do not accommodate security. Therefore, Intrusion Detection Systems (IDSs), serving as the second line...

  18. Autonomous Rule Creation for Intrusion Detection

    SciTech Connect (OSTI)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01T23:59:59.000Z

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  19. A system for distributed intrusion detection

    SciTech Connect (OSTI)

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

    1991-01-01T23:59:59.000Z

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  20. AIDE - Advanced Intrusion Detection Environment

    SciTech Connect (OSTI)

    Smith, Cathy L.

    2013-04-28T23:59:59.000Z

    Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

  1. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect (OSTI)

    Todd Vollmer; Milos Manic

    2009-08-01T23:59:59.000Z

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  2. Numerical investigation of transient hydrothermal processes around intrusions: heat-transfer and fluid-

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Numerical investigation of transient hydrothermal processes around intrusions: heat the intrusion. Keywords: Hydrothermal processes, numerical modelling, magmatic intrusion, permeability- depth around magmatic intrusions have been obtained through coupled hydrothermal numerical modelling that takes

  3. Vapor intrusion modeling : limitations, improvements, and value of information analyses

    E-Print Network [OSTI]

    Friscia, Jessica M. (Jessica Marie)

    2014-01-01T23:59:59.000Z

    Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

  4. Non-intrusive fault detection in reciprocating compressors

    E-Print Network [OSTI]

    Schantz, Christopher James

    2011-01-01T23:59:59.000Z

    This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

  5. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  6. Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    1 Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System Fanglu Guo Tzi normalization. Index Terms Packet (traffic) analysis, stateful firewall, network intrusion detection system intrusion detection system (NIDS). Stateful firewall analyzes packets up to their layer 4 headers while NIDS

  7. MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT

    E-Print Network [OSTI]

    Noel, Steven

    MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

  8. Intrusion Detection via Static Analysis David Wagner

    E-Print Network [OSTI]

    Wagner, David

    Xerox PARC ddean@parc.xerox.com Abstract One of the primary challenges in intrusion detection degree of automation, pro­ tection against a broad class of attacks based on corrupted code. Beginning with Sun's introduction of the Java language and its support of mobile code in 1995, pro­ gramming

  9. Intrusive gravity currents in two-layer

    E-Print Network [OSTI]

    Flynn, Morris R.

    Intrusive gravity currents in two-layer stratified media Morris R. Flynn & Paul F. Linden Dept to as a gravity current · In contrast to waves, gravity currents transport significant mass (e.g. fluid parcels, sediment, insects, etc.) Introduction Gravity currents in the environment www

  10. Asynchronous intrusion recovery for interconnected web services

    E-Print Network [OSTI]

    Sabatini, David M.

    Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, and tracking down and recovering from such an attack re- quires significant manual effort. Web services for such web services. Aire addresses several challenges, such as propagating repair across services when some

  11. antilles assemblage structure: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

  12. assemblage southwestern kerman: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

  13. aquatic insect assemblages: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Assemblages Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance...

  14. assemblages reaction progress: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an assemblage of species....

  15. Distributed fiber optic moisture intrusion sensing system

    DOE Patents [OSTI]

    Weiss, Jonathan D. (Albuquerque, NM)

    2003-06-24T23:59:59.000Z

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  16. Non-intrusive refrigerant charge indicator

    DOE Patents [OSTI]

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22T23:59:59.000Z

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  17. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15T23:59:59.000Z

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  18. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

    1989-08-15T23:59:59.000Z

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  19. Freshwater Flow, Saltwater Intrusion, Paper Mill Effluent, and Fish Assemblage Structure in the Lower Neches River, Texas

    E-Print Network [OSTI]

    Pizano, Rebecca I

    2013-06-11T23:59:59.000Z

    during fall 2011 and summer 2012, after a season of rain. During fall 2011, sites surveyed above the barrier had lower salinity but similarly low dissolved oxygen (DO) levels compared with sites surveyed below the barrier. Salinity levels during fall 2011...

  20. Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California

    E-Print Network [OSTI]

    Kluesner, Jared W.

    2011-01-01T23:59:59.000Z

    magmatic intrusions into unconsolidated hemipelagic mudsas off-axis intrusions into unconsolidated hemipelagic mudsas off-axis intrusions into unconsolidated hemipelagic muds

  1. The architecture of a network level intrusion detection system

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.; Maccabe, A.; Servilla, M. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1990-08-15T23:59:59.000Z

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  2. automated intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CLASS FILES, VOL. 1, NO. 11, NOVEMBER 2002 1 Hi-DRA: Intrusion Detection for Internet Security Computer Technologies and Information Sciences Websites Summary: for Internet...

  3. adaptive intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Adaptive Model Generation for Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: Adaptive Model Generation for...

  4. ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY ASSEMBLAGES

    E-Print Network [OSTI]

    ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY ASSEMBLAGES in Environmental Science and titled "ENDOPHYTIC FUNGAL COMMUNITIES OF BROMUS TECTORUM: MUTUALISMS, COMMUNITY with endophytic fungi. Cheatgrass populations were sampled across North America and endophytes were isolated from

  5. Video Installation Design: Appropriation and Assemblage As Projection Surface Geometry

    E-Print Network [OSTI]

    Weaver, Timothy A.

    2010-07-14T23:59:59.000Z

    This area of research focuses on the use of video projections in the context of fine art. Emphasis is placed on creating a unique video installation work that incorporates assemblage and appropriation as a means to develop multiple complex...

  6. Epifaunal Assemblages on Deep-water Corals in Roatan, Honduras

    E-Print Network [OSTI]

    Lavelle, Katherine

    2012-10-30T23:59:59.000Z

    Deep-water corals provide complex habitat structure for diverse assemblages of invertebrates and fishes. Similar to shallow coral reefs, oyster reefs, and seagrass beds, these complex biogenic structures serve many ecosystem functions: (a) as prey...

  7. Nearshore fish assemblages associated with introduced predatory fishes in lakes

    E-Print Network [OSTI]

    Ricciardi, Anthony

    investigated the relationship between the presence of introduced largebodied predatory fishes (largemouth bass: impact; invasive species; native fishes; pike; largemouth bass; rock bass; smallmouth bass; walleyeNearshore fish assemblages associated with introduced predatory fishes in lakes JUSTIN TRUMPICKASa

  8. E-Print Network 3.0 - austurhorn intrusive complex Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Considering Attack Complexity: Layered Intrusion Tolerance C. Taylor, A.W. Krings, W.S. Harrison, N... , hierarchical approach to intrusion tolerance based on the complexity...

  9. E-Print Network 3.0 - anomaly-based network intrusion Sample...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Technologies and Information Sciences 5 INTRUSION DETECTION IN MOBILE AD HOC NETWORKS Summary: is anomaly-based intrusion detection which profiles the symptoms...

  10. Shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Ramsey, Jack S

    2004-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM ...

  11. Harmonic approaches to non-intrusive load diagnostics

    E-Print Network [OSTI]

    Fuller, Ashley E. (Ashley Eliot)

    2008-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

  12. Intrusion recovery for database-backed web applications

    E-Print Network [OSTI]

    Chandra, Ramesh

    Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes. Warp repairs ...

  13. Minimally intrusive strategies for fault detection and energy monitoring

    E-Print Network [OSTI]

    Cox, Robert Williams, 1979-

    2006-01-01T23:59:59.000Z

    This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

  14. A framework for non-intrusive load monitoring and diagnostics

    E-Print Network [OSTI]

    Paris, James, Ph. D. Massachusetts Institute of Technology

    2006-01-01T23:59:59.000Z

    The widespread use of electrical and electromechanical systems places increasing demands on monitoring and diagnostic techniques. The non-intrusive load monitor (NILM) provides a low-cost, low-maintenance way to perform ...

  15. Improving shipboard applications of non-intrusive load monitoring

    E-Print Network [OSTI]

    Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

  16. Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks

    E-Print Network [OSTI]

    Hassanzadeh, Amin

    2014-05-03T23:59:59.000Z

    The problem of intrusion detection in wireless mesh networks (WMN) is challenging, primarily because of lack of single vantage points where traffic can be analyzed and the limited resources available to participating nodes. Although the problem has...

  17. Bloom Filter Based Intrusion Detection for Smart Grid

    E-Print Network [OSTI]

    Parthasarathy, Saranya

    2012-07-16T23:59:59.000Z

    This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n...

  18. The Stabilisation Potential of Individual and Mixed Assemblages of Natural Bacteria and Microalgae

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Stabilisation Potential of Individual and Mixed Assemblages of Natural Bacteria and Microalgae components (heterotrophic bacteria and autotrophic microalgae) in terms of their individual contribution benthic assemblages (prokaryotic, eukaryotic and mixed cultures) of bacteria and microalgae. Mag

  19. EFFECTS OF EGREGIA MENZIESII POPULATIONS ON ROCKY INTERTIDAL BENTHIC ASSEMBLAGES

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Bancroft Hughes Egregia menziesii is a large and robust perennial kelp that creates a structurally complex or the annual life-histories of some algal species. Similar effects of kelp on benthic assemblages have been observed in temperate waters around the world for intertidal kelp or subtidal kelp that lacks floatation

  20. Fossil evidence for serpentinization fluids fueling chemosynthetic assemblages

    E-Print Network [OSTI]

    Demouchy, Sylvie

    (received for review June 30, 2010) Among the deep-sea hydrothermal vent sites discovered in the past 30 mantle rock serpentinization and the spectacular seafloor carbonate chimneys precipitated from- nite-hosted hydrothermal system currently lacks chemosynthetic assemblages dominated by large animals

  1. Temporal Changes in a Tropical Nekton Assemblage and

    E-Print Network [OSTI]

    Temporal Changes in a Tropical Nekton Assemblage and Performance of a Prawn Selective Gear TING and weights of 39 trials conductedfor a selective prawning gear whose performance in bycatch reduc tionI., 1975; Rob erts, 1978; Allen and Coates, 1990), but is extremely rich in the marine coun terpart

  2. ORIGINAL ARTICLE Diatom assemblages promote ice formation in large

    E-Print Network [OSTI]

    Lee Jr., Richard E.

    ORIGINAL ARTICLE Diatom assemblages promote ice formation in large lakes NA D'souza1,3 , Y evidence for the directed formation of ice by planktonic communities dominated by filamentous diatoms sampled from the ice-covered Laurentian Great Lakes. We hypothesize that ice formation promotes attachment

  3. Threshold Verification Technique for Network Intrusion Detection System

    E-Print Network [OSTI]

    Faizal, M A; Shahrin, S; Robiah, Y; Rahayu, S Siti; Nazrulazhar, B

    2009-01-01T23:59:59.000Z

    Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for I...

  4. Effective Conductivity of Spiral and other Radial Symmetric Assemblages

    E-Print Network [OSTI]

    Andrej Cherkaev; Alexander D. Pruss

    2012-06-20T23:59:59.000Z

    Assemblies of circular inclusions with spiraling laminate structure inside them are studied, such as spirals with inner inclusions, spirals with shells, assemblies of "wheels" - structures from laminates with radially dependent volume fractions, complex axisymmetric three-dimensional micro-geometries called Connected Hubs and Spiky Balls. The described assemblages model structures met in rock mechanics, biology, etc. The classical effective medium theory coupled with hierarchical homogenization is used. It is found that fields in spiral assemblages satisfy a coupled system of two second order differential equations, rather than a single differential equation; a homogeneous external field applied to the assembly is transformed into a rotated homogeneous field inside of the inclusions. The effective conductivity of the two-dimensional Star assembly is equivalent to that of Hashin-Shtrikman coated circles, but the conductivity of analogous three-dimensional Spiky Ball is different from the conductivity of coated sphere geometry.

  5. Detecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson

    E-Print Network [OSTI]

    Hutchinson, Seth

    the design process. With this in mind, researchers have begun to address security issues specific to controlDetecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson to a remote-controlled system (deemed an "intrusion fault" or "intrusion") despite attempts to conceal

  6. Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a

    E-Print Network [OSTI]

    Clement, Prabhakar

    Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a , T. Prabhakar Clement a 22 June 2011 Keywords: Saltwater intrusion Sea-level rise Coastal aquifer Climate change Confined, the adverse intrusion effects induced by sea-level rise. A detailed numerical study using the MODFLOW

  7. IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan

    E-Print Network [OSTI]

    IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan School of Computing to monitor and protect their virtual existence by implementing their own intrusion detection capabilities along with other security technologies within the cloud fabric. Intrusion Detection as a Service (IDSaa

  8. NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System

    E-Print Network [OSTI]

    Ezeife, Christie

    NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System C.I. Ezeife wireless intrusion detection systems, this paper presents a method of applying artificial neural networks mining clas- sification technique to wireless network intrusion detection system. The proposed system

  9. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    Terms-- Bloom filter, intrusion detection, smart grid SCADA IDS. 1. INTRODUCTION Supervisory controlBLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur In this paper, we propose a distributed, light-weight and fast intrusion detection approach suitable

  10. A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1

    E-Print Network [OSTI]

    Lee, Wenke

    A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1 , Wenke Lee2, athomas}@cc.gatech.edu Abstract The current generation of centralized network intrusion detection systems that intrusion detection analysis should be distributed to network node IDS (NNIDS) running in hardware

  11. Visual monitoring environments, such as intrusion detection systems, debugging

    E-Print Network [OSTI]

    Erbacher, Robert F.

    Abstract Visual monitoring environments, such as intrusion detection systems, debugging environments, and feature extraction systems, require that a user familiar with the target domain examine, most in an efficient form. How the users employ the environment and the type and quantity of data will also affect

  12. Energy Efficient Intrusion Detection in Camera Sensor Networks

    E-Print Network [OSTI]

    Guibas, Leonidas J.

    Energy Efficient Intrusion Detection in Camera Sensor Networks Primoz Skraba1 and Leonidas Guibas2 1 Department of Electrical Engineering Stanford University, Stanford, CA 94305 primoz@stanford.edu 2 such paths is intractable, since there is generally an infinite number of potential paths. Using a geometric

  13. UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection

    E-Print Network [OSTI]

    Zhou, Yuanyuan

    targets for terrorists and criminals to break-in. Intrusions can compromise the integrity, confidentiality Slammer Worm in less than seven hours the Internet traffic was overloaded to the point that many private]. Similarly, the ReVirt system [16] can record all actions below the level of the virtual machine, allowing

  14. Fish Assemblages in Reference and Restored Tidal Freshwater Marshes of the San Francisco Estuary

    E-Print Network [OSTI]

    Grimaldo, Lenny; Miller, Robert E.; Peregrin, Chris M.; Hymanson, Zachary

    2012-01-01T23:59:59.000Z

    DM. 1998. Comparison of fish assemblages associated withand season effects on fish abundance data from deep waterfor annual changes in fish populations. Atwater BF, Conard

  15. Contact metamorphism of Precambrian gneiss by the Skaergaard Intrusion

    E-Print Network [OSTI]

    Bufe, N. Aaron; Holness, Marian B.; Humphreys, Madeleine C.S.

    2014-07-01T23:59:59.000Z

    the time-scales controlling magma fractionation, eruptive behaviour, the formation of ore deposits and the thermodynamics of natural mineral assemblages. Cooling rates can be obtained from igneous rocks via the length-scales of mineral exsolution (e... & Bowman, 1994; Ferry, 1996; Mu« ller et al., 2008), determine the extent of crustal assimi- lation, and assess the degree to which the country rock may have supplied water to the magma, with potential ef- fects on the liquid line of descent. The Skaergaard...

  16. Animal intrusion status report for fiscal year 1989

    SciTech Connect (OSTI)

    Landeen, D.S.

    1990-08-01T23:59:59.000Z

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  17. THE INVERTEBRATE ASSEMBLAGE ASSOCIATED WITH THE GIANT KELP, MACROCYSTIS PYRIFERA, AT SANTA CATALINA

    E-Print Network [OSTI]

    THE INVERTEBRATE ASSEMBLAGE ASSOCIATED WITH THE GIANT KELP, MACROCYSTIS PYRIFERA, AT SANTA CATALINA JAMES A. COYER' ABSTRACT The motile invertebrate assemblage associated with the giant kelp. Macrocysti. Subtidal forests of giant kelp have long attracted the interestofbiologists, beginning with Darwin's (1860

  18. ANNUAL VARIABILITY OF REEF-FISH ASSEMBLAGES IN KELP FORESTS OFF SANTABARBARA, CALIFORNIA

    E-Print Network [OSTI]

    ANNUAL VARIABILITY OF REEF-FISH ASSEMBLAGES IN KELP FORESTS OFF SANTABARBARA, CALIFORNIA ALFRED W. EBELING/ RALPH J. LARSON,2 WILLIAM S. ALEVIZON,3 AND RICHARD N. BRAy 4 ABSTRACT Assemblages of kelp-bed fishes that live in and about the kelp canopy or over the reef bottom were censused by movie strips

  19. Fish Assemblages and Substrates in the Middle Wabash River, USA Robert Mueller, Jr.1,2

    E-Print Network [OSTI]

    Pyron, Mark

    Fish Assemblages and Substrates in the Middle Wabash River, USA Robert Mueller, Jr.1,2 and Mark Pyron1 We collected fishes at 28 sites of the middle Wabash River, Indiana, using a boat electrofisher for fish assemblage variation that was explained by variation in water depth and substrate frequency

  20. Stimulation of Alexandrium fundyense growth by bacterial assemblages from the Bay of Fundy

    E-Print Network [OSTI]

    Rooney-Varga, Juliette N.

    on Alexandrium fundyense str. CB301 growth. Methods and Results: Bacterial assemblages were collected from into axenic CB301 cultures. Bacterial assemblages dramatically enhanced CB301 growth. Retrieval and analysis factors that control Alexandrium distributions (e.g. Anderson et al. 1983, 1990a; Rasmussen and Richardson

  1. Long-term history of chemosynthetic molluscan assemblages at Gulf of Mexico hydrocarbons seep sites

    E-Print Network [OSTI]

    Warren, Kenneth Anderson

    1995-01-01T23:59:59.000Z

    , Vesicomya cordata, and Calyptogena ponderosa, harbor sulfur-oxidizing symbionts. Seep assemblages from three sites, GB-386, GB-425, and GC-234, were sampled by piston core, in order to determine the long-term history of these assemblages from their preserved...

  2. E-Print Network 3.0 - anomaly-based intrusion detection Sample...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and future anomaly-based intrusion detection systems. 1... arsenal, and the focus of this work, is the ... Source: Maxion, Roy - School of Computer Science, Carnegie Mellon...

  3. MIDAS, the Mobile Intrusion Detection and Assessment System

    SciTech Connect (OSTI)

    Arlowe, H.D.; Coleman, D.E.; Williams, J.D.

    1990-01-01T23:59:59.000Z

    MIDAS is a semiautomated passive detection and assessment security system that can be quickly deployed to provide wide-area coverage for a mobile military asset. Designed to be mounted on top of an unguyed telescoping mast, its specially packaged set of 32 infrared sensors spin 360 degrees every two seconds. The unit produces a low resolution infrared image by sampling each sensor more than 16,000 times in a single 360-degree rotation. Drawing from image processing techniques, MIDAS detects vehicular and pedestrian intruders and produces an alarm when an intrusion is detected. Multiple intruders are tracked. MIDAS automatically directs either an assessment camera or a FLIR to one of the tracks. The alerted operator assesses the intruder and initiates a response. Once the operator assesses an intruder, the system continues to track it without generating new alarms. Because the system will track multiple targets and because the assessment system is a separate pan and tilt unit, the detection and tracking system cannot be blind-sided while the operator is assessing a diversionary intrusion. 4 figs.

  4. A Game Theoretic Analysis of Intrusion Detection in Access Control Systems

    E-Print Network [OSTI]

    Alpcan, Tansu

    . The security of an access control system is of prime importance and is crucial for a successful operation, decision, and control processes for information security and intrusion detection. Such a mathematicalA Game Theoretic Analysis of Intrusion Detection in Access Control Systems Tansu Alpcan and Tamer

  5. Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu

    E-Print Network [OSTI]

    Ning, Peng

    Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

  6. Porphyry Copper and Other Intrusion-Related Mineralization in Mexico MARK D. BARTON

    E-Print Network [OSTI]

    Barton, Mark D.

    Porphyry Copper and Other Intrusion-Related Mineralization in Mexico MARK D. BARTON JOHN-MARK G Inc., Tucson, Arizona ABSTRACT Intrusion-related copper-bearing ore deposits in Mexico span a wide. These deposits include world-class copper porphyry and skarn deposits as well as a continuum of similar skarn

  7. An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig

    E-Print Network [OSTI]

    Meier, Michael

    mechanisms (e.g. authentication, encryption, or access control) they provide an automatic detection1 An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig Mail:{thh,mm,koenig}@informatik.tu-cottbus.de Abstract: Intrusion detection systems have proved

  8. An evaluation of fiber optic intrusion detection systems in interior applications

    SciTech Connect (OSTI)

    Vigil, J.T.

    1994-03-01T23:59:59.000Z

    This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

  9. A Data Mining Framework for Building Intrusion Detection Models Salvatore J. Stolfo

    E-Print Network [OSTI]

    Yang, Junfeng

    A Data Mining Framework for Building Intrusion Detection Models Wenke Lee Salvatore J. Stolfo Kui W of expert knowledge, changes to IDSs are expensive and slow. In this paper, we describe a data mining, and apply data mining programs to learn rules that accurately capture the behavior of intrusions and normal

  10. A Data Mining Framework for Building Intrusion Detection Models # Salvatore J. Stolfo

    E-Print Network [OSTI]

    Lee, Wenke

    A Data Mining Framework for Building Intrusion Detection Models # Wenke Lee Salvatore J. Stolfo Kui. In this paper, we describe a data mining framework for adaptively building Intrusion Detection (ID) models each network connection or host ses­ sion, and apply data mining programs to learn rules

  11. Relationships of drought and biotic interactions to crayfish assemblage structure in Gulf coastal headwater streams

    E-Print Network [OSTI]

    Healy, Brian Daniel

    2002-01-01T23:59:59.000Z

    . In order to understand abiotic and biotic factors structuring native crayfish assemblages, environmental variables and densities of fishes and crayfishes were quantified simultaneously in 16 East Texas streams during June and October 1999, and February...

  12. Temporal and spatial variability of blenny (Perciformes:Labrisomidae and Blenniidae) assemblages on Texas jetties

    E-Print Network [OSTI]

    Grabowski, Timothy Brian

    2002-01-01T23:59:59.000Z

    habitats at Galveston, Port Aransas, and South Padre Island, Texas, during May 2000 through August 2001; and in Florida, once during December 2001 to characterize assemblage structure. All specimens (n=4555) were identified, enumerated, and measured and a...

  13. Play and tolerance : notions of looseness in social and material assemblages

    E-Print Network [OSTI]

    Voorhees, Jeremy, 1978-

    2004-01-01T23:59:59.000Z

    The material scenario provides the most illustrative of entry points into this collection of evidence embodying the difference between play and tolerance. In a material assemblage, the looseness in a joint (expansion, pin, ...

  14. Spatial and temporal variation in fish assemblage structure at Village Creek

    E-Print Network [OSTI]

    Moriarty, Loren Joan

    1995-01-01T23:59:59.000Z

    Fish assemblages were sampled seasonally at Village Creek, a blackwater tributary of the Neches River in Hardin County, Texas. Forty four fish species were captured at Village Creek from diverse aquatic mesohabitats, (e.g., backwater pools, deep...

  15. SUMMER FISH ASSEMBLAGES IN CHANNELIZED AND UNCHANNELIZED REACHES OF THE SOUTH SULPHUR RIVER, TEXAS

    E-Print Network [OSTI]

    BURGESS, CHRISTINE CONNER

    TWRI TR-257 SUMMER FISH ASSEMBLAGES IN CHANNELIZED AND UNCHANNELIZED REACHES OF THE SOUTH SULPHUR RIVER, TEXAS A Thesis by CHRISTINE CONNER BURGESS Submitted to the Office of Graduate Studies of Texas A&M University... in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE August 2003 Major Subject: Wildlife and Fisheries Sciences Texas Water Resources Institute (TWRI) Technical Report 244 SUMMER FISH ASSEMBLAGES...

  16. Environmental factors influencing fish assemblage structure in a naturally saline river system

    E-Print Network [OSTI]

    Dictson, Nikkoal Jean

    2000-01-01T23:59:59.000Z

    for the degree of MASTER OF SCIENCE May 2000 Major Subject: Wildlife and Fisheries Sciences ENVIRONMENTAL FACTORS INFLUENCING FISH ASSEMBLAGE STRUCTURE IN A NATURALLY SALINE RIVER SYSTEM A Thesis by NIKKOAL JEAN DICTSON Submitted to Texas A&M University... Major Subject: Wildlife and Fisheries Sciences ABSTRACT Environmental Factors Influencing Fish Assemblage Structure in a Naturally Saline River System. (May 2000) Nikkoal Jean Dictson, B. S. , New Mexico State University; Chair of Advisory Committee...

  17. KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    Abstract KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers working in the field of intrusion detection and is the only labeled dataset publicly available. Numerous researchers employed the datasets in KDD 99 intrusion detection datasets

  18. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han

    E-Print Network [OSTI]

    Chuah, Mooi-Choo "Mooi"

    A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J University Bethlehem, PA 18015 Abstract-- Several intrusion detection approaches have been proposed in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM

  19. Network intrusion detector: NID user`s guide V 1.0

    SciTech Connect (OSTI)

    Palasek, R. [ed.

    1994-04-01T23:59:59.000Z

    The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

  20. Evaluation of Non-Intrusive Load Monitoring for shipboard cycling system diagnostics

    E-Print Network [OSTI]

    Mosman, James P. (James Paul)

    2006-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to determine the operating schedule of all of the major loads on an electrical service. Additionally, the NILM can use its ...

  1. Non-intrusive water utility monitoring and free-space load monitoring

    E-Print Network [OSTI]

    Neuman, Sabrina M

    2011-01-01T23:59:59.000Z

    This work presents a non-intrusive, single-point sensing scheme to monitor the water usage for various loads on a water utility pipe network through the vibration of a pipe near the water intake source. Experiments with ...

  2. Interpreting human activity from electrical consumption data through non-intrusive load monitoring

    E-Print Network [OSTI]

    Gillman, Mark Daniel

    2014-01-01T23:59:59.000Z

    Non-intrusive load monitoring (NILM) has three distinct advantages over today's smart meters. First, it offers accountability. Few people know where their kWh's are going. Second, it is a maintenance tool. Signs of wear ...

  3. Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring

    E-Print Network [OSTI]

    McKay, Thomas Duncan

    2006-01-01T23:59:59.000Z

    This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

  4. Diagnostic indicators for shipboard systems using non-intrusive load monitoring

    E-Print Network [OSTI]

    DeNucci, Thomas W

    2005-01-01T23:59:59.000Z

    Field studies have demonstrated that the Non-Intrusive Load monitor (NILM) can provide real-time indication of the condition of electro-mechanical systems on board naval vessels. Results from data collected from engineering ...

  5. Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants

    E-Print Network [OSTI]

    Greene, William C. (William Calvin)

    2005-01-01T23:59:59.000Z

    The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

  6. E-Print Network 3.0 - adaptive intrusion data systems Sample...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for: adaptive intrusion data systems Page: << < 1 2 3 4 5 > >> 1 Noname manuscript No. (will be inserted by the editor) Summary: to obtain audit data, correlate events, and...

  7. Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador

    E-Print Network [OSTI]

    Biggs, Juliet

    Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador J. Biggs,1 of the edifice, or temporary, in which case the magma will be released in a future eruption. Citation: Biggs, J

  8. Assessment of Seawater Intrusion Potential From Sea-level Rise in Coastal Aquifers of California

    E-Print Network [OSTI]

    Loáiciga, Hugo A; Pingel, Thomas J; Garcia, Elizabeth S

    2009-01-01T23:59:59.000Z

    2009). Impact of Sea-Level Rise on Sea Water Intrusion inC. (1997). Global Sea Level Rise: A Redetermination. Surveys2007). Effects of sea-level rise on groundwater flow in a

  9. Effects of droplet size on intrusion of sub-surface oil spills

    E-Print Network [OSTI]

    Chan, Godine Kok Yan

    2013-01-01T23:59:59.000Z

    This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

  10. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    SciTech Connect (OSTI)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01T23:59:59.000Z

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

  11. An ethernet/IP security review with intrusion detection applications

    SciTech Connect (OSTI)

    Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

    2006-07-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  12. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1991-05-15T23:59:59.000Z

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  13. FISH ASSEMBLAGES IN MACROCYSTIS AND NEREOCYSTIS KELP FORESTS OFF CENTRAL CALIFORNIA

    E-Print Network [OSTI]

    FISH ASSEMBLAGES IN MACROCYSTIS AND NEREOCYSTIS KELP FORESTS OFF CENTRAL CALIFORNIA JAMES LEE canopy fonning kelp forests (giant kelp, Macrocystis 'Jl!j1'ifera, and bull kelp, NereolJlJstis luetkeana for substrate and cover within their habitat, such as rock or coral reefs or kelp beds, as well as man

  14. Use of European hare (Lepus europaeus) carcasses by an avian scavenging assemblage in Patagonia

    E-Print Network [OSTI]

    Donázar, José A.

    Use of European hare (Lepus europaeus) carcasses by an avian scavenging assemblage in Patagonia) carcasses by avian scavengers in Argentinean Patagonia. A total of 16 hare carcasses were placed in Africa. Key words: hare carcasses, avian scavengers, Patagonia, Lepus europaeus, raptors INTRODUCTION

  15. Prioritization of fish assemblages with a view to conservation and restoration on a large scale European

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Prioritization of fish assemblages with a view to conservation and restoration on a large scale The hierarchical organization of important sites for the conservation or the restoration of fish communities, we developed a methodology, which is easy to implement in different locations. Based on the fish

  16. Larval fish assemblages and mesoscale oceanographic structure along the Mesoamerican Barrier Reef System

    E-Print Network [OSTI]

    Larval fish assemblages and mesoscale oceanographic structure along the Mesoamerican Barrier Reef Caribbean region, and contains spawning sites for a number of reef fish species. Despite this, little is known of the distribution and transport of pelagic fish larvae in the area, and basic in situ

  17. Small-scale spatial variation of benthic algal assemblages in a peat bog Katerina Cerna n

    E-Print Network [OSTI]

    Small-scale spatial variation of benthic algal assemblages in a peat bog Katerina Cerna´ n test Peat bog a b s t r a c t Spatial patterns on a very small scale (10 cm), and the effect microhabitat types were investigated. Samples were taken in a peat bog along linear transects on a scale of 10

  18. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    SciTech Connect (OSTI)

    Najm, Habib N. [Sandia National Laboratories, Livermore, CA 94551 (United States); Valorani, Mauro [Mechanical and Aerospace Engineering Dept., Sapienza University of Rome, Rome (Italy)

    2014-08-01T23:59:59.000Z

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. The filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

  19. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Patents [OSTI]

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11T23:59:59.000Z

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  20. Effect of permeability on cooling of magmatic intrusion in a goethermal reservoir

    SciTech Connect (OSTI)

    Lau, K.H.

    1980-09-01T23:59:59.000Z

    Transient cooling of magmatic intrusion in a geothermal reservoir due to conduction and convection is studied. The effects of overlying cap rock and different horizontal and vertical permeability of the reservoir are considered. Results are compared to the data from Salton Sea Geothermal Field. It is also observed that multiple layers of convection cells exist when horizontal permeability is much larger than the vertical permeability. The sharp dropoff of surface heat flow observed at Salton Sea Geothermal Field is confirmed by numerical results. Based on these numerical results, it is possible to speculate that the age of the intrusive body is about 8000 to 12,000 years.

  1. 29.01.03. M1.11 Information Resources Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    includes, but is not limited to, all information resources management personnel, owners, and system29.01.03. M1.11 Information Resources ­ Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.11 Information Resources ­ Intrusion Detection Approved July 18, 2005 Revised April 27

  2. Mining in a Dataflow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok

    E-Print Network [OSTI]

    Lee, Wenke

    Mining in a Data­flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

  3. Mining in a Data-flow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok

    E-Print Network [OSTI]

    Yang, Junfeng

    Mining in a Data-flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

  4. Optimal Three-Material Wheel Assemblage of Conducting and Elastic Composites

    E-Print Network [OSTI]

    Andrej Cherkaev

    2011-05-22T23:59:59.000Z

    We describe a new type of three material microstructures which we call wheel assemblages, that correspond to extremal conductivity and extremal bulk modulus for a composite made of two materials and an ideal material. The exact lower bounds for effective conductivity and matching laminates was found in (Cherkaev, 2009) and for anisotropic composites, in (Cherkaev, Zhang, 2011). Here, we show different optimal structures that generalize the classical Hashin-Shtrikman coated spheres (circles). They consist of circular inclusions which contain a solid central circle (hub) and radial spikes in a surrounding annulus, and (for larger volume fractions of the best material) an annulus filled with it. The same wheel assemblages are optimal for the pair of dual problems of minimal conductivity (resistivity) of a composite made from two materials and an ideal conductor (insulator), in the problem of maximal effective bulk modulus of elastic composites made from two linear elastic material and void, and the dual minimum problem.

  5. Efficacy of Low and High Complexity Vegetation Treatments for Reestablishing Terrestrial Arthropod Assemblages during Montane Wetland Restoration

    E-Print Network [OSTI]

    Holmquist, Jeffrey G; Schmidt-Gengenbach, Jutta; Demetry, Athena

    2014-01-01T23:59:59.000Z

    wetland types—than was observed between any restoration treatment andDual treatment was added to enhance restoration of wetlandTreatments for Reestablishing Terrestrial Arthropod Assemblages during Montane Wetland

  6. ccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores

    E-Print Network [OSTI]

    Boyer, Edmond

    isotherms and capillary conden- sation, usually described as a gas-liquid phase transition shiftedccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores B- extrusion cycles of water in hydrophobic mesoporous materials, characterized by independent cylindrical

  7. Comparison of Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty

    E-Print Network [OSTI]

    , Blacksburg, VA 24061 Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods and ability to produce functional representations of stochastic variability. PCE estimates coefficients observed differences. In these computational experiments, performance of PCE and SC is shown to be very

  8. Recent Advances in Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty

    E-Print Network [OSTI]

    -intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods are attractive techniques representations of stochastic variability. PCE estimates coefficients for known orthogonal polynomial basis using probabilistic methods is the polynomial chaos expansion (PCE) approach to UQ. In this work, we

  9. Evaluation of Non-Intrusive Approaches for Wiener-Askey Generalized Polynomial Chaos

    E-Print Network [OSTI]

    University, Stanford, CA 94305 Polynomial chaos expansions (PCE) are an attractive technique for uncertainty for general probabilistic analysis problems. Non-intrusive PCE methods allow the use of simulations as black the polynomial chaos expansion (PCE) approach to UQ. In particular, we focus on generalized polynomial chaos

  10. Real-time processing of a long perimeter fiber optic intrusion system

    E-Print Network [OSTI]

    Snider, William Timothy

    2009-09-30T23:59:59.000Z

    This thesis reports on recent advances made in real-time intruder detection for an intrusion system developed at Texas A&M University that utilizes a phase-sensitive optical time-domain reflectometer. The system uses light pulses from a highly...

  11. NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA

    E-Print Network [OSTI]

    Hart, Gus

    NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA by Michael Takeshi Nakata A thesis DIAGNOSTIC FOR A NON-NEUTRAL PLASMA M. Takeshi Nakata Department of Physics and Astronomy Master of Science A simple, non-destructive diagnostic for the temperature of a non-neutral plasma is desirable as plasma

  12. c Copyright by James Patrick Lyons, 2003 A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    c Copyright by James Patrick Lyons, 2003 #12;A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT SYSTEM DESIGN BY JAMES PATRICK LYONS B.S., University of Pennsylvania, 2000 THESIS Submitted in partial and Family iii #12;Acknowledgments In writing this thesis many people have provided me with invaluable

  13. A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures

    E-Print Network [OSTI]

    Sanders, William H.

    -security Risk Management Process (RMP) tailored to smart grids [2]. In this paper we leverage information from1 A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures] and apply them to the specific case of AMI networks in which asset owners are evaluating the use of an IDS

  14. Dynamical and chemical characteristics of tropospheric intrusions observed during START08

    E-Print Network [OSTI]

    Pan, Laura

    . Homeyer,1 Kenneth P. Bowman,1 Laura L. Pan,2 Elliot L. Atlas,3 RuShan Gao,4 and Teresa L. Campos2 Received that the intruding air masses can be traced back to the tropical upper troposphere and lower stratosphere. In situ of the observed intrusions through use of a simple box model and trace species with different photochemical

  15. A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks

    E-Print Network [OSTI]

    Stavrakakis, Ioannis

    A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering Algorithm and energy of nodes in the cluster formation in order to improve detection accuracy and re- duce energy

  16. Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems

    E-Print Network [OSTI]

    Peisert, Sean

    ) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way, distribution au- tomation, network security, intrusion detection systems. I. INTRODUCTION A. Scope and Goals their development with that of an appropriate cyber security frame- work that would prevent attackers from gaining

  17. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule

    E-Print Network [OSTI]

    Chen, Ing-Ray

    . Intrusion detection systems (IDSs) are security appliances that review audit data to identify cyber attacks is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness

  18. Supporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision History

    E-Print Network [OSTI]

    Robillard, Martin

    -XXXXX-XX-X/XX/XX ...$5.00. Eclipse Platform Revision Collector History Exporter Graphical Visualizer Other ToolsSupporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision This paper presents a code-revision history collection and vi- sualization Eclipse plugin for use

  19. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    with a real-world power plant simulator. The experiment results show that SRID can detect various false data, College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power. Advanced false data injection attack in targeted malware intrusion is becoming an emerging severe threat

  20. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect (OSTI)

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01T23:59:59.000Z

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  1. HoBIDS: A Data Mining Approach to Host Based Intrusion Detection

    E-Print Network [OSTI]

    Hershkop, Shlomo

    HoBIDS: A Data Mining Approach to Host Based Intrusion Detection Department of Computer Science of a host based IDS built on a data mining framework. This framework allows the system to detect both known and lightweight sensor system with the capabilities of sophisticated data-mining techniques to build a powerful

  2. Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo

    E-Print Network [OSTI]

    Somayaji, Anil

    Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo Computer Science. The key ideas are to use data mining techniques to discover consistent and useful patterns of system experiments on the sendmail system call data and the network tcpdump data, we demonstrate that we can

  3. Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project

    E-Print Network [OSTI]

    Yang, Junfeng

    Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project Salvatore J. Stolfo by sensing a misuse or a breach of a security policy and alerting operators to an ongoing (or, at least on a weekly basis reporting that malicious users still succeed in attacking systems with sometimes devastating

  4. Compilation of gas intrusion measurements, variations, and consequence modeling for SPR caverns.

    SciTech Connect (OSTI)

    Hinkebein, Thomas E.

    2003-03-01T23:59:59.000Z

    The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H2S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

  5. Phylogenetic beta diversity in bacterial assemblages across ecosystems: deterministic versus stochastic processes

    SciTech Connect (OSTI)

    Wang, Jianjun; Shen, Jianhaua; Wu, Yucheng; Tu, Chen; Soininen , Janne; Stegen, James C.; He, Jizheng; Liu, Xingqi; Zhang, Lu; Zhang, Enlou

    2013-02-28T23:59:59.000Z

    Increasing evidence emerged for non-random spatial distributions for microbes, but the underlying processes resulting in microbial assemblage variation among and within Earth’s ecosystems is still lacking. For instance, some studies showed that the deterministic processes by habitat specialization are important, while other studies hold that bacterial communities are assembled by neutral forces. Here we examine the relative importance of deterministic and stochastic processes for bacterial communities from subsurface environments, as well as stream biofilm, lake water, lake sediment and soil using pyrosequencing of 16S rRNA gene. We show that there is a general pattern in phylogenetic signal in species niches across recent evolutionary time for all studied habitats, enabling us to infer the influences of community assembly processes from patterns of phylogenetic turnover in community composition. The phylogenetic dissimilarities among habitat types were significantly higher than within them, and the communities were clustered according to their original habitat types. For communities within habitat types, the highest phylogenetic turnover rate through space was observed in subsurface environments, followed by stream biofilm on mountainsides, whereas the sediment assemblages across regional scales showed the lowest turnover rate. Quantifying phylogenetic turnover as the deviation from a null expectation suggested that measured environmental variables imposed strong selection on bacterial communities for nearly all sample groups, and for three sample groups, that spatial distance reflects unmeasured environmental variables that impose selection, as opposed to spatial isolation. Such characterization of spatial and environmental variables proved essential for proper interpretation of partial mantel results based on observed beta diversity metrics. In summary, our results clearly indicate a dominant role of deterministic processes on bacterial assemblages and highlight that bacteria show strong habitat associations that have likely emerged through evolutionary adaptation.

  6. Hydrothermal formation of Clay-Carbonate alteration assemblages in the Nili Fossae region of Mars

    E-Print Network [OSTI]

    Brown, Adrian J; Baldridge, Alice M; Crowley, James K; Bridges, Nathan T; Thomson, Bradley J; Marion, Giles M; Filho, Carlos R de Souza; Bishop, Janice L

    2014-01-01T23:59:59.000Z

    The Compact Reconnaissance Imaging Spectrometer for Mars (CRISM) has returned observations of the Nili Fossae region indicating the presence of Mg- carbonate in small (carbonate-bearing units. We applied absorption band mapping techniques to investigate a range of possible phyllosilicate and carbonate minerals that could be present in the Nili Fossae region. We also describe a clay-carbonate hydrothermal alteration mineral assemblage in the Archean Warrawoona Group of Western Australia that is a potential Earth analog to the Nili Fossae carbonate-bearing rock units. We discuss the geological and biological implications for hydrothermal processes on Noachian Mars.

  7. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01T23:59:59.000Z

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  8. Evaluation of geologic materials to limit biological intrusion into low-level radioactive waste disposal sites

    SciTech Connect (OSTI)

    Hakonson, T.E.

    1986-02-01T23:59:59.000Z

    This report describes the results of a three-year research program to evaluate the performance of selected soil and rock trench cap designs in limiting biological intrusion into simulated waste. The report is divided into three sections including a discussion of background material on biological interactions with waste site trench caps, a presentation of experimental data from field studies conducted at several scales, and a final section on the interpretation and limitations of the data including implications for the user.

  9. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application

    DOE Patents [OSTI]

    Piper, T.C.

    1980-09-24T23:59:59.000Z

    An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  10. Compilation of Gas Intrusion Measurements, Variations, and Consequence Modeling for SPR Caverns

    SciTech Connect (OSTI)

    HINKEBEIN, THOMAS E.

    2003-03-01T23:59:59.000Z

    The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H{sub 2}S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

  11. Wave-swept rocky shores support a surprisingly diverse assemblage of organisms that includes members of virtually

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Wave-swept rocky shores support a surprisingly diverse assemblage of organisms that includes members of virtually every animal phylum and both algae and vascular plants. In general, wave that hydrodynamic forces can play an important role in limiting the size of wave-swept plants and animals (Denny et

  12. Amazon River water in the northeastern Caribbean Sea and its effect on larval reef fish assemblages during April 2009

    E-Print Network [OSTI]

    Amazon River water in the northeastern Caribbean Sea and its effect on larval reef fish assemblages.S.A. ABSTRACT During April to June 2009, a large bolus of Amazon River water impacted the northeastern Caribbean Ocean waters to the north, with Caribbean surface waters showing intermediate values. Plankton net tows

  13. Raoul et al. Small mammals and forest management in China 1 Title: Small-mammal assemblage response to deforestation and

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    to deforestation and afforestation in central China. Running title: Small mammals and forest management in China Deforestation is a major environmental issue driving the loss of animal and plant species. Afforestation has of small-mammal assemblages in an area where forest and associated deforestation habitats dominate

  14. Evaluation of the aquatic habitat and fish assemblage in an urban reach of the historic Rideau Canal, Ottawa,

    E-Print Network [OSTI]

    Cooke, Steven J.

    Evaluation of the aquatic habitat and fish assemblage in an urban reach of the historic Rideau communities, particularly in the urban reach in Ottawa between Hartwell's Lock and the outflow of Dows Lake natural and engineered habitat/substrate types across the period when the canal is at navigational water

  15. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01T23:59:59.000Z

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  16. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect (OSTI)

    Chen, Yan [Northwesten University] [Northwesten University

    2013-12-05T23:59:59.000Z

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  17. Update on intrusive characterization of mixed contact-handled transuranic waste at Argonne-West

    SciTech Connect (OSTI)

    Dwight, C.C.; Jensen, B.A.; Bryngelson, C.D.; Duncan, D.S.

    1997-02-03T23:59:59.000Z

    Argonne National Laboratory and Lockheed Martin Idaho Technologies Company have jointly participated in the Department of Energy`s (DOE) Waste Isolation Pilot Plant (WIPP) Transuranic Waste Characterization Program since 1990. Intrusive examinations have been conducted in the Waste Characterization Area, located at Argonne-West in Idaho Falls, Idaho, on over 200 drums of mixed contact-handled transuranic waste. This is double the number of drums characterized since the last update at the 1995 Waste Management Conference. These examinations have provided waste characterization information that supports performance assessment of WIPP and that supports Lockheed`s compliance with the Resource Conservation and Recovery Act. Operating philosophies and corresponding regulatory permits have been broadened to provide greater flexibility and capability for waste characterization, such as the provision for minor treatments like absorption, neutralization, stabilization, and amalgamation. This paper provides an update on Argonne`s intrusive characterization permits, procedures, results, and lessons learned. Other DOE sites that must deal with mixed contact-handled transuranic waste have initiated detailed planning for characterization of their own waste. The information presented herein could aid these other storage and generator sites in further development of their characterization efforts.

  18. Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars

    SciTech Connect (OSTI)

    Villa, Andrea; Mussi, Valerio [Laboratorio MUSP-via Turotti 9, 29122 Piacenza (Italy); Strano, Matteo [Politecnico di Milano-Dipartimento di Meccanica, via La Masa 1, 20156, Milan (Italy)

    2011-05-04T23:59:59.000Z

    The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

  19. Lafont, M. and Vivier, A. (2006). Oligochaete assemblages in the hyporheic zone and coarse surface sediments: their importance for understanding of ecological

    E-Print Network [OSTI]

    Boyer, Edmond

    sediments: their importance for understanding of ecological functioning of watercourses. Hydrobiologia. 564 assemblages in the hyporheic zone and coarse surface sediments: their importance for understanding Laboratory, 3 bis Quai Koch, 67000 Strasbourg (France) Keywords: Running waters, coarse sediments, hyporheic

  20. Tuna-Dolphin-Bird Feeding Assemblages in the Galapagos Islands and Their Response to the Physical Characteristics of the Upper Water Column

    E-Print Network [OSTI]

    Johnston, Michelle

    2012-10-19T23:59:59.000Z

    Tuna-dolphin-bird feeding assemblages are unique to the Eastern Tropical Pacific Ocean (ETP). These multiple species groups are believed to forage together in response to the physical properties of the near surface ocean as these constrain...

  1. c 2004 by Fabrice Stevens. All rights reserved. VALIDATION OF AN INTRUSION-TOLERANT INFORMATION SYSTEM USING

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    c 2004 by Fabrice Stevens. All rights reserved. #12;VALIDATION OF AN INTRUSION-TOLERANT INFORMATION of Illinois at Urbana-Champaign, 2004 Urbana, Illinois #12;To my parents iii #12;ACKNOWLEDGMENTS I would like to thank my advisor, Professor William H. Sanders, for giving me the op- portunity to work for him. His

  2. Numerical Model Investigation for Potential Methane Explosion and Benzene Vapor Intrusion Associated with High-Ethanol Blend

    E-Print Network [OSTI]

    Alvarez, Pedro J.

    Associated with High-Ethanol Blend Releases Jie Ma, Hong Luo, George E. DeVaull,§ William G. Rixey, and Pedro ABSTRACT: Ethanol-blended fuel releases usually stimulate methanogenesis in the subsurface, which could conditions exist. Ethanol- derived methane may also increase the vapor intrusion potential of toxic fuel

  3. U-PB ZIRCON AND TITANITE AGES OF LATE-TO POST-TECTONIC INTRUSIONS OF THE CORTLANDT-

    E-Print Network [OSTI]

    Merguerian, Charles

    U-PB ZIRCON AND TITANITE AGES OF LATE-TO POST-TECTONIC INTRUSIONS OF THE CORTLANDT- BEEMERVILLE, and monzonorite of the Cortlandt Complex 446±2Ma. Titanite from the Beemerville nepheline syenite has yielded.D., Aleinikoff, J.N., Amelin, Yuri; Merguerian, Charles; and Panish, P.T., 2012, U-Pb zircon and titanite ages

  4. Using the sequential regression (SER) algorithm for long-term signal processing. [Intrusion detection

    SciTech Connect (OSTI)

    Soldan, D. L.; Ahmed, N.; Stearns, S. D.

    1980-01-01T23:59:59.000Z

    The use of the sequential regression (SER) algorithm (Electron. Lett., 14, 118(1978); 13, 446(1977)) for long-term processing applications is limited by two problems that can occur when an SER predictor has more weights than required to predict the input signal. First, computational difficulties related to updating the autocorrelation matrix inverse could arise, since no unique least-squares solution exists. Second, the predictor strives to remove very low-level components in the input, and hence could implement a gain function that is essentially zero over the entire passband. The predictor would then tend to become a no-pass filter which is undesirable in certain applications, e.g., intrusion detection (SAND--78-1032). Modifications to the SER algorithm that overcome the above problems are presented, which enable its use for long-term signal processing applications. 3 figures.

  5. Non-intrusive Low-Rank Separated Approximation of High-Dimensional Stochastic Models

    E-Print Network [OSTI]

    Alireza Doostan; AbdoulAhad Validi; Gianluca Iaccarino

    2012-10-04T23:59:59.000Z

    This work proposes a sampling-based (non-intrusive) approach within the context of low-rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs.

  6. Verifying the secure setup of Unix client/servers and detection of network intrusion

    SciTech Connect (OSTI)

    Feingold, R.; Bruestle, H.R.; Bartoletti, T.; Saroyan, A.; Fisher, J.

    1995-07-01T23:59:59.000Z

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

  7. Establishment of a facility for intrusive characterization of transuranic waste at the Nevada Test Site

    SciTech Connect (OSTI)

    Foster, B.D.; Musick, R.G.; Pedalino, J.P.; Cowley, J.L. [Bechtel Nevada Corp., Las Vegas, NV (United States); Karney, C.C. [Dept. of Energy, Las Vegas, NV (United States); Kremer, J.L.

    1998-01-01T23:59:59.000Z

    This paper describes design and construction, project management, and testing results associated with the Waste Examination Facility (WEF) recently constructed at the Nevada Test Site (NTS). The WEF and associated systems were designed, procured, and constructed on an extremely tight budget and within a fast track schedule. Part 1 of this paper focuses on design and construction activities, Part 2 discusses project management of WEF design and construction activities, and Part 3 describes the results of the transuranic (TRU) waste examination pilot project conducted at the WEF. In Part 1, the waste examination process is described within the context of Waste Isolation Pilot Plant (WIPP) characterization requirements. Design criteria are described from operational and radiological protection considerations. The WEF engineered systems are described. These systems include isolation barriers using a glove box and secondary containment structure, high efficiency particulate air (HEPA) filtration and ventilation systems, differential pressure monitoring systems, and fire protection systems. In Part 2, the project management techniques used for ensuring that stringent cost/schedule requirements were met are described. The critical attributes of these management systems are described with an emphasis on team work. In Part 3, the results of a pilot project directed at performing intrusive characterization (i.e., examination) of TRU waste at the WEF are described. Project activities included cold and hot operations. Cold operations included operator training, facility systems walk down, and operational procedures validation. Hot operations included working with plutonium contaminated TRU waste and consisted of waste container breaching, waste examination, waste segregation, data collection, and waste repackaging.

  8. iSSH v. Auditd: Intrusion Detection in High Performance Computing

    SciTech Connect (OSTI)

    Karns, David M. [Los Alamos National Laboratory; Protin, Kathryn S. [Los Alamos National Laboratory; Wolf, Justin G. [Los Alamos National Laboratory

    2012-07-30T23:59:59.000Z

    The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks were roughly the same regardless of which tool was running.

  9. Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu)

    E-Print Network [OSTI]

    Dickerson, Julie A.

    Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie on a network. It uses simple data mining techniques to process the network input data and help expose metrics administrator. This paper describes the components in the FIRE architecture and explains their roles. Particular

  10. Resolving discrepancies between hydraulic and chemical calibration data for seawater intrusion groundwater flow models by considering climate-driven sea level change.

    SciTech Connect (OSTI)

    J. Chapman; A. Hassan; K. Pohlmann

    2001-10-18T23:59:59.000Z

    Groundwater models of seawater intrusion environments can be calibrated using both hydraulic and chemical information. The possible impact of the long-term transient process of sea level change is difficult to identify, but important to accurate simulation of present conditions. The response times of the pressure and chemical fields to major fluctuations in sea level change are investigated

  11. Extratropical Dry-Air Intrusions into the West African Monsoon Midtroposphere: An Important Factor for the Convective Activity over the Sahel

    E-Print Network [OSTI]

    Roca, Rémy

    and sec- ond, the entrainment of dry air as the parcel rises that decreases the parcel's buoyancy (MapesExtratropical Dry-Air Intrusions into the West African Monsoon Midtroposphere: An Important Factor during July to August 1992. The approach documents both the moisture content and the origin of the air

  12. Changes in Native Aquatic Vegetation, Associated Fish Assemblages, and Food Habits of Largemouth Bass (Micropterus salmoides) Following the Addition of Triploid Grass Carp to Manage Hydrilla (Hydrilla Verticillata) in Lake Conroe, TX

    E-Print Network [OSTI]

    Ireland, Patrick Alexander

    2011-10-21T23:59:59.000Z

    and condition changes of Centrachid species, largemouth diet changes, and changes in the fish assemblages among randomly selected sampling stations between early fall 2007, when grass carp were stocked, and one year later in early fall of 2008. The areas...

  13. Diatom species composition and abundance in water column assemblages from five drill sites in Prydz Bay, Antarctica, Ocean Drilling Program Leg 119: distributional patterns

    E-Print Network [OSTI]

    Kang, Sung-Ho

    1989-01-01T23:59:59.000Z

    the Maersk Master cruise (ODP Leg 119). A) Site 739, Sta. 1, B) Site 740, St. 8, C)Site 742, St. 11. 104 53. Comparison of mean cell numbers of total empty diatoms between HPMA technique and Utermohl technique 105 54. Comparison of mean cell numbers...DIATOM SPECIES COMPOSITION AND ABUNDANCE IN WATER COLUMN ASSEMBLAGES FROM FIVE DRILL SITES IN PRYDZ BAY, ANTARCTICA, OCEAN DRILLING PROGRAM LEG 119: DISTRIBUTIONAL PATTERNS A Thesis by SUNG-HO KANG Submitted to the Office of Graduate Studies...

  14. Considerations Related To Human Intrusion In The Context Of Disposal Of Radioactive Waste-The IAEA HIDRA Project

    SciTech Connect (OSTI)

    Seitz, Roger; Kumano, Yumiko; Bailey, Lucy; Markley, Chris; Andersson, Eva; Beuth, Thomas

    2014-01-09T23:59:59.000Z

    The principal approaches for management of radioactive waste are commonly termed ‘delay and decay’, ‘concentrate and contain’ and ‘dilute and disperse’. Containing the waste and isolating it from the human environment, by burying it, is considered to increase safety and is generally accepted as the preferred approach for managing radioactive waste. However, this approach results in concentrated sources of radioactive waste contained in one location, which can pose hazards should the facility be disrupted by human action in the future. The International Commission on Radiological Protection (ICRP), International Atomic Energy Agency (IAEA), and Organization for Economic Cooperation and Development/Nuclear Energy Agency (OECD/NEA) agree that some form of inadvertent human intrusion (HI) needs to be considered to address the potential consequences in the case of loss of institutional control and loss of memory of the disposal facility. Requirements are reflected in national regulations governing radioactive waste disposal. However, in practice, these requirements are often different from country to country, which is then reflected in the actual implementation of HI as part of a safety case. The IAEA project on HI in the context of Disposal of RadioActive waste (HIDRA) has been started to identify potential areas for improved consistency in consideration of HI. The expected outcome is to provide recommendations on how to address human actions in the safety case in the future, and how the safety case may be used to demonstrate robustness and optimize siting, design and waste acceptance criteria within the context of a safety case.

  15. MONITORING DE LA CORROSION EN LIGNE DE LA CORROSION EN LIGNE NON INTRUSIF NON-INTRUSIVE ONLINE CORROSION MONITORING

    E-Print Network [OSTI]

    A. Saluja; J Costain; E. Van Der Leden; C. Laverde

    La corrosion dans l’industrie du procédé est un enjeu majeur et est la cause la plus fréquente des défaillances des équipements et des arrêts forcés des sites industriels. Les défaillances des pipelines ou des réservoirs peuvent être dangereuses, coûteuses et ont des effets graves sur l’environnement. Une défaillance typique est la diminution jusqu’à un seuil critique de l’épaisseur des parois à cause de l’érosion ou de la corrosion interne comme externe. Actuellement, le suivi de la corrosion dans les pipes et les réservoirs utilise le plus souvent une inspection et un suivi manuel, procédure coûteuse notamment en temps. De plus, les zones critiques sont souvent situées dans des emplacements d’accès difficile. Comme ces données ne sont pas automatiquement informatisées, elles sont peu fiables pour des analyses à long terme ou le suivi de la corrosion. L’objectif de cet article est de présenter une nouvelle technologie non intrusive pour le monitoring de la corrosion, utilisant les ultrasons et un software afin de stocker les données, suivre les taux et les tendances de la corrosion, ce qui permet un plan de maintenance avant que la défaillance se produise. Cet article est divisé en deux parties. Dans la première partie nous allons aborder les différents types de corrosion et comment ils se produisent. Dans la

  16. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

    2011-09-01T23:59:59.000Z

    Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

  17. Technology Review of Nondestructive Methods for Examination of Water Intrusion Areas on Hanford’s Double-Shell Waste Tanks

    SciTech Connect (OSTI)

    Watkins, Michael L.; Pardini, Allan F.

    2008-05-09T23:59:59.000Z

    Under a contract with CH2M Hill Hanford Group, Inc., PNNL has performed a review of the NDE technology and methods for examination of the concrete dome structure of Hanford’s double-shell tanks. The objective was to provide a matrix of methodologies that could be evaluated based on applicability, ease of deployment, and results that could provide information that could be used in the ongoing structural analysis of the tank dome. PNNL performed a technology evaluation with the objective of providing a critical literature review for all applicable technologies based on constraints provided by CH2M HILL. These constraints were not mandatory, but were desired. These constraints included performing the evaluation without removing any soil from the top of the tank, or if necessary, requesting that the hole diameter needed to gain access to evaluate the top of the tank structure to be no greater than approximately 12-in. in diameter. PNNL did not address the details of statistical sampling requirements as they depend on an unspecified risk tolerance. PNNL considered these during the technology evaluation and have reported the results in the remainder of this document. Many of the basic approaches to concrete inspection that were reviewed in previous efforts are still in use. These include electromagnetic, acoustic, radiographic, etc. The primary improvements in these tools have focused on providing quantitative image reconstruction, thus providing inspectors and analysts with three-dimensional data sets that allow for operator visualization of relevant abnormalities and analytical integration into structural performance models. Available instruments, such as radar used for bridge deck inspections, rely on post-processing algorithms and do not provide real-time visualization. Commercially available equipment only provides qualitative indications of relative concrete damage. It cannot be used as direct input for structural analysis to assess fitness for use and if necessary to de-rate critical components. There are currently no tools that automatically convert the NDE data to formats compatible with structural analysis programs. While radiographic techniques still provide significant advantages in spatial resolution, non-ionizing techniques are still preferred. Radar imagining in the 1–5 GHz has become the most useful. Unfortunately the algorithms and underlying assumptions used in these reconstructions are proprietary, and it is not possible to assess the quality and limitations of the analytical methods used to generate the derived structural data. The hypothesis that water intrusion may contribute to potential rebar corrosion of the tank domes provided the primary guidance in reviewing and evaluating available NDE technologies. Of primary concern is the need to employ technologies that provide the best opportunity for visualizing the rebar and providing quantitative data that can be integrated into structural analysis efforts to better understand and quantify the structural capacity of the domes. The conclusion is that an imaging system capable of locating and quantifying the distribution and conditions of the cement, aggregate, and rebar will provide the most valuable baseline upon which to build a case for the integrity of the structure. If successful, such a system would fulfill the need to incorporate valuable data into current structural load capacity analysis.

  18. Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2007-06-01T23:59:59.000Z

    In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for extraction of groundwater from the deep carbonate aquifer. Grazing and hunting are unlikely to be potential causes for inadvertent human intrusion into waste areas because of vegetation characteristics and lack of significant game animal populations.

  19. Monitoring CO 2 sequestration into deep saline aquifer and associated salt intrusion using coupled multiphase flow modeling and time lapse electrical resistivity tomography

    SciTech Connect (OSTI)

    Chuan Lu; CHI Zhang; Hai Hanag; Timothy C. Johnson

    2014-04-01T23:59:59.000Z

    Successful geological storage and sequestration of carbon dioxide (CO2) require efficient monitoring of the migration of CO2 plume during and after large-scale injection in order to verify the containment of the injected CO2 within the target formation and to evaluate potential leakage risk. Field studies have shown that surface and cross-borehole electrical resistivity tomography (ERT) can be a useful tool in imaging and characterizing solute transport in heterogeneous subsurface. In this synthetic study, we have coupled a 3-D multiphase flow model with a parallel 3-D time-lapse ERT inversion code to explore the feasibility of using time-lapse ERT for simultaneously monitoring the migration of CO2 plume in deep saline formation and potential brine intrusion into shallow fresh water aquifer. Direct comparisons of the inverted CO2 plumes resulting from ERT with multiphase flow simulation results indicate the ERT could be used to delineate the migration of CO2 plume. Detailed comparisons on the locations, sizes and shapes of CO2 plume and intruded brine plumes suggest that ERT inversion tends to underestimate the area review of the CO2 plume, but overestimate the thickness and total volume of the CO2 plume. The total volume of intruded brine plumes is overestimated as well. However, all discrepancies remain within reasonable ranges. Our study suggests that time-lapse ERT is a useful monitoring tool in characterizing the movement of injected CO2 into deep saline aquifer and detecting potential brine intrusion under large-scale field injection conditions.

  20. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    SciTech Connect (OSTI)

    Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu

    2008-10-01T23:59:59.000Z

    One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water standards might be exceeded was evaluated. A variety of scenarios and aquifer conditions was considered in a sensitivity evaluation. The scenarios and conditions simulated in Section 4, in particular those describing the geochemistry and mineralogy of potable aquifers, were selected based on the comprehensive geochemical model developed in Section 3.

  1. Development of computer program ENAUDIBL for computation of the sensation levels of multiple, complex, intrusive sounds in the presence of residual environmental masking noise

    SciTech Connect (OSTI)

    Liebich, R. E.; Chang, Y.-S.; Chun, K. C.

    2000-03-31T23:59:59.000Z

    The relative audibility of multiple sounds occurs in separate, independent channels (frequency bands) termed critical bands or equivalent rectangular (filter-response) bandwidths (ERBs) of frequency. The true nature of human hearing is a function of a complex combination of subjective factors, both auditory and nonauditory. Assessment of the probability of individual annoyance, community-complaint reaction levels, speech intelligibility, and the most cost-effective mitigation actions requires sensation-level data; these data are one of the most important auditory factors. However, sensation levels cannot be calculated by using single-number, A-weighted sound level values. This paper describes specific steps to compute sensation levels. A unique, newly developed procedure is used, which simplifies and improves the accuracy of such computations by the use of maximum sensation levels that occur, for each intrusive-sound spectrum, within each ERB. The newly developed program ENAUDIBL makes use of ERB sensation-level values generated with some computational subroutines developed for the formerly documented program SPECTRAN.

  2. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    SciTech Connect (OSTI)

    Tolan, T.L. [Tolan, Beeson and Associates, Kennewick, WA (United States)

    1993-06-01T23:59:59.000Z

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system.

  3. Non-intrusive cooling system

    DOE Patents [OSTI]

    Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

    2001-05-22T23:59:59.000Z

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  4. Intrusive multi-probe system

    SciTech Connect (OSTI)

    Green, R.A.; Hester, L.R.; Bouchillon, C.W.

    1995-02-01T23:59:59.000Z

    The Diagnostic Instrumentation and Analysis Laboratory (DIAL) in the College of Engineering at Mississippi State University is the result of the efforts of several faculty members in the Aerospace and Chemical Engineering Departments obtaining funding in 1976. At that time, an initial research project was begun which was funded by the US Department of Energy as part of the national magnetohydrodynamic (MHD) program. Initial research efforts concentrated in heat recovery and seed recovery (HRSR) from the MHD combustion process as well as some materials investigations. Over the years, efforts at DIAL were shifted from HRSR studies to the development of optical based, microprocessor controlled instrumentation for use in the harsh MHD environment.

  5. Water intrusion in underground structures

    E-Print Network [OSTI]

    Nazarchuk, Alex

    2008-01-01T23:59:59.000Z

    This thesis presents a study of the permissible groundwater infiltration rates in underground structures, the consequences of this leakage and the effectiveness of mitigation measures. Design guides and codes do not restrict, ...

  6. Trace fossil assemblages in selected shelf sandstones

    E-Print Network [OSTI]

    Locke, Kathleen Ann

    1983-01-01T23:59:59.000Z

    Harris. Thank you, good luck in the future, and may God bless you all. vi TABLE OF CONTENTS INTRODUCTION Background Objectives Methods . TRACE FOSSIL IDENTIFICATION IN CORES Introduction Description of Selected Trace Fossils TRACE FOSSILS..., the trace foss11 distributions agreed with those of the ichnofacies described by Seilacher (1978) and with the known environmental distributions compiled by Chamberlain (1978), but many trace fossils have widespread occurrences that limit...

  7. Apparatuses, Globalities, Assemblages: Third Cinema, Now

    E-Print Network [OSTI]

    Benfield, Dalida Maria

    2011-01-01T23:59:59.000Z

    and energy production that have been wrought upon the “developing” world.and energy production that have been wrought upon the “developing” world.

  8. Apparatuses, Globalities, Assemblages: Third Cinema, Now

    E-Print Network [OSTI]

    Benfield, Dalida Maria

    2011-01-01T23:59:59.000Z

    Lighting Ltd. , Foshan/Siemens art program. Fanon, F. (decolonizing-the-digitaldigital- decolonization Siemens. (2010a). “Siemens in China – November 2008. ” Retrieved from

  9. re.Assemblage Bridging Traditional Craft

    E-Print Network [OSTI]

    to the significanceofattentiontodetailsuchascraftandwoodqualities. #12; 4 Finally,FusedCraftsisacollectionofartifactsthatareparthandcraftedandpart3D printed

  10. Geochemical taphonomy of shallow marine vertebrate assemblages

    E-Print Network [OSTI]

    Benton, Michael

    : bones; taphonomy; rare earth elements; diagenesis; redox; marine 1. Introduction 1.1. Background Many). Trueman and Benton (1997) and Staron et al. (2001) demonstrated that the rare earth ele- ment (REE.R. Palmer b a Department of Earth Sciences, University of Bristol, Bristol BS8 1RJ, UK b School of Ocean

  11. Brine and Gas Flow Patterns Between Excavated Areas and Disturbed Rock Zone in the 1996 Performance Assessment for the Waste Isolation Pilot Plant for a Single Drilling Intrusion that Penetrates Repository and Castile Brine Reservoir

    SciTech Connect (OSTI)

    ECONOMY,KATHLEEN M.; HELTON,JON CRAIG; VAUGHN,PALMER

    1999-10-01T23:59:59.000Z

    The Waste Isolation Pilot Plant (WIPP), which is located in southeastern New Mexico, is being developed for the geologic disposal of transuranic (TRU) waste by the U.S. Department of Energy (DOE). Waste disposal will take place in panels excavated in a bedded salt formation approximately 2000 ft (610 m) below the land surface. The BRAGFLO computer program which solves a system of nonlinear partial differential equations for two-phase flow, was used to investigate brine and gas flow patterns in the vicinity of the repository for the 1996 WIPP performance assessment (PA). The present study examines the implications of modeling assumptions used in conjunction with BRAGFLO in the 1996 WIPP PA that affect brine and gas flow patterns involving two waste regions in the repository (i.e., a single waste panel and the remaining nine waste panels), a disturbed rock zone (DRZ) that lies just above and below these two regions, and a borehole that penetrates the single waste panel and a brine pocket below this panel. The two waste regions are separated by a panel closure. The following insights were obtained from this study. First, the impediment to flow between the two waste regions provided by the panel closure model is reduced due to the permeable and areally extensive nature of the DRZ adopted in the 1996 WIPP PA, which results in the DRZ becoming an effective pathway for gas and brine movement around the panel closures and thus between the two waste regions. Brine and gas flow between the two waste regions via the DRZ causes pressures between the two to equilibrate rapidly, with the result that processes in the intruded waste panel are not isolated from the rest of the repository. Second, the connection between intruded and unintruded waste panels provided by the DRZ increases the time required for repository pressures to equilibrate with the overlying and/or underlying units subsequent to a drilling intrusion. Third, the large and areally extensive DRZ void volumes is a significant source of brine to the repository, which is consumed in the corrosion of iron and thus contributes to increased repository pressures. Fourth, the DRZ itself lowers repository pressures by providing storage for gas and access to additional gas storage in areas of the repository. Fifth, given the pathway that the DRZ provides for gas and brine to flow around the panel closures, isolation of the waste panels by the panel closures was not essential to compliance with the U.S. Environment Protection Agency's regulations in the 1996 WIPP PA.

  12. Intrusion detection and monitoring for wireless networks.

    SciTech Connect (OSTI)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01T23:59:59.000Z

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  13. Online Display Advertising: Targeting and Intrusiveness

    E-Print Network [OSTI]

    Tucker, Catherine Elizabeth

    We use data from a large-scale field experiment to explore what influences the effectiveness of online advertising. We find that matching an ad to website content and increasing an ad's obtrusiveness independently increase ...

  14. Hierarchical Task Analysis of Intrusion Detection Systems

    E-Print Network [OSTI]

    Blustein, J.

    .......................... 4 3. Hierarchical Task Analysis ............................ 6 3.1 Network Security Administrator .................... 7 3.2 Functions of Network Security Administrator ....... 7 4. Diagrams on a single or group of persons called Network Security Administrators. They use a wide variety of tools

  15. Intrusion-Tolerant Protection for Critical Infrastructures

    E-Print Network [OSTI]

    Neves, Nuno

    of an organization in the face of accidents and attacks. How- ever, they are not simple firewalls but distributed]. In recent years these systems evolved in several aspects that greatly increased their exposure to cyber-attacks, a critical information infrastructure is formed by facilities, like power transformation substations or cor

  16. Non-intrusive Termination of Noisy Optimization ?

    E-Print Network [OSTI]

    2011-07-20T23:59:59.000Z

    May 31, 2011 ... U.S. Department of Energy, under Contract DE-AC02-06CH11357. ... Computer Science Division, Argonne National Laboratory, Argonne, IL 60439. ..... determine when continuing with the present course is likely wasteful as ...

  17. Intrusion Recovery Using Selective Re-execution

    E-Print Network [OSTI]

    Kim, Taesoo

    RETRO repairs a desktop or server after an adversary compromises it, by undoing the adversary's changes while preserving legitimate user actions, with minimal user involvement. During normal operation, RETRO records an ...

  18. Disruptive event analysis: volcanism and igneous intrusion

    SciTech Connect (OSTI)

    Crowe, B.M.

    1980-08-01T23:59:59.000Z

    An evaluation is made of the disruptive effects of volcanic activity with respect to long term isolation of radioactive waste through deep geologic storage. Three major questions are considered. First, what is the range of disruption effects of a radioactive waste repository by volcanic activity. Second, is it possible, by selective siting of a repository, to reduce the risk of disruption by future volcanic activity. And third, can the probability of repository disruption by volcanic activity be quantified. The main variables involved in the evaluation of the consequences of repository disruption by volcanic activity are the geometry of the magma-repository intersection (partly controlled by depth of burial) and the nature of volcanism. Potential radionuclide dispersal by volcanic transport within the biosphere ranges in distance from several kilometers to global. Risk from the most catastrophic types of eruptions can be reduced by careful site selection to maximize lag time prior to the onset of activity. Certain areas or volcanic provinces within the western United States have been sites of significant volcanism and should be avoided as potential sites for a radioactive waste repository. Examples of projection of future sites of active volcanism are discussed for three areas of the western United States. Probability calculations require two types of data: a numerical rate or frequency of volcanic activity and a numerical evaluation of the areal extent of volcanic disruption for a designated region. The former is clearly beyond the current state of art in volcanology. The latter can be approximated with a reasonable degree of satisfaction. In this report, simplified probability calculations are attempted for areas of past volcanic activity.

  19. Inverse Modeling for Coastal Seawater Intrusion

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    , USA) #12;INTRODUCTION · Inverse modeling ­ standard tool for groundwater modeling ­ uncommonD3D.1 ­ 2D and 3D finite-element code for simulating variable-density groundwater problems · UCODE 3 and given time (i.e. at one observation location) on one of the parameters in the groundwater model

  20. assemblage copepoda crustacea: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an...

  1. assemblage combustible nucleaire: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Biology and Medicine Websites Summary: Tropical regions - most diverse More solar energy, large geographic area, more stable, better climate Uniformity of abundance in an...

  2. LATE ORDOVICIAN CLIMBING DUNE ASSEMBLAGES, THE SIGNATURE OF GLACIAL OUTBURST ?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , jean-loup.rubino@total.com 4NOC, Libya, Y-Boujazia@yahoo.com Meltwater-related processes have long been of the Western Murzuq Basin/ Tassili n'Ajjer area (southern Libya ­ Algeria boundary), this presentation aims

  3. The assemblage of exchange : housing, industry and the potential mall

    E-Print Network [OSTI]

    Eng, Ronald J. (Ronald Jan)

    1994-01-01T23:59:59.000Z

    This thesis is interested in examining a contemporary generative method for approaching design in urban areas. It considers the levels of interactions in the city in which the questions of architecture are clearly affected ...

  4. Fish assemblages on coral reefs in Guanaja, Bay Islands, Honduras

    E-Print Network [OSTI]

    Mahendran, Christopher Kandiah

    2012-06-07T23:59:59.000Z

    reefs that support a wide variety of habitats, a rich ichthyofauna, and one of the highest coral diversities found in the Caribbean, Guanaja is one of Honduras' major eco-tourism destinations. Coral bleaching, a phenomena initially documented in 1931...

  5. Analysis of the Pass Cavallo shipwreck assemblage, Matagorda Bay, Texas

    E-Print Network [OSTI]

    Borgens, Amy Anne

    2004-09-30T23:59:59.000Z

    at Goliad. The vessel wrecked at the entrance of the historic Pass Cavallo while evading capture from a Mexican brig-of-war in November of 1835....

  6. The analysis and conservation of the Belle footwear assemblage

    E-Print Network [OSTI]

    Randolph, Anthony G., Jr

    2003-01-01T23:59:59.000Z

    Nautical archaeology can be loosely defined as the study of the material remains of ships and their contents as a component of a broader cultural system. The oceans and lakes of the world are replete with shipwrecks from all eras, and these sites...

  7. LATE ORDOVICIAN CLIMBING DUNE ASSEMBLAGES : THE SIGNATURE OF GLACIAL OUTBURST?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    · Channel axis SW-NE · 4 internal erosion-based subunits Wadi Inlalen example · Steady & uniform · Lower · Transfert toward adjacent eddy-related side bars Smaller scale analogue channel in modern wadi sandy flood · In places, accretion surfaces Wadi Aramat & Alun example Depositional facies Depositional model · Unconfined

  8. ant dispersal assemblages: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    surface) with numerous colonies of the ascidian Diazona violacea, and the polychaete Sabella pavonina. This study highlights, also for a Mediterranean seamount, the potential...

  9. Shipboard fluid system diagnostics using non-intrusive load monitoring

    E-Print Network [OSTI]

    Mitchell, Gregory R. (Gregory Reed)

    2007-01-01T23:59:59.000Z

    Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

  10. Intrusion Detection in Realtime Database Systems Via Time Signatures*

    E-Print Network [OSTI]

    Son, Sang H.

    as ``normal'' transactions, and compare the ability of different numerically quantifiable measures to capture. Introduction In a real­time database system, transactions often have timing constraints. Transactions must meet their timing constraints, often expressed as deadlines, in order to be correct and useful. In stock market

  11. A Multi-Dimensional approach towards Intrusion Detection System

    E-Print Network [OSTI]

    Sanyal, Sugata

    Sanyal School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India detection. Network and system usage parameters like source and destination IP addresses; source of abnormality in the system usage with respect to that dimension. This mature function is referred

  12. Intrusive Galerkin methods with upwinding for uncertain nonlinear hyperbolic systems

    SciTech Connect (OSTI)

    Tryoen, J., E-mail: tryoenj@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France); LIMSI-CNRS, 91403 Orsay cedex (France); Le Maitre, O., E-mail: olm@limsi.f [LIMSI-CNRS, 91403 Orsay cedex (France); CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ndjinga, M., E-mail: michael.ndjinga@cea.f [CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ern, A., E-mail: ern@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France)

    2010-09-01T23:59:59.000Z

    This paper deals with stochastic spectral methods for uncertainty propagation and quantification in nonlinear hyperbolic systems of conservation laws. We consider problems with parametric uncertainty in initial conditions and model coefficients, whose solutions exhibit discontinuities in the spatial as well as in the stochastic variables. The stochastic spectral method relies on multi-resolution schemes where the stochastic domain is discretized using tensor-product stochastic elements supporting local polynomial bases. A Galerkin projection is used to derive a system of deterministic equations for the stochastic modes of the solution. Hyperbolicity of the resulting Galerkin system is analyzed. A finite volume scheme with a Roe-type solver is used for discretization of the spatial and time variables. An original technique is introduced for the fast evaluation of approximate upwind matrices, which is particularly well adapted to local polynomial bases. Efficiency and robustness of the overall method are assessed on the Burgers and Euler equations with shocks.

  13. Policy-controlled Event Management for Distributed Intrusion Detection

    E-Print Network [OSTI]

    Sommer, Robin

    building blocks for the formulation of a site's security policy since its conception. A recent addition

  14. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection

    E-Print Network [OSTI]

    Sommer, Robin

    of network packets in order to detect attacks and, more generally, violations of a site's security pol- icy

  15. A Continuous Time Bayesian Network Approach for Intrusion Detection

    E-Print Network [OSTI]

    Xu, Jing

    2010-01-01T23:59:59.000Z

    also challenges network administrators to deal with identitya fact of life for network administrators. Detecting attackscan help the network administrator tell whether the current

  16. A Continuous Time Bayesian Network Approach for Intrusion Detection

    E-Print Network [OSTI]

    Xu, Jing

    2010-01-01T23:59:59.000Z

    3 for more details). The ESS for any variable X in a CTBNwhen event P i can happen. The ESS we need are M P i |U Pi :occur when U = U p i , the ESS M P i |U Pi is just M P i ,

  17. anomaly intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Creation via Clustering Anomalies Gilbert R. Hendry and Shanchieh J. Yang apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work...

  18. Minimizing Intrusiveness in Home Energy Measurement David Lachut

    E-Print Network [OSTI]

    Rollins, Sami

    to carefully monitor energy supply and past energy consumption, however, using this information to drive demand and using often limited resources including energy and bandwidth. In this work, we present the design monitor energy supply and past energy consumption. Using this information to drive demand management

  19. Automatic compilation framework for Bloom filter based intrusion detection

    E-Print Network [OSTI]

    Najjar, Walid A.

    the FPGA fabric of a CSoC device. In the execution model underlying ROCCC, sequential computations are carried out on the microprocessor in the CSoC, while the compute intensive code segments are mapped onto

  20. Automatic intrusion recovery with system-wide history

    E-Print Network [OSTI]

    Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

    2014-01-01T23:59:59.000Z

    Compromises of our computer systems are inevitable. New software vulnerabilities are discovered and exploited daily, but even if the software is bug-free, administrators may inadvertently make mistakes in configuring ...

  1. Distributed fiber optic intrusion sensor system for monitoring long perimeters

    E-Print Network [OSTI]

    Juarez, Juan C.

    2009-06-02T23:59:59.000Z

    A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from...

  2. Improving shipboard maintenance practices using non-intrusive load monitoring

    E-Print Network [OSTI]

    Piber, Mark A. (Mark Augustin)

    2007-01-01T23:59:59.000Z

    (cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

  3. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...

    Energy Savers [EERE]

    traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE...

  4. Methods for non-intrusive sensing and system monitoring

    E-Print Network [OSTI]

    Schantz, Christopher James

    2014-01-01T23:59:59.000Z

    Improving the efficiency of collection, transmission, and consumption of resources is the focus of a wide swath of engineering research. Current technological solutions for capturing or mitigating energy and resource waste ...

  5. Non-Intrusive Electric Load Monitoring in Commercial Buildings

    E-Print Network [OSTI]

    Norford, L. K.; Mabey, N.

    , W.T.; Cameron, lR. and Dow, A.B. 1988. "On line diagnostics of large induction motors." Vibrations and Audible Noise in Alternating Current Machines, Belmans, R.; Binns, K.; Geysen, W.; and Vandenput, A., eds. Kluwer Academic Publishers. 140... review of elecnic motor literature indicated that samples of elecnical current taken at slightly faster than twice the 60 Hz fundamental can be used to detect several indicators of incipient motor failure. Tests were initiated to determine whether...

  6. Intrusion Detection in the Large: Distributed Detection of Distributed Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

  7. Intrusion Detecting Using Secure Signatures - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared LandResponses to EngineeredADepartment of1999Two SignElectricity

  8. Intrusion Margins and Associated Fractures | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (bot load)InternationalRenewable Energy Council

  9. CV-1b: Magmatic - Intrusive | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin: EnergyBoston Areais3: Crystalline Rock -COPPE IncubatorCSU -b: Magmatic -

  10. An Intelligent Tutor for Intrusion Detection on Computer Systems An Intelligent Tutor for Intrusion Detection on Computer Systems

    E-Print Network [OSTI]

    and not especially common, practice with simulators is valuable. Simulators can efficiently drill students on rare-recognition rules to itself infer the problems, planning methods to figure how best to fix them, plan

  11. Acculturation in the Upper Middle Missouri Valley as Reflected in Modified Bone Assemblages

    E-Print Network [OSTI]

    Weston, Timothy

    1986-05-01T23:59:59.000Z

    to the Pacific coast. The site is adjacent to the Knife River and has been partially destroyed by cutbank erosion, but recent construction of an erosion-resistant berm beneath the cutbank has ensured its continued preservation. The Big Hidatsa site... culture of the 18th and 19th centuries. Prior to contact, the villagers were already involved in a wide ranging aboriginal trade network with established links stretching as far as the Pacific coast. Euro-American traders used these trade networks...

  12. Authenticity, Authority, and Assemblage Masculinity: Geek Identity and Hardware Production in Networked Spaces

    E-Print Network [OSTI]

    Ross, Ian W.

    2014-01-01T23:59:59.000Z

    firearm legislation and the politics of the group specifically has clearly been affected by the group’s appropriation of 3D printing

  13. The analysis of the Conde de Tolosa and the Nuestra Senora de Guadalupe olive jar assemblage

    E-Print Network [OSTI]

    James, Stephen Robert

    1985-01-01T23:59:59.000Z

    recovered in the New World. Analysis of these containers imparts a wealth of information critical to the understanding of this widely used and diffused ceramic type. Besides revealing a previously unreported form the study suggests needed changes in both.... A. , for his time and trouble with maps, provenience and general information; to all the people of the Domincan Republic for their buenas aventuras and smiles given during our stay on the island; to all my friends, colleagues and professors, who...

  14. Changes in species assemblages and diets of Collembola along a gradient of metal pollution

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    pollution. Keywords: Collembolan communities, Heavy metals, Gut contents 1. Introduction * Corresponding.1016/S0929-1393(02)00134-8 #12;2 Pollution by heavy metals, due to smelter, mining or agricultural the hypothesis that soil animal communities sampled along a gradient of heavy metal pollution show a) shifts

  15. ORIGINAL PAPER Small-scale gold mining erodes fish assemblage structure

    E-Print Network [OSTI]

    Grenouillet, Gael

    , and heavy metal pollution (Cleary 1990). Freshwater ecosystems are particularly impacted by these mining

  16. Aquatic Vertebrate Assemblages in the Middle Trinity River Basin, with Emphasis on Turtles

    E-Print Network [OSTI]

    Riedle, Jimmy

    2014-05-03T23:59:59.000Z

    between the two study sites, turtle species richness decreased, whereas habitat overlap between species increased. I analyzed the capture efficiency of 7 trap types used throughout the course of this project and found that effectiveness of each trap type...

  17. Integrated metatranscriptomic and metagenomic analyses of stratified microbial assemblages in the North Pacific Subtropical Gyre

    E-Print Network [OSTI]

    Shi, Yanmei

    As part of an ongoing survey of microbial community gene expression in the ocean, we sequenced and compared ~38?Mbp of community transcriptomes and ~157?Mbp of community genomes from four bacterioplankton samples, along a ...

  18. Citizen Science System Assemblages: Understanding the Technologies that Support Crowdsourced Science

    E-Print Network [OSTI]

    Crowston, Kevin

    how different citizen science functionalities may lead to successful project outcomes. Four detailed case studies of current citizen science projects encompassing a cross- section of varying project sizes]. Sometimes described as crowdsourced science, citizen science projects include (for example) those that ask

  19. Discordance between living and death assemblages as evidence for anthropogenic ecological change

    E-Print Network [OSTI]

    Boyce, C. Kevin

    '' in settings of documented anthropogenic eutrophication (AE) than in areas where AE and other human impacts with eutrophication (anomalous abundance of seagrass-dwellers and/or scarcity of organic-loving species in the death. ecological baseline eutrophication marine communities paleoecology Human activities affect living systems

  20. ------. 1980. Avian feeding assemblages in Puerto Rico. Carib. J. Sci. 15:21-27.

    E-Print Network [OSTI]

    Losos, Jonathan B.

    Rico, Mayaguez Notes on the Ecology and Behavior of Anolis cuvieri (Lacertilia: Iguanidae) in Puerto, Center for Energy and Environment Research, Terrestrial Ecology Di- vision, G.P.O. Box 3682, San Juan the summer of 1988, on movement patterns, home range, and diet of the "lagarto verde" in the Luquillo

  1. Changes in seagrass polychaete assemblages after invasion by Caulerpa racemosa var. cylindracea

    E-Print Network [OSTI]

    Martin, Daniel

    , si bien algunas de especies coincidentes difieren claramente en abundancia. La biomasa de C. racemosa

  2. UNCORRECTEDPROOF 1 Fecundity determines the extinction threshold in a Canadian assemblage

    E-Print Network [OSTI]

    Holland, Jeffrey

    suggested to have negative effects on forest species. We determined 13 the extinction threshold for 12, species caught moving outside forest habitat had lower extinction thresholds than 19 species not caught habitat loss affects the 39extinction risk of different species is therefore an 40important part

  3. Authenticity, Authority, and Assemblage Masculinity: Geek Identity and Hardware Production in Networked Spaces

    E-Print Network [OSTI]

    Ross, Ian W.

    2014-01-01T23:59:59.000Z

    his seminal text on media fandom Textual Poachers, discussesbe associated with the levels of fandom seen in the kinds oforiented digital sites of fandom that I discuss throughout

  4. Dynamics of larval fish assemblages over a shallow coral reef in the Florida Keys

    E-Print Network [OSTI]

    Sponaugle, Su

    J. Fortuna Ã? K. Grorud Ã? T. Lee Communicated by P.W. Sammarco, Chauvin S. Sponaugle (&) Ã? J. Fortuna

  5. E-Print Network 3.0 - assemblages honoring professor Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    gives me the incentive to get to know some of my professors... Ira A. Fulton School of Engineering Honors Students leadership creativity motivation teamwork... .727.8713 "Being...

  6. Evaluation of the paraphyletic assemblages within Lonchophyllinae, with description of a new tribe and genus

    E-Print Network [OSTI]

    Parlos, Julie A.; Timm, Robert M.; Swier, Vicki J.; Zeballos, Horacio; Baker, Robert J.

    2014-01-28T23:59:59.000Z

    UM of texas tech University Table 1. Karyotype data obtained from the literature or described herein. Locality data are provided when available. Abbreviations are: L. = Lonchophylla, H. = Hsunycteris, 2N = diploid number, FN = fundamental number, Suriname... = Republic of Suriname. Gardner (1977) did not include a figure of his karyotype, therefore we were unable to determine whether Peruvian and Republic of Suriname individuals of H. thomasi had identical karyotypes. Species Karyotype Locality of Karyotype...

  7. Architectural intensification : patterns of use and construction assemblage as opportunity for elaboration

    E-Print Network [OSTI]

    Treister, Charles

    1981-01-01T23:59:59.000Z

    The loss of small scale elements and the lack of opportunity for personal elaboration has been an area of failure in contemporary buildings . These small scale elements are essential in providing human scale, enabling ...

  8. Ecology of the predator assemblage affecting nest success of passerines in Sierra Nevada, California

    E-Print Network [OSTI]

    Cocimano, Maria C.

    2010-07-14T23:59:59.000Z

    were surveyed since 1997 (15 from 1997 to 2006, plus 6 added in 2003). My study areas were located in montane meadows in central Sierra Nevada, California, USA, including El Dorado, Placer, Nevada, and Sierra counties. The area presents a... the line intercept method (Bonham 1989), using a pole (200 cm tall ? 1.25 cm diameter). I took measurements every 3 meters, including vegetation type, as each species of plant that touched the pole (willow, other shrub species, grass/forbs, aspen, alder...

  9. Effects of Grassland Restoration on Avian Assemblage Characteristics and Dickcissel Nesting Success in Texas

    E-Print Network [OSTI]

    Lituma, Christopher M.

    2010-07-14T23:59:59.000Z

    ?2008. C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s C ou n t y S i z e ( h a) D I C K A b u n d . E ve n n e s s W a s h i n g t on 34 0 0. 81 W a s h i n g t on 29 0. 43 0. 69 N a v a r r o 34 0. 13 0. 82 C ol or a do 29 0. 3 0. 8 N a... v a r r o 32 0. 11 0. 63 A n de r s on 26 .6 0. 11 0. 77 N a v a r r o 29 .7 0. 04 0. 84 N a v a r r o 22 .5 0. 18 0. 75 N a v a r r o 24 .5 0. 26 0. 74 N a v a r r o 21 .9 0. 6 0. 32 N a v a r r o 18 .4 0. 33 0. 72 N a v a r r o 17 .6 0. 31 0. 76 N...

  10. Benthic Assemblage Variability in the Upper San Francisco Estuary: A 27-Year Retrospective

    E-Print Network [OSTI]

    Peterson, Heather A; Vayssieres, Marc

    2010-01-01T23:59:59.000Z

    which lead from the Pacific Ocean to an inland river delta,San Joaquin River Pacific Ocean 10 m 16 km Water Export

  11. Effects Of Sea Otter Colonization On Soft-Sediment Intertidal Prey Assemblages In Glacier Bay, Alaska

    E-Print Network [OSTI]

    Weitzman, Benjamin Phillip

    2013-01-01T23:59:59.000Z

    al. 2012). In mixed or unconsolidated substrate habitats (rocky-reef and mixed or unconsolidated substrate habitat hasrocky substrate and unconsolidated environments highlights

  12. Analysis of the Black-capped Vireo and White-eyed Vireo Nest Predator assemblages

    E-Print Network [OSTI]

    Conkling, Tara J.

    2011-08-08T23:59:59.000Z

    Predation is the leading cause of nest failure in songbirds. My study identified nest predators of black-capped vireos and white-eyed vireos, quantified the activity of potential predator species, examined the relationships between vegetation...

  13. E-Print Network 3.0 - assemblage growth rate Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    J. - Department of Zoology, University of Oklahoma Collection: Biology and Medicine ; Environmental Sciences and Ecology 6 Crustal architecture of SW Yukon, northern...

  14. Effects of an introduced predator on the native fish assemblage in the Devils River, Texas

    E-Print Network [OSTI]

    Robertson, Michael Shard

    1999-01-01T23:59:59.000Z

    in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved as to style and content by: Kirk O. Winemiller (Chair of Committee) (Fary Garrett (Member) Frances elwick (Member) Merrill Sweet (Member) Robert D. Brown... of attaining my Master's degree. I would also like to recognize the efforts of the rest of my advisory committee, Dr. Frances Gelwick, Dr. Gary Garrett, and Dr. Merrill Sweet. Each member was invaluable by providing advice and answering numerous questions...

  15. Composition, structure, and habitat associations of fish assemblages of the Dolan Falls Preserve

    E-Print Network [OSTI]

    Valdes Cantu, Nora Edith

    1995-01-01T23:59:59.000Z

    at which their survival is threatened (Hubbs and Garrett 1990). Moreover, the introduction of species like Micropterus dolomieu (smallmouth bass), Morone chrysops (white bass), and Lepomis aurirus (yellowbreast sunfish) could lead to a decline... of the native endemics due to competition or predation. Over the past few decades, the Devil's River has been sampled at irregular time intervals and at scattered locations, mostly well below Dolan Falls (Harrell 1974; Garrett et al. 1992). Little effort has...

  16. Fish assemblage structure along environmental gradients in a coastal plain drainage: influences from a reservoir

    E-Print Network [OSTI]

    Herbert, Matthew Earl

    1999-01-01T23:59:59.000Z

    ). Discharge was calculated for each stream reach every 4-7 weeks when streams were at baseflow conditions and unaffected by transitory runoff fiom storm events (Gordon et al 1992). Baseflow sampling conditions were determined by examining hydrographic... 16. 1 5, 5 10. 3 29. 5 3. 1 4. 6 3, 4 5. 1 10. 4 54 5. 5 50, 0 11. 1 5. 6 5. 6 55. 7 22. 8 2, 8 11. 8 60. 6 7. 5 5. 4 2. 2 32, 6 100, 9 3. 0 20. 0 59. 6 2, 4 8. 8 2. 7 14. 5 6. 1 -6. 9 2-14 &0. 1-0. 1 5. 9-6. 7 4...

  17. Nutrient loading and consumers: Agents of change in open-coast macrophyte assemblages

    E-Print Network [OSTI]

    Nielsen, Karina J.

    of carbon emissions and nitrogen fixation) and on population size of consumers (e.g., by overfishing) can.g., estuaries, bays, and inland seas) worldwide (9). Transport of fixed inorganic nitrogen from the land.g., the Gulf of Mexico and the Baltic Sea; refs. 12 and 13). In contrast, open, wave-swept coastlines along

  18. Fish Assemblages in Manistee River Tributaries: Longitudinal Distribution Analysis, Seasonal Variation, and Riparian Improvement Evaluation.

    E-Print Network [OSTI]

    Gressick, Nicholas J.

    2009-01-01T23:59:59.000Z

    ??Sedimentation affects both stream physical and biological integrity. Improperly designed stream passage accompanied with sedimentation and altered hydrology can impede fish passage and reduce fish… (more)

  19. Patterns in fish assemblages and seagrass herbivory in a temperate Australian seagrass meadow.

    E-Print Network [OSTI]

    White, Kirrily

    2011-01-01T23:59:59.000Z

    ??While eutrophication of coastal waters has long been attributed as a major cause of seagrass decline, there is now emerging evidence from both tropical and… (more)

  20. Panel assemblage for housing : some form and construction explorations for small buildings

    E-Print Network [OSTI]

    Borenstein, David Reed

    1984-01-01T23:59:59.000Z

    This thesis examines the consequences of building homes in a factory and explores viable construction alternatives using factory-made panels. The exploration considers panelized systems of dwelling construction and its ...

  1. The influence of littoral zone structural complexity on fish assemblages in Lake Conroe, TX

    E-Print Network [OSTI]

    Trial, Perry Felix

    1999-01-01T23:59:59.000Z

    the centroid for Spring. Centroids for threadfin shad and yellow bass lie in an intermediate position between Spring and Summer. The centroids for black crappie (Porno@i s nigromaculatus), gizzard shad (Dorasoma cepedianum), channel catfish (Ictalurus...

  2. The copper artifact assemblage from an Ottoman period shipwreck in the Red Sea

    E-Print Network [OSTI]

    Willis, Kathryn Ewalt

    2002-01-01T23:59:59.000Z

    . . . . . 58 vIu CHAPTER Page Pots. . . . . . . . ?. . ??, . ?????, , Lids. . Basins . . . . . . . . . . . . . . . . . . . . . . , . . . , Unique Large Vessel . . Small Vessels. Dishes . Cooking Pans . Trays. . Pitchers . . Strainers...

  3. Reef fish assemblages on hard banks in the northwestern Gulf of Mexico

    E-Print Network [OSTI]

    Dennis, George David

    1985-01-01T23:59:59.000Z

    f~C~ h h d banks of the northwestern Gulf based on submersible observations 106 46. Comparison of coloration characters in Holacanthus spp. and their intermediates. Totals for scores on Feddern's patterns 1, 5, and 7 (comparative data from...' Figure 1. Hard banks of the northwestern Gulf of Nexico. eO p+ O 4 cp v+ A +~+~ 0~0 ~4 ~O + ohio+ 50 50 5 Z 100 III 0 100 150 150 Figure 2. Biotic zones known to occur on the hard banks of the northwestern Gulf of Mexico. Broken bar...

  4. Summer fish assemblages in channelized and unchannelized reaches of the South Sulphur River, Texas

    E-Print Network [OSTI]

    Burgess, Christine Conner

    2012-06-07T23:59:59.000Z

    and Moss 1975; Stem and Stern 1980a, b; Schlosser 1982a, b, 1987; Lyons and Courtney 1989). Although ecologists realize that processes related to both physical disturbance and biotic interactions influence community organization (Sousa 1984b...). Moreover, spatial heterogeneity, frequency and intensity of physical disturbances, and life history attributes of stream biota must be considered (Connell 1975, 1978; Sousa 1979, 1984a, b; Strong 1983; Karr and Freemark 1983, 1985; Wiens 1984). One...

  5. An Index of Biotic Condition Based on Bird Assemblages in Great Lakes Coastal Wetlands

    E-Print Network [OSTI]

    Howe, Robert W.

    Phragmites australis tended to yield IBC values that were lower than expected based on environmental

  6. Convergence of temperate and tropical stream fish assemblages Carla Ibaez1,2

    E-Print Network [OSTI]

    Boyer, Edmond

    , France 2 Instituto de Ecología - UMSA, Unidad de limnología, Casilla: 10077, La Paz, Bolivia 3 Cemagref sites. This divergence can be linked to differences in energy availability between temperate

  7. Distributed Intrusion Detection Models for Mobile Ad Hoc Networks CHIN-YANG HENRY TSENG

    E-Print Network [OSTI]

    California at Davis, University of

    feel really lucky to be his student at UC Davis. I sincerely thank to Professor Matt Bishop in the OFFICE OF GRADUATE STUDIES of the UNIVERSITY OF CALIFORNIA DAVIS Approved By: Karl N. Levitt, Chair. I am very grateful that he spent his precious time and energy for advising my works

  8. Development of real time non-intrusive load monitor for shipboard fluid systems

    E-Print Network [OSTI]

    Branch, Perry L. (Perry Lamar)

    2008-01-01T23:59:59.000Z

    Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

  9. An experimental investigation of the sensitivity of a buried fiber optic intrusion sensor

    E-Print Network [OSTI]

    Kuppuswamy, Harini

    2006-04-12T23:59:59.000Z

    A distributed fiber optic sensor with the ability of detecting and locating intruders on foot and vehicles over long perimeters (>10 km) was studied. The response of the sensor to people walking over or near it and to vehicles driving nearby...

  10. Recent Approaches to Non-intrusive Load Monitoring Techniques in Residential Settings

    E-Print Network [OSTI]

    Sekercioglu, Y. Ahmet

    the effectiveness of energy conservation efforts in residential settings without any sort of end-use energy measurement of individual energy consumption of household appliances and provision of real-time feedback to energy used by different load classes or in particular to deter operation of certain loads in residential

  11. Chemical and petrological characteristics of the intrusive rocks of the Quitman Mountains, Texas

    E-Print Network [OSTI]

    Seay, Christopher Sidney

    1973-01-01T23:59:59.000Z

    of the behavior of elements in a magmatic environment. Due to the relatively small size of the Quitman intru- sion, the diversity of rock types, and the shallow depth of the source magma as evidenced by the composition and tex- ture of the rocks, it provides... faulted Creta- ceous sedimentary rocks. These Cretaceous rocks consist of some 12, 000 feet of marine shales, sandstones and limestones, and non-marine sandstones and shales. In places, volcanic rocks, mainly tuffaceous rhyolites and andesites...

  12. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    SciTech Connect (OSTI)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01T23:59:59.000Z

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  13. Seawater intrusion and aquifer freshening near reclaimed coastal area of Shenzhen

    E-Print Network [OSTI]

    Jiao, Jiu Jimmy

    water supply system was established, and now 80% of the city's water supply is drawn from a river the fill materials may have WaterScience&Technology:WaterSupplyVol7No2pp137­145QIWAPublishing2007 137doi experienced heavy pumping since the 1980s when it began to expand very quickly from a fishing village

  14. Magnetotelluric evidence for layered mafic intrusions beneath the Vring and Exmouth rifted margins

    E-Print Network [OSTI]

    Constable, Steve

    David Myer , Steven Constable, Kerry Key Scripps Institution of Oceanography, 9500 Gilman Drive MC-0225

  15. An Intrusive Super-Wideband Speech Quality Model: DIAL Nicolas C^ote1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ´erie Gautier-Turbin2 , Alexander Raake3 , Sebastian M¨oller3 1 LISyC EA 3883, UBO/ENIB, Brest, France 2 France- tegral quality estimations as well as diagnostic information in a super-wideband context. Index Terms to an acoustic speech sig- nal. Auditory tests are the most reliable way to assess the per- ceived speech quality

  16. A comprehensive system for non-intrusive load monitoring and diagnostics

    E-Print Network [OSTI]

    Paris, James, Ph. D. Massachusetts Institute of Technology

    2013-01-01T23:59:59.000Z

    Energy monitoring and smart grid applications have rapidly developed into a multi-billion dollar market. The continued growth and utility of monitoring technologies is predicated upon the ability to economically extract ...

  17. Using the non-intrusive load monitor for shipboard supervisory control

    E-Print Network [OSTI]

    Bennett, Patrick Lawrence

    2007-01-01T23:59:59.000Z

    Field studies have demonstrated that it is possible to evaluate the state of many shipboard systems by analyzing the power drawn by electromechanical actuators [1], [2], [3], [4], [5]. One device that can perform such an ...

  18. Intrusive Projection Methods with Upwinding for Uncertain Nonlinear Hyperbolic Systems6

    E-Print Network [OSTI]

    . Tryoen), olm@limsi.fr (O. Le Ma^itre), michael.ndjinga@cea.fr (M. Ndjinga), ern@cermics.enpc.fr (A. Ern

  19. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless

    E-Print Network [OSTI]

    Chen, Ing-Ray

    the tradeoff between energy consumption vs. the gain in reliability, timeliness, and security to maximize to prolong the system useful lifetime. The tradeoff between energy consumption vs. reliability gain-mail: {hhamadi, irchen}@vt.edu). (CHs) and sensor nodes (SNs) leveraging CH election protocols such as HEED [1

  20. Modeling and simulation of intrusion detection system in mobile ad-hoc networks.

    E-Print Network [OSTI]

    Jarmal, Piotr

    2008-01-01T23:59:59.000Z

    ??The thesis investigates the process of modeling and simulation of the mobile ad-hoc networks. It provides a overview of the actual state of art together… (more)

  1. Policy-controlled Event Management for Distributed Intrusion Detection Christian Kreibich

    E-Print Network [OSTI]

    Hand, Steven

    - sic building blocks for the formulation of a site's security policy since its conception. A recent

  2. Foundations for Intrusion Prevention Shai Rubin, Ian D. Alderman, David W. Parter, and Mary K. Vernon

    E-Print Network [OSTI]

    Vernon, Mary K.

    the vulnerability on every system host, estimates the vulnerability threat with respect to the site security develop a site­customizable threat analyzer that ranks vulnerabilities according to the site security pref

  3. Foundations for Intrusion Prevention Shai Rubin, Ian D. Alderman, David W. Parter, and Mary K. Vernon

    E-Print Network [OSTI]

    Liblit, Ben

    the vulnerability on every system host, estimates the vulnerability threat with respect to the site security develop a site-customizable threat analyzer that ranks vulnerabilities according to the site security

  4. Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    facilities such as water distribution infrastructures, electricity generation plants and oil refineries need industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs industry and government, leading to several efforts to increase secu- rity in these industrial networks

  5. Fault Detection and Diagnostics for Non-Intrusive Monitoring Using Motor Harmonics

    E-Print Network [OSTI]

    Orji, Uzoma A.

    Harmonic analysis of motor current has been used to track the speed of motors for sensorless control. Algorithms exist that track the speed of a motor given a dedicated stator current measurement, for example. Harmonic ...

  6. A survey of intrusion detection in wireless network applications Robert Mitchell, Ing-Ray Chen

    E-Print Network [OSTI]

    Chen, Ing-Ray

    tool that can defend against the real-world cyber attacks threatening critical systems. These attacks include the Stuxnet attack on Iranian engineering facilities [1,2], proof of concept attacks on insulin pumps [3] and cardiac devices [4], the DoS attack on a German power grid opera- tor [5

  7. SMIT: Uma Arquitetura Tolerante a Intrus~oes Baseada em Virtualizac~ao

    E-Print Network [OSTI]

    Correia, Miguel

    . Sistemas financeiros, de controle de gerac¸~ao e distribuic¸~ao de energia, de controle de dispositivos a necessidade de, no m´inimo, 3f + 1 r´eplicas para tolerar faltas bizantinas [Lamport et al. 1982

  8. Modelling of Seawater Intrusion in Coastal Area of North Goa C. P. Kumar*

    E-Print Network [OSTI]

    Kumar, C.P.

    ) Introduction India has been blessed with a vast stretch of coastline. Many urban centres of the country. National Water Policy ­ 2002 also stresses that "Over exploitation of ground water should be avoided river and Nerul creek (around 74 km2 ) and covered by Survey of India toposheets number 48E/10, 48E/14

  9. Learning Cost-Sensitve Classification Rules for Network Intrusion Detection using RIPPER

    E-Print Network [OSTI]

    Yang, Junfeng

    to the information gain function is as follows: (2^Gain - 1) / (Cost(A)) + 1)^w. Here, a cost-sensitivity constant (w

  10. Non-Intrusive Occupancy Monitoring using Smart Meters Dong Chen, Sean Barker, Adarsh Subbaswamy

    E-Print Network [OSTI]

    Shenoy, Prashant

    Based on recent estimates, commercial and residential buildings continue to account for 75% of the electricity usage in the United States [23], with residential buildings alone accounting for nearly 45%.1 As a result, improving building energy-efficiency is becom- ing an increasingly important research area. One

  11. Thermal Constraints on the Emplacement Rate of a Large Intrusive Complex: The Manaslu Leucogranite, Nepal

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , Nepal Himalaya. C. ANNEN1*, B. SCAILLET2 AND R. S. J. SPARKS3 1 SECTION DES SCIENCES DE LA TERRE The emplacement of the Manaslu leucogranite body (Nepal, Himalaya) has been modelled as the accretion

  12. Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems

    E-Print Network [OSTI]

    Parvania, Masood; Koutsandria, Georgia; Muthukumar, Vishak; Peisert, Sean; McParland, Chuck; Scaglione, Anna

    2014-01-01T23:59:59.000Z

    Security protocols against cyber attacks in the distributioncyber security weak- ness and system fragility of power distribution

  13. An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    University of California, Santa Barbara {vigna,sumitg,kavitha,ebelding,kemm}@cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy the stream of audit data to identify evidence of the occurrence of the modeled attacks. Misuse and anomaly

  14. An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks

    E-Print Network [OSTI]

    Belding-Royer, Elizabeth M.

    University of California, Santa Barbara vigna,sumitg,kavitha,ebelding,kemm¡ @cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy "signatures") that are matched against the stream of audit data to identify evidence of the oc- currence

  15. Study of Kinematics of Extreme Waves Impacting Offshore and Coastal Structures by Non Intrusive Measurement Techniques

    E-Print Network [OSTI]

    Song, Youn Kyung

    2013-11-07T23:59:59.000Z

    from G3 appears to induce a large inundation depth in the flow along the opening. Next, green water velocities and dynamic impacts of the extreme ocean waves on a fixed offshore deck structure are investigated. The experiments focused on the impacting...

  16. E-Print Network 3.0 - active non-intrusive inspection Sample...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of the main activities that take place... ... Source: Texas A&M University, Texas Transportation Institute Collection: Engineering 17 Technical Report Documentation Page 1. Report...

  17. The design of an intrusion security system using digital processing for alarm indication

    E-Print Network [OSTI]

    Holyoak, Joel Nelson

    2012-06-07T23:59:59.000Z

    has been noise spikes in the diode. These spikes can easily cause a false alarm which is difficult to trace since it results from a sporadic, elec- tronic malfunction. General Electric, Amperex, and other concerned companies have made a great... is the requirement of multiple triggering of this one threshold. AMF Inc. , Alexandria, Virginia, has recently introduced an intricate signal processor with diode transistor logic and transistor transistor logic integrated circuits to handle intru- sion signals...

  18. Intrusion of radioactive industrially polluted water from North Sea into central Baltic Sea

    SciTech Connect (OSTI)

    Vakulovskiy, S.M.; Nikitin, A.I.

    1985-02-01T23:59:59.000Z

    The problem of penetration of radioactive industrially polluted water into the central Baltic Sea was studied. The content of Cs-134 as determined in water near the bottom of deep water trenches along the path traveled by North Sea water entering the Baltic. Samples were taken at 5 locations, with Cs-134 concentrated from samples of several thousands of liters. It was found that radioactive pollution caused by the entry of water from the North Sea extends through the system of deep water depressions into the Baltic as far as the Gotland trench. The greatest degree of contamination is found in the Arkona depression adjacent to the straits. The concentration of Cs-134 in the Gdansk trench is one-half as great and in the Gotland trench one-third as great as in the Arkona depression. Radioactive contamination in the Baltic is attributed to discharge of radioactive wastes by plants at Windscale.

  19. Oxygen isotopic disequilibrium in plagioclasecorundumhercynite xenoliths from the Voisey's Bay Intrusion, Labrador, Canada

    E-Print Network [OSTI]

    Oxygen isotopic disequilibrium in plagioclase­corundum­hercynite xenoliths from the Voisey's Bay to skeletal. Ion microprobe analyses indicate that oxygen isotopic equilibrium was neither established during corundum is characterized by 18 O values between 2.5 and 7.6. Oxygen isotopic equilibration with mantle

  20. Design and testing of a non-intrusive torque measurement system

    E-Print Network [OSTI]

    Wilson, Edwin Ernest

    1998-01-01T23:59:59.000Z

    rpm conditions. Two sensor types, phototransistor and photodiode, were tested. The photodiode sensor was tested with two emitter types: infrared LED and red laser. No significant difference in response was found using either the LED or red laser...

  1. An Outcrop Example of Large-scale Conglomeratic Intrusions Sourced from

    E-Print Network [OSTI]

    . Cartwright, eds., Sand injectites: Implications for hydrocarbon exploration and production: AAPG Memoir 87, p, it is probable that the highly energetic process in- volved gas charging of the source body and, potentially remobilization of clastic material through injection processes adds complexity to both facies dis- tribution

  2. Electric load information system based on non-intrusive power monitoring

    E-Print Network [OSTI]

    Lee, Kwangduk Douglas, 1970-

    2003-01-01T23:59:59.000Z

    Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

  3. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94:Service

  4. Non-Intrusive Cognitive Radio Networks based on Smart Antenna Technology

    E-Print Network [OSTI]

    Liu, Xin

    --Cognitive radio has recently been identified as a po- tential relief to spectrum scarcity by improving temporal and applications has made radio spectrum an increasingly scarce commodity. The need for higher spectral efficiency reported [1], [2], a large proportion of the licensed spectrum remain mostly unused or under

  5. Non-intrusive vibration monitoring in US Naval and US Coast Guard ships

    E-Print Network [OSTI]

    Gerhard, Katherine Leigh

    2013-01-01T23:59:59.000Z

    In 2011, the Laboratory for Electromagnetic and Electronic Systems proposed a new type of vibration monitoring system, entitled vibration assessment monitoring point with integrated recovery of energy or VAMPRIE, in their ...

  6. Cybersecurity testing and intrusion detection for cyber-physical power systems.

    E-Print Network [OSTI]

    Pan, Shengyi

    2014-01-01T23:59:59.000Z

    ?? Power systems will increasingly rely on synchrophasor systems for reliable and high-performance wide area monitoring and control (WAMC). Synchrophasor systems greatly use information communication… (more)

  7. Experimental and numerical investigation of saltwater intrusion dynamics in flux-controlled groundwater systems

    E-Print Network [OSTI]

    Clement, Prabhakar

    evidence that cli- mate change could decrease the net freshwater input to groundwater resources [Feseker in Bangladesh, threatening to physically displ

  8. Evaluating impacts of CO2 gas intrusion into a confined sandstone aquifer: Experimental results

    SciTech Connect (OSTI)

    Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

    2014-12-31T23:59:59.000Z

    Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnership Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

  9. Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller

    E-Print Network [OSTI]

    Mueller, Frank

    determined prior to the schedulability analysis. We demonstrate how to provide micro-timings for multiple granularity levels of application code. Through bounds checking of these micro-timings, we develop techniques) to highly critical ones (anti-lock brakes, hydro-electric dam controls and flight control systems

  10. Preservation of exceptional vertebrate assemblages in Middle Permian fluviolacustrine mudstones of Kotel'nich, Russia: stratigraphy, sedimentology,

    E-Print Network [OSTI]

    Benton, Michael

    of Kotel'nich, Russia: stratigraphy, sedimentology, and taphonomy Michael J. Benton a, , Andrew J. Newell b Region 610000, Russia d School of Geography, Earth and Environmental Sciences, University of Plymouth Profsoyuznaya 123, Moscow 117997, Russia a b s t r a c ta r t i c l e i n f o Article history: Received 2 July

  11. An assemblage of fragments : history, revolutionary aesthetics and global capitalism in Vietnamese/American literature, films and visual culture

    E-Print Network [OSTI]

    Võ, Ch'o'ng-?ài H?òng

    2009-01-01T23:59:59.000Z

    York: Phaidon Press, 2008. Heng, Russell H. Of the State,Press and Media in Vietnam. Heng, R. H. Of the State, ForTransforming Society. Russell H. Heng, Of the State, For the

  12. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    1964. Mass transport of sediment in the heads of ScrippsCalifornia: implications for sediment provenance. Thesis (M.1976. The unconsolidated sediment distribution on the San

  13. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    1964. Mass transport of sediment in the heads of ScrippsCalifornia: implications for sediment provenance. Thesis (M.1976. The unconsolidated sediment distribution on the San

  14. Comparison of benthic macroinvertebrate assemblages associated with salt marshes in low and high salinity areas of Galveston Bay

    E-Print Network [OSTI]

    Pool, Suzan Samantha

    1999-01-01T23:59:59.000Z

    Two study areas in Galveston Bay, Texas were chosen to assess the species composition and abundance of benthic macroinvertebrates in salt marshes that are utilized by juvenile brown shrimp. The objectives of the study were to compare the benthic...

  15. Character of the diatom assemblage spanning a depositional transition in the Eastern Equatorial Pacific Ocean at 6.6 Ma

    E-Print Network [OSTI]

    Brookshire, Brian Neville, Jr.

    2005-02-17T23:59:59.000Z

    Approximately 6.6 million years ago in the Eastern Equatorial Pacific a large increase in biogenic mass accumulation rates (MAR?s) occurred. This increased level of biogenic mass accumulation persisted until about 4.4 Ma at which time levels...

  16. Functional structure of ant and termite assemblages in old growth forest, logged forest and oil palm plantation in Malaysian Borneo

    E-Print Network [OSTI]

    Luke, Sarah H.; Fayle, Tom M.; Eggleton, Paul; Turner, Edgar C.; Davies, Richard G.

    2014-07-30T23:59:59.000Z

    in varying stages of decay (e.g. dead wood, leaf litter and soil). They play major roles in processes such as decomposition, and nutrient and carbon cycling (Eggleton et al. 1997; Jones and Eggleton 2000; Donovan et al. 2001). Ants disperse seeds, assist soil... and accidental effects on soil and feedback loops. Appl Soil Ecol 32:153–164. doi:10.1016/j.apsoil.2005. 07.004 Klimes P, Idigel C, Rimandai M et al (2012) Why are there more arboreal ant species in primary than in secondary tropical forests? J Animal Ecol 81...

  17. Patterns of fish assemblage structure and dynamics in waters of the Savannah River Plant. Comprehensive Cooling Water Study final report

    SciTech Connect (OSTI)

    Aho, J.M.; Anderson, C.S.; Floyd, K.B.; Negus, M.T.; Meador, M.R.

    1986-06-01T23:59:59.000Z

    Research conducted as part of the Comprehensive Cooling Water Study (CCWS) has elucidated many factors that are important to fish population and community dynamics in a variety of habitats on the Savannah River Plant (SRP). Information gained from these studies is useful in predicting fish responses to SRP operations. The overall objective of the CCWS was (1) to determine the environmental effects of SRP cooling water withdrawals and discharges and (2) to determine the significance of the cooling water impacts on the environment. The purpose of this study was to: (1) examine the effects of thermal plumes on anadromous and resident fishes, including overwintering effects, in the SRP swamp and associated tributary streams; (2) assess fish spawning and locate nursery grounds on the SRP; (3) examine the level of use of the SRP by spawning fish from the Savannah River, this objective was shared with the Savannah River Laboratory, E.I. du Pont de Nemours and Company; and (4) determine impacts of cooling-water discharges on fish population and community attributes. Five studies were designed to address the above topics. The specific objectives and a summary of the findings of each study are presented.

  18. Reconstructing the Assemblage of Iron Artifacts from the Late Hellenistic Shipwreck at K?z?lburun, Turkey

    E-Print Network [OSTI]

    Rash, Kimberly 1981-

    2012-11-27T23:59:59.000Z

    Artifacts found within the context of a shipwreck offer valuable insight into specific events surrounding a vessel’s journey and also have broader implications regarding the time period of the ship’s sinking. A collection of iron objects, excavated...

  19. Fish Assemblage and Food Web Structure in Whedos (Shallow Floodplain Habitats) of the Oueme River, West Africa

    E-Print Network [OSTI]

    Jackson, Andrew

    2012-10-19T23:59:59.000Z

    In the Oueme River, a lowland river in Benin, Africa, artificial ponds constructed in the floodplain (whedos) are colonized during the high-water period by a presumably random sample of fishes from the river channel. As water slowly recedes from...

  20. Species Assemblage Structure and Ecomorphological Convergence in Perciform Fishes (Cichlidae and Centrarchidae) in Tropical and Temperate Floodplain Rivers

    E-Print Network [OSTI]

    Montana, Carmen 1976-

    2012-08-16T23:59:59.000Z

    Lee, Shuang Liu). My research in Venezuela was carried out thanks to amazing people and lab technician in the Museo de Ciencias Naturales Guanare. I would like to thank the vii valuable help I received in the field from Alexis Medina, Pablo... where they were examined and measured. Voucher specimens were archived in the Museo de Ciencias Naturales at 15 UNELLEZ Guanare, Venezuela, and the Texas Cooperative Wildlife Collection at Texas A&M University, Texas, USA. Morphological traits...

  1. Evaluating Flake Assemblage and Stone Tool Distributions at a Large Western Stemmed Tradition Site Near Yucca Mountain, Nevada

    E-Print Network [OSTI]

    Haynes, Gregory M

    1996-01-01T23:59:59.000Z

    community above 1,200 m. (Beatley 1976). Temperatures fluc-in Anthrofwlogy No. 4. Beatley, Janice 1976 Vascular Plants

  2. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    high societal impacts (Beatley et al. 2002). Slope failuresof Civil Engineers, New York Beatley T, Brower D, Schwab A (

  3. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    high societal impacts (Beatley et al. 2002). Slope failuresof Civil Engineers, New York Beatley T, Brower D, Schwab A (

  4. An assemblage of fragments : history, revolutionary aesthetics and global capitalism in Vietnamese/American literature, films and visual culture

    E-Print Network [OSTI]

    Võ, Ch'o'ng-?ài H?òng

    2009-01-01T23:59:59.000Z

    Films in the late 1980s and 1990s were created in the context of the failure of agricultural andagricultural work. In the last sequence of shots, the film

  5. A study of saturated granular assemblages and its implications for transport, stress propagation and failure in marine sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    Henry, M.J. , 1976. The unconsolidated sediment distributionWaggoner, J.A. , 1979. Unconsolidated shelf sediments in theconsiders the behavior of unconsolidated sediments below the

  6. A Study of Saturated Granular Assemblages and its Implications for Transport, Stress Propagation and Failure in Marine Sediments

    E-Print Network [OSTI]

    Le Dantec, Nicolas

    2009-01-01T23:59:59.000Z

    Henry, M.J. , 1976. The unconsolidated sediment distributionWaggoner, J.A. , 1979. Unconsolidated shelf sediments in theconsiders the behavior of unconsolidated sediments below the

  7. Reduction Assemblage Models in the Interpretation of Lithic Technology at the Tosawihi Quarries, North-Central Nevada

    E-Print Network [OSTI]

    Bloomer, William W.

    1991-01-01T23:59:59.000Z

    Technology at the Tosawihi Quarries, North-Central Nevada Wfrom the Tosawihi Chert Quarries illustrate how rep-data. The Tosawihi quarries are a source of white chert (

  8. Revisiting Copano Bay, Texas: an exceptional long-term record of ecological communities and their associated death assemblages

    E-Print Network [OSTI]

    Ebnother, Danielle Dawn

    2006-10-30T23:59:59.000Z

    metrics for the 2004-2005 and 1981-1982 datasets for genera (A) and species (B)........................................ 34 x LIST OF FIGURES FIGURE Page 1 Location map... Calnan (1980) and the 2004-2005 dataset (total inertia =2.60; percents reflect fraction of total inertia) and (B) Circles mark the 2004-2005 sites related to Calnan?s (1980) sites...

  9. Patterns in Functional Structure and Diversity of Stream Fish Assemblages Related to Environmental Factors at Multiple Scales

    E-Print Network [OSTI]

    Pease, Allison Ann

    2011-02-22T23:59:59.000Z

    , Rob Powell, Kevin Baker, Ada Szczepaniec, Sunny Scobell, and Machteld Verzijden. My research in Mexico was carried out thanks largely to my amazing colleagues at El Colegio de la Frontera Sur in Villahermosa, Tabasco and San Crist?bal de las Casas..., Chiapas. Dr. Manuel Mendoza-Carranza helped me design and carry out field work in Tabasco. Drs. Roc?o Rodiles-Hern?ndez and Alfonso Gonz?les-D?az provided their incredible expertise and field assistance in Chiapas. I would also like to thank...

  10. Parental responses of hispid cotton rats (Sigmodon hispidus) to intrusion by red imported fire ants (Solenopsis invicta) into simulated nests

    E-Print Network [OSTI]

    Ferris, Kathleen Patricia

    1994-01-01T23:59:59.000Z

    postedp' A t (S~lo sbl lets) t Sl RRdN ts. (A g a(994) Kathleen Patricia Ferris, B. S. , Armstrong State College Chair of Advisory Committee: Dr. William E. Grant Mate al dpat a)bah I fMpld tt ts(SSi od ~li ld ) ee observed in simulated nests at 24, 72... Activit Levels. Fire ant activity levels are highly variable in response to temperature, humidity and season. Phillips and Cokendolpher (1988) found that fire ant foraging most often occurs between 20n and 32 C. In this study, all experiments were...

  11. Intrusion Tolerance 18 PublishedbytheieeeComPutersoCiety1540-7993/08/$25.002008ieeeieeeseCurity&PrivaCy

    E-Print Network [OSTI]

    Neves, Nuno

    - structures such as power, water, gas, oil, and trans- portation. Therefore, the threat is no longer against

  12. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2012 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; McDonald, Benjamin S.; Robinson, Sean M.; Gilbert, Andrew J.; White, Timothy A.; Pitts, W. Karl; Misner, Alex C.; Seifert, Allen

    2012-11-01T23:59:59.000Z

    Progress in the second year of this project is described by the series of technical reports and manuscripts that make up the content of this report. These documents summarize successes in our goals to develop our robust image-hash templating and material-discrimination techniques and apply them to test image data.

  13. The role of the Ord Arid Intrusion in the historical and contemporary genetic division of long-tailed finch

    E-Print Network [OSTI]

    -tailed finch subspecies in northern Australia Lee Ann Rollins, Nina Svedin, Sarah R. Pryke & Simon C. Griffith, and a Postdoctoral Fellowship to Nina Svedin from the Research Council FORMAS. Received: 15 January 2012; Revised: 15

  14. Boiling heat transfer in a vertical microchannel: Local estimation during flow boiling with a non intrusive method

    E-Print Network [OSTI]

    Boiling heat transfer in a vertical microchannel: Local estimation during flow boiling with a non the results of experimental and numerical studies concerning boiling heat transfer inside vertical in minichannels for several gravity levels (µg, 1g, 2g). To fully understand the high heat transfer potential

  15. The origin and evolution of granites: an in-situ study of zircons from Scottish Caledonian intrusions 

    E-Print Network [OSTI]

    Appleby, Sarah Kristina

    2008-01-01T23:59:59.000Z

    Granitic magmatism in collision belts is widely regarded as a major mechanism for generating continental crust. This hypothesis can be tested by identifying the source rocks of granitic magmas, and in particular the ...

  16. Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis

    E-Print Network [OSTI]

    Luo, Dong, 1966-

    2001-01-01T23:59:59.000Z

    Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

  17. Non-Intrusive Load Identification for Smart Outlets Sean Barker, Mohamed Musthag, David Irwin, and Prashant Shenoy

    E-Print Network [OSTI]

    Shenoy, Prashant

    @ecs.umass.edu Abstract--An increasing interest in energy-efficiency com- bined with the decreasing cost of embedded recent advances in energy-efficiency, residential and commercial buildings continue to be responsible improvements in building energy-efficiency, if implemented across many buildings, have the potential

  18. Parental magma of the Skaergaard intrusion: constraints from melt inclusions in primitive troctolite blocks and FG-1 dykes

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Yb and \\20% for Er. Rare earth element compositions of theTable 2 Major- and rare earth elements concentrations in FG-the middle- to heavy-rare earth elements, expressed by Dy/Yb

  19. Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development

    E-Print Network [OSTI]

    Balakrishnan, Vikram

    2013-01-01T23:59:59.000Z

    including a) LED lamp, b) incandescent lamp, c) Macbook Pro,W) a LED Lamp 15W b Incandescent Lamp 25W c Macbook 200W dLED lamp (LED) from the incandescent lamp (Lamp) and the Fan

  20. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 4th Keystroke Biometric Intrusion Detection

    E-Print Network [OSTI]

    Tappert, Charles

    user has entered a specific set of data. Keylogging collects specific data about the input and method

  1. Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development

    E-Print Network [OSTI]

    Balakrishnan, Vikram

    2013-01-01T23:59:59.000Z

    in and notifies the smart meter, via wireless connection orcosts. Back to our smart meters, it is easy to see howdevelopment. Modern smart meters already incorporate FPGAs

  2. Non-Intrusive Experiemental Investigation of Multi-Scale Flow Behavior in Rod Bundle with Spacer-Grids

    E-Print Network [OSTI]

    Dominguez Ontiveros, Elvis Efren

    2011-08-08T23:59:59.000Z

    5 x 5 rod bundle with spacer-grids. Measurements were performed using two different grid designs. One typical of Boiling Water Reactors (BWR) with swirl type mixing vanes and the other typical of Pressurized Water Reactors (PWR) with split type...

  3. Power Capture (PowCap) Board for Non Intrusive Load Monitoring and Power Line Communication Exploration and Development

    E-Print Network [OSTI]

    Balakrishnan, Vikram

    2013-01-01T23:59:59.000Z

    PowCap with PLC: Lookingti] “Power Line Communication (PLC) Solutions. ” http://overview.page? DCMP=plc&HQS=plc. [Tsu99] K. Tsuda. “Subspace

  4. Single-cell genomics reveal metabolic strategies for microbial growth and survival in an oligotrophic aquifer

    SciTech Connect (OSTI)

    Wilkins, Michael J.; Kennedy, David W.; Castelle, Cindy; Field, Erin; Stepanauskas, Ramunas; Fredrickson, Jim K.; Konopka, Allan

    2014-02-01T23:59:59.000Z

    Bacteria from the genus Pedobacter are a major component of microbial assemblages at Hanford Site and have been shown to significantly change in abundance in response to the subsurface intrusion of Columbia River water. Here we employed single cell genomics techniques to shed light on the physiological niche of these microorganisms. Analysis of four Pedobacter single amplified genomes (SAGs) from Hanford Site sediments revealed a chemoheterotrophic lifestyle, with the potential to exist under both aerobic and microaerophilic conditions via expression of both aa3­?type and cbb3-type cytochrome c oxidases. These SAGs encoded a wide-range of both intra-and extra­-cellular carbohydrate-active enzymes, potentially enabling the degradation of recalcitrant substrates such as xylan and chitin, and the utilization of more labile sugars such as mannose and fucose. Coupled to these enzymes, a diversity of transporters and sugar-binding molecules were involved in the uptake of carbon from the extracellular local environment. The SAGs were enriched in TonB-dependent receptors (TBDRs), which play a key role in uptake of substrates resulting from degradation of recalcitrant carbon. CRISPR-Cas mechanisms for resisting viral infections were identified in all SAGs. These data demonstrate the potential mechanisms utilized for persistence by heterotrophic microorganisms in a carbon-limited aquifer, and hint at potential linkages between observed Pedobacter abundance shifts within the 300 Area subsurface and biogeochemical shifts associated with Columbia River water intrusion.

  5. The influence of physicochemical factors and wind-induced resuspension on microalgal and zooplankton community assemblages in a shallow coastal embayment, South Bay, TX, USA

    E-Print Network [OSTI]

    Stone, Jennifer Sue

    2006-08-16T23:59:59.000Z

    , such as predation, on the plankton communities in South Bay, Texas. Microalgal photopigments were ascertained by high-performance liquid chromatography (HPLC) to determine the relative abundances of major algal classes. Zooplankters were identified to the lowest...

  6. Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils

    E-Print Network [OSTI]

    Blazewicz, Steven Joseph

    2012-01-01T23:59:59.000Z

    JT (2011). Validation of heavy-water stable isotope probingdeveloped application of heavy water (H 218 O) in SIPSchwartz et al 2007). In heavy water SIP experiments, H 218

  7. Explorations in additive, associative design : an assemblage of collective use of forms for part of the M.I.T. West Campus

    E-Print Network [OSTI]

    Fung, Vivian

    1985-01-01T23:59:59.000Z

    My thesis is an attempt at synthesizing a series of observations of built and unbuilt environments which exemplify the elusive physical qualities of harmonic diversity - unity with variety. This synthesis will be the basis ...

  8. The artifact assemblage from the Pepper Wreck: an early seventeenth century Portuguese East-Indiaman that wrecked in the Tagus River

    E-Print Network [OSTI]

    Brigadier, Sara R

    2002-01-01T23:59:59.000Z

    some of the ship's navigational instruments, Asian trade goods such as pepper and porcelain dishes, and personal items. Other materials recovered include everything from modern signage and trash to hundreds of ceramic sherds and balls of lead shot...

  9. Scripta Fac. Sci. Nat. Univ. Masaryk. Brun., Volume 36, Geology. Brno, 2007. 57 The Early Miocene micromammalian assemblage from Mokr 1/2001 Turtle

    E-Print Network [OSTI]

    Horacek, Ivan

    and in deposits of the main brown coal seam (Merkur-North) or in the limestone quarry and erosive relicts of hot

  10. NUMERICAL MODELING OF THE DISRUPTION OF COMET D/1993 F2 SHOEMAKER-LEVY 9 REPRESENTING THE PROGENITOR BY A GRAVITATIONALLY BOUND ASSEMBLAGE OF RANDOMLY SHAPED POLYHEDRA

    SciTech Connect (OSTI)

    Movshovitz, Naor; Asphaug, Erik; Korycansky, Donald, E-mail: nmovshov@ucsc.edu [Department of Earth and Planetary Sciences, University of California, Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States)

    2012-11-10T23:59:59.000Z

    We advance the modeling of rubble-pile solid bodies by re-examining the tidal breakup of comet Shoemaker-Levy 9, an event that occurred during a 1.33 R encounter with Jupiter in 1992 July. Tidal disruption of the comet nucleus led to a chain of sub-nuclei {approx}100-1000 m diameter; these went on to collide with the planet two years later. They were intensively studied prior to and during the collisions, making SL9 the best natural benchmark for physical models of small-body disruption. For the first time in the study of this event, we use numerical codes treating rubble piles as collections of polyhedra. This introduces forces of dilatation and friction, and inelastic response. As in our previous studies we conclude that the progenitor must have been a rubble pile, and we obtain approximately the same pre-breakup diameter ({approx}1.5 km) in our best fits to the data. We find that the inclusion of realistic fragment shapes leads to grain locking and dilatancy, so that even in the absence of friction or other dissipation we find that disruption is overall more difficult than in our spheres-based simulations. We constrain the comet's bulk density at {rho}{sub bulk} {approx} 300-400 kg m{sup -3}, half that of our spheres-based predictions and consistent with recent estimates derived from spacecraft observations.

  11. The observation of the morphology of the fibrous molecular assem-blages and the NiP microtubes was carried out using a Hitachi S-

    E-Print Network [OSTI]

    Sottos, Nancy R.

    ] S. E. Frazier, J. A. Bedford, J. Hower, M. E. Kenney, Inorg. Chem. 1967, 6, 1693. [2] C. R. Martin

  12. Paleomycology of the Princeton Chert II. Dark-septate fungi in the aquatic angiosperm Eorhiza arnoldii indicate a diverse assemblage of root-colonizing fungi during the Eocene

    E-Print Network [OSTI]

    Klymiuk, Ashley A.; Taylor, Thomas N.; Taylor, Edith L.; Krings, Michael

    2013-09-01T23:59:59.000Z

    -8137.2010.03611.x O’Keefe JM, Hower JC, Finkelman RF, Drew JW, Stucker JD. 2011. Petrographic, geochemical and mycological aspects of Miocene coals from the Nova´ky and Handlova´ mining districts, Slovakia. Int J Coal Geol 87:268–281, doi:10.1016/j.coal.2011...

  13. Major shifts in calcareous phytoplankton assemblages through the Eocene-Oligocene transition of Tanzania and their implications for low-latitude primary production

    E-Print Network [OSTI]

    Jones, Tom Dunkley; Bown, Paul R.; Pearson, Paul N.; Wade, Bridget S.; Coxall, Helen K.; Lear, Caroline H.

    in the deep sea, significant glaciomarine sedimen- tation commences around the margins of both East and West Antarctica indicating the first Cenozoic advance of conti- nental-scale ice sheets in southern high latitudes [Breza and Wise, 1992; Ivany et al., 2006... patterns. In low south- ern latitudes the present-day western boundary of the Indian Ocean is dominated by the northward flowing East African Coastal Current (EACC), which is sourced from the west- ward flowing South Equatorial Current (SEC) [Swallow et al...

  14. Beaver Dams Maintain Native Fish Biodiversity Via Altered Habitat Heterogeneity in a Coastal Stream Network: Evaluating Gear, Quantifying Fish Assemblages, and Testing Ecological Hypotheses.

    E-Print Network [OSTI]

    Smith, Joseph Michael

    2012-01-01T23:59:59.000Z

    ??Understanding the relationship between heterogeneity, biodiversity and ecosystem function is an active focus of ecological research that has direct applications to the formulation of sustainable,… (more)

  15. Microbial Activity, Growth, and Mortality in Environmental Assemblages: Population and Community Response to Rewetting of a Dry Mediterranean Soil and Anaerobic Methane Cycling in Tropical and Boreal Soils

    E-Print Network [OSTI]

    Blazewicz, Steven Joseph

    2012-01-01T23:59:59.000Z

    in Gulf of Mexico gas hydrates: comparative analysis of DNA-Sediment from a marine gas hydrate area coupled AOM tothat were also from gas hydrate areas, but lower rates (

  16. Reconstructing the Habitat Mosaic of Australopithecus robustus: Evidence from Quantitative Morphological Analysis of Bovid Teeth

    E-Print Network [OSTI]

    Brophy, Juliet

    2012-02-14T23:59:59.000Z

    . The fossil bovids abundances were compared across the assemblages over time in order to define the environmental mosaic in each assemblage and to determine if environmental heterogeneity existed across the assemblages. The relative abundances of the bovid...

  17. Physical models of magmatic intrusion during thrusting Olivier Galland, Jean de Bremond d'Ars, Peter R. Cobbold and Erwan Hallot

    E-Print Network [OSTI]

    Galland, Olivier

    of the experi- ments quoted, fluid viscosity was too large for hydraulic fracturing to occur. By contrast, the viscosity of our model material was low enough to permit hydraulic fracturing. During hydraulic fracturing, which form perpen- dicularly to the direction of least principal stress. Hydraulic fracturing

  18. Non-intrusive measurement of particle charge: Electrostatic dry coal cleaning. Technical progress report No. 8, April 1, 1993--June 30, 1993

    SciTech Connect (OSTI)

    Not Available

    1993-09-01T23:59:59.000Z

    As we reported in the Technical Progress Report No. 7, there are surges of electric current in the charging loop during triboelectrification of all particles. A high speed data acquisition and analysis system was developed to monitor and record the current pattern. There is no known report on such charge-discharge surges in the literature. The mechanism for it is yet to be understood. The on-line computerized electric current measurement also leads to an observation of charging effects as a function of particle feeding rate. It is shown that feed rate greatly alters particle charge. Such an effect is mostly overlooked by researchers and it could have a important role in process design where the feed rate would be maximized. The initial results for coal and mineral particles demonstrated that the average charge was lower when the feed rate was increased. Further investigation is scheduled to identify potential controlling factors, eg, the solid volume fraction and particle number density could be important process factors. The study of charging velocity and particle size was continued. It was found that particle charge was linearly dependent on the charging velocity for all samples investigated. However, the slope of this linear dependence varied for particles having different diameters. In addition, the charge-velocity relationships were dependent on feeding rates. Hence, the data discussed below include these interrelationships.

  19. Mechanical design of PlayLamp : a minimally intrusive device for recording the behavior of children at-risk of developmental disorders

    E-Print Network [OSTI]

    Steger, Stephen Andrew

    2008-01-01T23:59:59.000Z

    This thesis paper documents the design process, decisions, and outcomes of the design of the physical form factor of PlayLamp, a device for video and audio recording the development of children at-risk of having developmental ...

  20. Non-intrusive measurement of particle charge: Electrostatic dry coal cleaning. Technical progress report No. 11, January 1, 1994--March 31, 1994

    SciTech Connect (OSTI)

    Not Available

    1994-06-01T23:59:59.000Z

    As has been previously reported, the charge measurement portion of this project has been broadened to include direct measurement techniques which yield an average particle charge per unit mass. These methods, which now include current measurements from the charging loop, an electrolytic collection solution and a Faraday cage have been employed to expand the charge measurement capabilities over those that were originally developed using the PDPA. The effects of gas velocity, humidity and temperature as well as particle size on charge was evaluated for different coals and silica. The charge accumulated on silica particles was linearly dependent on their velocity in the tribocharger for the velocities and mass loadings which were investigated. For coals, a linear increase in charge occurred over a more limited velocity range. Transport gas humidity had a much stronger effect on the charge established on silica particles than on coal particles.

  1. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    B.L. Phillips, and J.B. Parise (2007), The structure ofD.R. Strongin, and J.B. Parise (2007), Similarities in 2-

  2. Technical Advice and Support for the Joint Integrated Non-Intrusive Inspection (JINII) Program Task 2.2 Transmission Digital Radiography (DR)

    SciTech Connect (OSTI)

    Martz, H; Chinn, D; Pincus, C

    2011-03-03T23:59:59.000Z

    The Cargo Advanced Automated Radiography System (CAARS) program aims to utilize advanced radiographic systems to detect radiological and nuclear threats. Validation of initial design and testing concepts is a precondition for prototype system development and large-scale deployment. As expected, Depleted Uranium (DU) is a valid surrogate for Special Nuclear Materials (SNM) in CAARS Advanced Technology Demonstration (ATD) performance field-tests of transmission radiography systems. Dual-energy transmission measurements of DU are nearly identical to SNM, and are distinct from lower Z materials, provided the samples are matched to equal areal density. Results from an alternative method, using samples of equal thickness, showed sample discrimination by material density, rather than by atomic number (Z). The transmission measurements of DU and SNM were made with equipment that is nearly identical to current field systems. X-ray source beams at endpoint energies of 5.4 MeV and 9.6 MeV were used to measure transmission through the selected sample materials. The ratio of the x-ray linear attenuation coefficient times length ({micro}L) at 5.4 MeV, to {micro}L at 9.6 MeV is a metric for atomic number based discrimination of materials. The measured ratios were compared with computed values based on LLNL photon cross section data and LLNL developed models of x-ray detector characteristics. Measured ratios for DU differed from HEU by an average of 0.25%, and from WGPu by 0.08%, which is within the noise level of 0.4 to 0.5%. For comparison, measured ratios for Sn differed from HEU by 3.2%, and from WGPu by 3.6%, well beyond the measurement noise. Measured ratios for W differed from HEU by 0.01%, and from WGPu by 0.32%. The measured ratio values presented in Table 1 demonstrate the feasibility of using a threshold ratio to discriminate low-Z (Z < 72) from high-Z (Z {ge} 72) materials (as defined by CAARS specification). In the case of our test system, a threshold ratio of 1.08 would be suitable based on the measured results.

  3. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    ICP-MS Hg LBNL NAA NASCENT NURE MCL MSW NGS NWIS Pb Sb SDWRAbundance ICP Part. AA NAA NURE ICP See notes See Notes HostNeutron activation analysis NURE: National Uranium Resource

  4. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    ENvironmenT National Uranium Resource Evaluation MaximumNURE: National Uranium Resource Evaluation, a program

  5. Long-term changes in quiescent degassing at Mount Baker Volcano, Washington, USA; Evidence for a stalled intrusion in 1975 and connection to a deep magma source

    E-Print Network [OSTI]

    2009 Available online 28 July 2009 Keywords: Mount Baker gas emission chemistry fumarole hydrothermal and carbon dioxide output was observed both in emission rates and in fumarole samples. Emission rates of CO2 and decreases in the CO2/CH4 ratio since 1975 suggest a long steady trend back toward a more hydrothermal gas

  6. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    Changes in Response to CO2 Leakage from Deep Geologicalstudy mineral trapping for CO2 disposal in deep arenaceousconstituents as function of P(CO2)? function of P(CO2)? – –

  7. Int. J. Engg, Sc. & Mgmt. / Vol. II / Issue II / Jul-Dec 2012 ISSN: 2231-3273 A HYBRID APPROACH TOWARDS INTRUSION DETECTION

    E-Print Network [OSTI]

    Sanyal, Sugata

    the network or the distributed computing infrastructure from malicious attacks like DDoS attack, key-logging

  8. Reducing booster-pump-induced contaminant intrusion in Indian water systems with a self-actuated, back-pressure regulating valve

    E-Print Network [OSTI]

    Taylor, David Donald James

    2014-01-01T23:59:59.000Z

    Intermittently-operated water systems struggle to equitably and effectively distribute clean water to customers. One common customer response to intermittency is to supplement the water system's pressure by using a household, ...

  9. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    70 (June 2000), 235–238. Hower, J.C. and J. D. Robertson (concentration in the coal (Hower and Robertson, 2003).

  10. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect (OSTI)

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02T23:59:59.000Z

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  11. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    E-Print Network [OSTI]

    Birkholzer, Jens

    2008-01-01T23:59:59.000Z

    N s sj s c j = 1N C (F18) where superscript 0 representsBy substituting Equations (F18) and (F19) into Equation (

  12. E-Print Network 3.0 - architecture seed development Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mixture and management on beetle assemblages of arable field margins Summary: Effects of seed mixture and management on beetle assemblages of arable field margins Ben A... Beetle...

  13. ER-12-1 completion report

    SciTech Connect (OSTI)

    Russell, C.E.; Gillespie, D.; Cole, J.C.; Drellack, S.L. [and others

    1996-12-01T23:59:59.000Z

    The objective of drillhole ER-12-1 was to determine the hydrogeology of paleozoic carbonate rocks and of the Eleana Formation, a regional aquitard, in an area potentially downgradient from underground nuclear testing conducted in nearby Rainier Mesa. This objective was addressed through the drilling of well ER-12-1 at N886,640.26 E640,538.85 Nevada Central Coordinates. Drilling of the 1094 m (3588 ft) well began on July 19, 1991 and was completed on October 17, 1991. Drilling problems included hole deviation and hole instability that prevented the timely completion of this borehole. Drilling methods used include rotary tri-cone and rotary hammer drilling with conventional and reverse circulation using air/water, air/foam (Davis mix), and bentonite mud. Geologic cuttings and geophysical logs were obtained from the well. The rocks penetrated by the ER-12-1 drillhole are a complex assemblage of Silurian, Devonian, and Mississippian sedimentary rocks that are bounded by numerous faults that show substantial stratigraphic offset. The final 7.3 m (24 ft) of this hole penetrated an unusual intrusive rock of Cretaceous age. The geology of this borehole was substantially different from that expected, with the Tongue Wash Fault encountered at a much shallower depth, paleozoic rocks shuffled out of stratigraphic sequence, and the presence of an altered biotite-rich microporphyritic igneous rock at the bottom of the borehole. Conodont CAI analyses and rock pyrolysis analyses indicate that the carbonate rocks in ER-12-1, as well as the intervening sheets of Eleana siltstone, have been thermally overprinted following movement on the faults that separate them. The probable source of heat for this thermal disturbance is the microporphyritic intrusion encountered at the bottom of the hole, and its age establishes that the major fault activity must have occurred prior to 102.3+0.5 Ma (middle Cretaceous).

  14. Spatial and temporal dynamics of the microbial community in the Hanford unconfined aquifer

    SciTech Connect (OSTI)

    Lin, Xueju; McKinley, James P.; Resch, Charles T.; Kaluzny, Rachael M.; Lauber, C.; Fredrickson, Jim K.; Knight, Robbie C.; Konopka, Allan

    2012-03-29T23:59:59.000Z

    Pyrosequencing analysis of 16S rRNA genes was used to study temporal dynamics of groundwater Bacteria and Archaea over 10 months within 3 well clusters separated by ~30 m and located 250 m from the Columbia River on the Hanford Site, WA. Each cluster contained 3 wells screened at different depths ranging from 10 to 17 m that differed in hydraulic conductivities. Representative samples were selected for analyses of prokaryotic 16S and eukaryotic 18S rRNA gene copy numbers. Temporal changes in community composition occurred in all 9 wells over the 10 month sampling period. However, there were particularly strong effects near the top of the water table when the seasonal rise in the Columbia River caused river water intrusion at the top of the aquifer. The occurrence and disappearance of some microbial assemblages (such as Actinobacteria ACK-M1) were correlated to river water intrusion. This seasonal impact on microbial community structure was greater in the shallow saturated zone than deeper in the aquifer. Spatial and temporal patterns for several 16S rRNA gene operational taxonomic units associated with particular physiological functions (e.g.methane oxidizers and metal reducers) suggests dynamic changes in fluxes of electron donors and acceptors over an annual cycle. In addition, temporal dynamics in eukaryotic 18S rRNA gene copies and the dominance of protozoa in 18S clone libraries suggest that bacterial community dynamics could be affected not only by the physical and chemical environment, but also by top-down biological control.

  15. A supermatrix analysis of genomic, morphological, and paleontological data from crown Cetacea

    E-Print Network [OSTI]

    Geisler, Jonathan H; McGowen, Michael R; Yang, Guang; Gatesy, John

    2011-01-01T23:59:59.000Z

    Cetaeea, Mammalia) from Patagonia, southern Argentina. Ammolluscan assemblages of eastern Patagonia (Argentina): a

  16. Pollinator diversity and crop pollination services are at risk

    E-Print Network [OSTI]

    Cruzan, Mitchell B.

    assemblages. Furthermore, self- compatible plants, as well as self-incompatible plants, can profit from insect

  17. Enabling Trusted Software Integrity Darko Kirovski

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    this problem from two perspectives: · Intrusion detection ­ a set of mechanisms that aim at scanning system address this problem by trying to de- tect the intrusion at run-time or by formally verifying aim at intrusion prevention as the core technology for enabling secure computing systems. Intrusion

  18. A model of forensic analysis using goal-oriented logging

    E-Print Network [OSTI]

    Peisert, Sean Philip

    2007-01-01T23:59:59.000Z

    A Toward Forensic Models . . . . . . . . . . . . . . . .of Forensic Analysis . . . . . . . . . . . . . . . .150 3. Applying Forensic Techniques to Intrusion

  19. Ajaji, T., D. Weis, A. Giret, and M. Bouabdellah, 1998. Coeval potassic and sodic calc-alkaline series in the post-collisional Hercynian Tanncherfi intrusive complex, northeastern Morocco: Geochemical,

    E-Print Network [OSTI]

    Menke, William

    . Vidal, 1992. Petrogenesis of the Hercynian Tichka plutonic complex (Western High Atlas, Morocco): Trace

  20. In this project, we deal with the simulation and the optimisation of flows when uncertainties exist in the models and/or the data. We only consider non intrusive methods so that existing CFD softwares

    E-Print Network [OSTI]

    Abgrall, Rémi

    with the thermodynamical models for dense organic gas flows used in some energy production devices. It is knownSummary In this project, we deal with the simulation and the optimisation of flows when arising from the study of energy generators for renewable sources. The three task will be done in parallel

  1. Archaeological investigations in the Elm Creek Watershed, Runnels County, Texas: sites 41RN61, 41RN64, 41RN65, 41RN72, 41RN74, 41RN76

    E-Print Network [OSTI]

    Sanders, Calvin B

    2012-06-07T23:59:59.000Z

    . Data recovery, based on geomorphic investigations to resolve potential for subsurface cultural deposits, resulted in retrieval of representative samples of lithic assemblages from four sites (41RN61, 41RN64, 41RN65, 41RN74). These lithic assemblages...

  2. Beyond the Edge of a Niche: The Role of Grazing on Prymnesium parvum Bloom Formations in Two Texas Lakes

    E-Print Network [OSTI]

    Davis, Stephen Louis

    2014-03-25T23:59:59.000Z

    . Controls and treatments consisted of P. parvum cultures in log- and stationary-growth phases, natural phytoplankton assemblages, and natural rotifer assemblages from each lake. Monitored parameters included P. parvum population density and population growth...

  3. 1018 BioScience December 2001 / Vol. 51 No. 12 The 21st century is an exciting time for biological

    E-Print Network [OSTI]

    ,and unraveling functional genomics at scales ranging from organisms to community assemblages--to pro- vide just

  4. Objects + Scripts = Applications1 Oscar Nierstrasz

    E-Print Network [OSTI]

    Nierstrasz, Oscar

    as customized assemblages of largely standard parts. Such a sce- nario, however, requires a shift in our

  5. Passive Operating System Identification From TCP/IP Packet Headers* Richard Lippmann, David Fried, Keith Piwowarski, William Streilein

    E-Print Network [OSTI]

    -based intrusion detection systems and maintaining a site security policy. Configuring network-based intrusion useful for maintaining a site security policy. A site policy may specify the types of hosts

  6. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  7. Charles University in Prague Faculty of Science

    E-Print Network [OSTI]

    algal assemblages in peat bogs Kateina Cerná Ph.D. Thesis Prague, May 2010 Supervised by: Dr. Jií ................................................24 Paper 1. Spatial distribution of algal assemblages in a temperate lowland peat bog .............................26 Paper 2. Small-scale spatial variation of benthic algal assemblages in a peat bog

  8. Slide 1

    National Nuclear Security Administration (NNSA)

    obligations ('Managed Access' concept). * Perceived Issues - Degree of intrusiveness - Security and proliferation risks - Managing access - Training staff - Proving robustness...

  9. Biometric Authentication via Keystroke Sound Joseph Roth Xiaoming Liu Arun Ross

    E-Print Network [OSTI]

    Ross, Arun Abraham

    the mouse [16]. Although being non- intrusive, keystroke dynamics utilizes key-logging to record all typed

  10. Use of tritium and helium to define groundwater flow conditions in Everglades National Park

    E-Print Network [OSTI]

    Swart, Peter K.

    and tem- perature as tracers of the seawater intrusion into coastal aquifers [Back et al., 1970; Kohout

  11. E-Print Network 3.0 - alert operation network Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Approach to Intrusion Detection Alert Correlation Summary: correlation, alert reduction, correlation data sets. 1 INTRODUCTION RECENTLY, networks have evolved... by...

  12. E-Print Network 3.0 - altered cellular priorities Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Technologies and Information Sciences 3 Informing Algorithms for Efficient Scheduling of Synchronizing Threads on Multiprogrammed SMPs Summary: -intrusiveness...

  13. Magmatic and tectonic extension at mid-ocean ridges: 1. Controls on fault characteristics

    E-Print Network [OSTI]

    Ito, Garrett

    and the injection of hot magma into the crust. We examine a range of intrusion rates and axial thermal structures@hawaii.edu) [1] We use 2-D numerical models to explore the thermal and mechanical effects of magma intrusion in proportion to the rate of intrusion to simulate the thermal effects of magma crystallization

  14. An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection

    E-Print Network [OSTI]

    -- There is an emerging need for the traffic processing capability of network security mechanisms, such as intrusion-based security systems, like intrusion detection systems (IDS), have not kept pace with the increasing usage that can be attributed to the incapability of current solutions to detect intrusions in high- speed

  15. A Comparison Between Signature and Machine Learning Based Detectors

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    in implementation, their effect on WiFi networks can be devastating. To this end, several Intrusion Detection-Wireless and a genetic programming (GP) based intrusion detector, in the detection of a particular data link layer attack and stealthy manner in order to beat the signatures in the intrusion detection database. Based on the past

  16. Paleoautecology of Caninia torquia (Owen) from the Beil Limestone Member (Pennsylvanian, Virgilian), Kansas

    E-Print Network [OSTI]

    Maerz, R. H., Jr.

    1978-06-14T23:59:59.000Z

    soft mud sub- 3 strate. Baird ( 1971) recognized two coral assemblages, a "Coral-Algal Community Wackestone" on the Nebraska shelf and a "Fusulinid-Coral Assemblage Wackestone" on the Nebraska shelf and in the Forest City basin. In the former... ( 1971) concluded that this assemblage lived in slightly deeper waters than the coral-algal community. Paleoecology of midcontinent Penn.sylva- nian rugose corals.—Most pre-1950 work on Pennsylvanian rugose corals was taxonomic, and later studies included...

  17. Changes in neogene Caribbean benthic community structure after closure of the Central America Seaway

    E-Print Network [OSTI]

    Leonard-Pingel, Jill Suzanne

    2012-01-01T23:59:59.000Z

    and faunal turnover in the Caribbean Neogene. Proceedings oflate Cenozoic turnover of Caribbean reefs. Paleobiology 25:assemblages of Neogene Caribbean Mollusca of lower Central

  18. Paradigm or Paradox: Can we Attribute Species Changes to Global Climate Change in Light of Decreasing Water Temperatures in Central California?

    E-Print Network [OSTI]

    Breaker, Laurence; Cailliet, Gregor; Launer, Andrea; Wadsworth, Tom

    2012-01-01T23:59:59.000Z

    reef- fish assemblages in kelp habitats off Santa Barbara,1985. The ecology of giant kelp habitats in California: asubstrate and extensive kelp forests. Since 1992, NMFS

  19. OVAI Contract Report #2012-43 PHASE II ARCHAEOLOGICAL EVALUATION...

    Broader source: Energy.gov (indexed) [DOE]

    assemblages. Despite the 1950s-era farmstead demolition, which removed the farmstead buildings, the six farmsteads examined in this study are in fairly good archaeological...

  20. E-Print Network 3.0 - armata collembola onychiuridae Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 Changes in species assemblages and diets of Collembola along a gradient of metal pollution Summary: of three Collembola (Family Onychiuridae). Rev. Ecol. Biol. Sol 12,...

  1. arabian gulf higher: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    species assemblage of Phoreiobothrium in C. limbatus in the Gulf of Mexico has the potential to inform us about its population structure of the host.... Owens, Hannah L....

  2. E-Print Network 3.0 - atherinops affinis ayres Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    variation in otolith trace-elemental fingerprints in a temperate estuarine fish assemblage Summary: . The species evaluated comprised a mid-water-dwelling smelt...

  3. E-Print Network 3.0 - astyanax altiparanae garutti Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    altiparanae garutti Page: << < 1 2 3 4 5 > >> 1 http:www.biotaneotropica.org.br FISH ASSEMBLAGE STRUCTURE IN A FIRST ORDER STREAM, Summary: . ...

  4. GRADUATE FELLOWSHIPS, GRANTS & PRIZES Fullbright-Hayes Doctoral Dissertation Research

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Ethics Bowl Team UNDERGRADUATE RESEACH AWARDS UC Santa Cruz Dean's & Chancellor's Awards Corey Raymond" Graduate Research Symposium ­ Dean's Prize Jimmy Fazzino, Literature "Beat Subterranean: Assemblages

  5. A Local Search Appproach for Transmembrane Segment and Signal Peptide Discrimination

    E-Print Network [OSTI]

    Hao, Jin-Kao

    ,2 , Dominique Tessier1 , B´eatrice Duval2 , and Jin-Kao Hao2 1 UR1268 Biopolym`eres Interactions Assemblages

  6. E-Print Network 3.0 - affecting species diversity Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    search results for: affecting species diversity Page: << < 1 2 3 4 5 > >> 1 Community Ecology & Species Assemblages Summary: affect species distributions Tropical regions - most...

  7. Wetland Plant Influence on Sediment Ecosystem Structure and Trophic Function

    E-Print Network [OSTI]

    Whitcraft, Christine R.

    2007-01-01T23:59:59.000Z

    alterniflora and benthic microalgae in salt marsh food webs:assemblages of marine wetland microalgae and photosyntheticalternijlora and benthic microalgae in salt marsh food webs:

  8. Wetland plant influence on sediment ecosystem structure and trophic function

    E-Print Network [OSTI]

    Whitcraft, Christine René

    2007-01-01T23:59:59.000Z

    alterniflora and benthic microalgae in salt marsh food webs:assemblages of marine wetland microalgae and photosyntheticalterniflora and benthic microalgae in salt marsh food webs:

  9. Eytan Vitae 1 Dr. Ron I Eytan

    E-Print Network [OSTI]

    Eytan, Ron I.

    ? Inferring acanthomorph teleost phylogeny using anchored hybrid enrichment. In revision Alex Dornburg, Jon Fish Assemblage Structure Over 50 Years at Reefs of New Providence Island, the Bahamas Highlight

  10. Fish ecology of a wetland in the southern Western Ghats, India.

    E-Print Network [OSTI]

    Grubh, Archis Robert

    2012-01-01T23:59:59.000Z

    ??Fish assemblages and abiotic environmental conditions in a wetland in the Western Ghats, southern India, were investigated from August 2000 to July 2001. Rainfall showed… (more)

  11. Full vector low-temperature magnetic measurements of geologic materials

    E-Print Network [OSTI]

    Feinberg, Joshua M; Solheid, Peter A; Swanson-Hysell, Nicholas L; Jackson, Mike J; Bowles, Julie A

    2015-01-01T23:59:59.000Z

    the early history of the solar system. The assemblage ofas they pass by the Sun (at solar perigee) or as they enter

  12. A Statistics-Based Method For The Short-Wave Infrared Spectral...

    Open Energy Info (EERE)

    of alteration minerals, which classifies spectra according to their shape and absorption features, thus obtaining groups of spectra equivalent to mineral assemblages. It...

  13. E-Print Network 3.0 - adaptive stochastic collocation Sample...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stochastic Expansion Methods Summary: Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods... , or sparse grid approaches. The linear...

  14. automated seaport container: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    technology, we propose a solution for real-time automated detection Terms-- rootkits, stealth malware, intrusion, con- tainment,virtual machines I. INTRODUCTION Despite to...

  15. automated container offering: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    technology, we propose a solution for real-time automated detection Terms-- rootkits, stealth malware, intrusion, con- tainment,virtual machines I. INTRODUCTION Despite to...

  16. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  17. Microsoft Word - Chapter 02 rev 4, implemented Nov 19, 2013

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to detect fracturing, corrosion, deterioration, and water intrusion. A comprehensive preventive maintenance program, including all required MSHA inspections, is in place....

  18. Planetary Wave Breaking and Nonlinear Reflection: Seasonal Cycle and Interannual Variability

    E-Print Network [OSTI]

    Abatzoglou, John T; Magnusdottir, Gudrun

    2006-01-01T23:59:59.000Z

    and L. M. Polvani, 2000: Climatology of intrusions into theM. H. Hitchman, 1999: A climatology of Rossby wave breaking

  19. E-Print Network 3.0 - advanced candu reactor Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Astroparticule & Cosmologie 10, rue Alice Domon et... it the automatic and non intrusive monitoring of nuclear reactor by its antineutrino signal ... Source: Ecole Polytechnique,...

  20. Text att freg Frsvarsmaktens lista med uppsatsfrslag vid publicering i respektive Universitets/hgskolans webbsida.

    E-Print Network [OSTI]

    Zhao, Yuxiao

    and assessment of successfulness Build and establish a cyber intelligence and analysis capability for conducting focused operations to detect advanced intrusions, share alerts, and ensure sufficient network services

  1. E-Print Network 3.0 - anonyms and pseudonyms Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and pseudonyms Page: << < 1 2 3 4 5 > >> 1 Ulrich Flegel, University of Dortmund, Germany Privacy-Respecting Intrusion Detection Summary: their privacy. A viable solution is...

  2. --No Title--

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    law, such as the Freedom of Information Act. Security, Intrusion, and Detection For site security purposes, and to ensure this service remains available to all users, this...

  3. United States Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    representative of a party can prepare and develop legal theories and strategies "with an eye toward litigation," free from unnecessary intrusion by their adversaries. Hickman, 329...

  4. Call for Papers First International Baltic

    E-Print Network [OSTI]

    Rostock, Universität

    and privacy in smart grids - Intellectual property protection - Security and privacy in wireless networks - Internet fraud - Security and privacy metrics - Intrusion detection and prevention - Trust management - Key

  5. Domestic Artifacts, Political Practices: An Archaeology of Women's Reform Efforts and the Home, 1854-1939

    E-Print Network [OSTI]

    Christensen, Kimberly E.

    2012-01-01T23:59:59.000Z

    of Sale 1925). These utility lines were uncovered within thehighly disturbed by many utility line intrusions. Findingsheavily disturbed by utility lines and trenches. Although

  6. automated border detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 63 Using Specification-Based Intrusion Detection for...

  7. automated microarray detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 69 Using Specification-Based Intrusion Detection for...

  8. automated fault detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 242 Using Specification-Based Intrusion Detection for...

  9. automated snp detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 55 Using Specification-Based Intrusion Detection for...

  10. Microsoft Word - 02-25-11_WCH_WeeklyReport

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in 94 VPUs. The VPUs were constructed by welding five bottomless drums together and buried vertically about 10 feet apart. In early September, WCH completed intrusive...

  11. E-Print Network 3.0 - altered groundwater chemistry Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    groundwater chemistry Search Powered by Explorit Topic List Advanced Search Sample search results for: altered groundwater chemistry Page: << < 1 2 3 4 5 > >> 1 Seawater intrusion...

  12. EIS-0026; Waste Isolation Pilot Plant Disposal Phase Final Supplementa...

    Office of Environmental Management (EM)

    for protecting the site from inadvertent human intrusion (e.g., drilling for oilgas resources)." Response: The following language has been incorporated into Section 4.1.1:...

  13. E-Print Network 3.0 - activation supports late Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ? Other Units Calcite veins (late Miocene) MIOCENE... INTRUSIONS Colluvial deposits Mine waste (recent) QUATERNARY DEPOSITS Tephra (late Miocene) Siltstone ... Source: Faulds,...

  14. Journal of Paleolimnology 28: 297316, 2002. 2002 Kluwer Academic Publishers. Printed in the Netherlands.

    E-Print Network [OSTI]

    Patterson, Timothy

    -yield chemical fertilizers in the post World War II era, and the resultant eutrophication of the lake proxies, as indicated by the appearance of the algalphilic Eutrophication Assemblage. The arcellacean the European Deforestation and Eutrophication Assemblages, indicative of periods of ecological destabilization

  15. Fish under influence: a macroecological analysis of relations between fish species richness and environmental gradients among European tidal estuaries

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Fish under influence: a macroecological analysis of relations between fish species richness Estuarine fish assemblages are subject to a great environmental variability that largely depends on both a macroecological approach aiming to identify the main environmental factors that structure fish assemblages among

  16. The Cleveland Museum of Natural History December 2007 Number 56:112120

    E-Print Network [OSTI]

    Hlusko, Leslea J.

    of the postcranial remains suggests that this assemblage comprises a single population. A maxillary fragment of this assemblage indicates element preservation is density mediated, but fragmentation is limited and this suggests. at this locality and only the second record of Alilepus, or a closely allied, genus in Africa (Winkler 2003

  17. ORIGINAL ARTICLE Disturbance and temporal partitioning

    E-Print Network [OSTI]

    .139 Introduction Mixed-culture microbial assemblages present in biological wastewater treatment systems-scale activated sludge wastewater treatment plant. The parameter solids retention time (SRT) was used and industrial wastewater treatment (Tchobanoglous et al., 2003; Seviour and Nielsen, 2010). These assemblages

  18. Applicability of InSAR to tropical volcanoes: insights from Central America

    E-Print Network [OSTI]

    Amelung, Falk

    . BIGGS2,3, T. A. MATHER1 & F. AMELUNG3 1 COMET+, Department of Earth Sciences, University of Oxford) or intrusive processes (e.g. dyke and sill intrusion: Hamling et al. 2009; Biggs et al. 2010), as well African Rift: Biggs et al. 2009) and at locations not obviou- sly associated with a particular volcanic

  19. MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN the advances in the field of network security technologies, such as filtering of traffic, use of encrypted be exploited by unauthorized parties. The use of firewalls, NIDSs (network intrusion detection systems

  20. On the Limits of Payload-Oblivious Network Attack Detection

    E-Print Network [OSTI]

    Reiter, Michael

    alarms in order to detect them consistently. Keywords: network intrusion detection, ROC curve, evaluation. 1 Introduction We address the problem of evaluating network intrusion detection systems to the form of log data, encryption or simply a high connection failure rate--methods for detecting

  1. MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    E-Print Network [OSTI]

    Boyer, Edmond

    , such as firewalls, intrusion detection systems, and VPN routers. We review the two main functionalities embedded technologies, such as filter- ing of traffic, use of encrypted communications, and deployment of authentication of firewalls, NIDSs (network intrusion detection systems), and VPN (Virtual Private Network) routers, is still

  2. Reconciling Security Protection and Monitoring Requirements in Advanced Metering Infrastructures

    E-Print Network [OSTI]

    Sanders, William H.

    , and intrusion detection. In particular, encrypted messages preclude the use of most intrusion detection between the confidentiality requirements for protecting sensitive AMI traffic through encryption, and the monitoring necessary for full inspection of this traffic. The way to reconcile those conflicting requirements

  3. Defend your data with broader, deeper server protection IBM ISS Threat Mitigation Services

    E-Print Network [OSTI]

    protection delivers multilayered intrusion preven- tion and detection to help protect your servers from of attacks, including those tunneling through encrypted Web transactions Combines multiple inspection® Server Intrusion Prevention System (IPS) and IBM RealSecure® Server Sensor. Each supports a broad range

  4. NetGator: Malware Detection Using Program Interactive Challenges

    E-Print Network [OSTI]

    Stavrou, Angelos

    to an external party over an encrypted or plain text connection before the intrusion is detected. In this paper used for targeted exfiltration of data. Current intrusion detection systems cannot always keep hole that malware will increasingly cap- italize on. The use of encrypted traffic has been growing

  5. Imaging Gas Leaks using Schlieren Optics by Gary S. Settles

    E-Print Network [OSTI]

    Settles, Gary S.

    -intrusive, and capable of remote observation of leaks as small as milliliters/minute. For example, natural gas leaking. The schlieren technique is highly sensitive, non- intrusive, optical, and remote. However, since it needs only with a special schlieren arrangement that visualizes gas flows in color (Settles, International Journal of Heat

  6. A Geostatistical Study of the Uranium Deposit at Kvanefjeld,

    E-Print Network [OSTI]

    with the geology. It is also shown that, although anisotropy exists, the uranium variation has a secondRisa-R-468 A Geostatistical Study of the Uranium Deposit at Kvanefjeld, The Ilimaussaq Intrusion A GEOSTATISTICAL STUDY OF THE URANIUM DEPOSIT AT KVANEFJELD, THE ILIMAUSSAQ INTRUSION, SOUTH GREENLAND Flemming

  7. E-Print Network 3.0 - aduncum sesquiterpenos eremofilanos Sample...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aduncum and P. umbellatum... .S.A. Abstract. 1. Caterpillar assemblages feeding on two alien plants, Piper aduncum and P. umbellatum, were... . aduncum (29 species per 1500 m2 of...

  8. Provenance of middle to late Miocene clastic sedimentary rocks in the central to eastern Cibao basin, northern Hispaniola

    E-Print Network [OSTI]

    Yao, Meng

    1997-01-01T23:59:59.000Z

    The provenance of middle to late Miocene clastic sediments of Cibao basin in northern Hispaniola has been assessed via integrated methods including detrital framework modes, clay mineral assemblages and ratios, the composition of individual feldspar...

  9. Brown-headed cowbird parasitism on endangered species: relationships with neighboring avian species

    E-Print Network [OSTI]

    Farrell, Shannon Leigh

    2009-05-15T23:59:59.000Z

    ) vireos and characteristics of the neighboring avian assemblage to identify avian characteristics useful for predicting expected frequency of parasitism. I located and monitored vireo nests in March–July 2006 to determine frequency of cowbird parasitism...

  10. Early periphyton accumulation and composition in a wastewater effluent dominated stream: effects of season, distance from discharge, and flow regime

    E-Print Network [OSTI]

    Murdock, Justin Neal

    2002-01-01T23:59:59.000Z

    Municipal wastewater effluent can alter the receiving stream's algal production and community structure by affecting natural hydrologic patterns and nutrient availability. In this thesis, early succession periphyton assemblages were studied...

  11. The architectural details of Alvaro Siza : a chorology

    E-Print Network [OSTI]

    Rohrbacher, Gary P. (Gary Pickard), 1964-

    1998-01-01T23:59:59.000Z

    A chorology is an analysis of the relationships between the constituent parts of a system or assemblage. Architecture is not only the result of the connection between a vast set of components and their manifold interactions, ...

  12. Technologies of the operator : engineering the pilot in the U.S. and Japan, 1930-1960

    E-Print Network [OSTI]

    Jeon, Chihyung

    2010-01-01T23:59:59.000Z

    This study examines the assemblage of scientific knowledge, engineering practices, measuring instruments, and civilian and military institutions in the U.S. and Japan that went into the construction of the machine operator ...

  13. Between house and city

    E-Print Network [OSTI]

    Kallus, Rachel Admati

    1982-01-01T23:59:59.000Z

    In an attempt to understand the relationships between a residential building type and the city, this thesis explores the quality of the urban context resulting from the assemblage of these buildings. The investigation takes ...

  14. ORIGINAL ARTICLE Spatial patterns of epifaunal communities in San Francisco

    E-Print Network [OSTI]

    Boyer, Katharyn

    species; isopod; mesograzer; multivariate analysis; phenology; seagrass. Correspondence Lindsey A. Carr structure and function, community composi- tion and species distributions have been well documented and assemblages on eelgrass growth dynamics, seed production, and higher order trophic interactions over space

  15. and Mlr is the primary mass in solar mass units. Inside the Hill's sphere, the motion of the satellite is con-

    E-Print Network [OSTI]

    Vajda, Vivi

    K-T boundary layer within a coal seam (Fig. 1). The iridium anomaly of 71 parts per billion (ppb-Cretaceous extinction as their northern cousins (8). Pollen and spore assemblages from nonma- rine coal and sandstone

  16. The interpretation of Postclassic lithic production patterns at Colha, Belize through a synthetic analysis of archaeological data

    E-Print Network [OSTI]

    Barrett, Jason Wallace

    1999-01-01T23:59:59.000Z

    directly to subsistence practices, the disjunction observed in manufacturing technique between Classic and Postclassic period stone tool production assemblages is more enigmatic. The events leading to Colha's abandonment and subsequent reoccupation...

  17. A hotel economic feasibility study : Monsignor O'Brien Highway, Cambridge, Massachusetts

    E-Print Network [OSTI]

    Rogers, Mark P. (Mark Paul)

    2007-01-01T23:59:59.000Z

    A hotel economic feasibility study was carried out for an assemblage of four (4) parcels located on Monsignor O'Brien Highway in Cambridge, Massachusetts. The primary objective of this economic feasibility study was to ...

  18. APPLIED AND ENVIRONMENTAL MICROBIOLOGY, Feb. 2009, p. 735747 Vol. 75, No. 3 0099-2240/09/$08.00 0 doi:10.1128/AEM.01469-08

    E-Print Network [OSTI]

    Schmidt, Steven K.

    carbon. Moreover, this soil hosted diverse photoautotroph-dominated assemblages that contained novel sensitive to anthropogenic disturbance. Environments in which hydrothermal systems interact with the arid) potentially active vol- canoes in the world (17). Hydrothermal features, including hot springs, geysers

  19. Recommendations for Improvement of RMP Sediment Monitoring

    E-Print Network [OSTI]

    , OR Prepared For Regional Monitoring Program for Trace Substances San Francisco Estuary Institute 1325 S. 46th in the Atlas of Sediment Contamination, Toxicity, and Benthic Assemblages (Thompson and Daum, in prep.). #12

  20. Emergent patterns of diversity and dynamics in natural populations of planktonic Vibrio bacteria

    E-Print Network [OSTI]

    Thompson, Janelle Renée, 1976-

    2005-01-01T23:59:59.000Z

    Despite the importance of microorganisms for global and engineering processes, currently lacking is a theoretical framework to describe how the structure of a microbial assemblage translates an environmental condition into ...

  1. Hybrid re Assembage : bridging traditional craft and digital design

    E-Print Network [OSTI]

    Zoran, Amit (Amit Shlomo)

    2013-01-01T23:59:59.000Z

    Hybrid reAssemblage is a design gestalt that lies at the cross-section of digital design practice and the tactile qualities of traditional craft. It spans a territory in which the value of artifacts is produced through ...

  2. algal enteromorpha zoospores: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of a river food chain changed from year to year, shifting Power, Mary Eleanor 74 Small-scale spatial variation of benthic algal assemblages in a peat bog Katerina Cerna n Biology...

  3. Harbour Island: The Comparative Archaeology of a Maritime Community

    E-Print Network [OSTI]

    Hatch, Heather E

    2013-08-01T23:59:59.000Z

    assemblages of maritime communities that indicate maritimity. Analysis relies on Stanley South's artifact classification system and his Carolina Artifact pattern. The nine properties are compared among themselves as well as with four other sites from...

  4. Theory of compressional and shear waves in fluidlike marine Michael J. Buckinghama)

    E-Print Network [OSTI]

    Buckingham, Michael

    October 1997 An unconsolidated, saturated marine sediment consists of a more or less loose assemblage A theory of the acoustic and mechanical properties of unconsolidated marine sediments was recently

  5. Palynology and Paleoecology of the Lake Somerville spillway section, Late Eocene Manning Formation (Jackson Group), east-central Texas

    E-Print Network [OSTI]

    Sancay, Recep Hayrettin

    2000-01-01T23:59:59.000Z

    Analysis of lignites, freshwater and marine siliciclastic sediments from the Lake Somerville spillway section (Late Eocene, Jackson Group, Manning Formation) yielded a diverse assemblage of terrestrial palynomorphs including fungal spores (84 genera...

  6. Gas-path leakage seal for a turbine

    DOE Patents [OSTI]

    Bagepalli, B.S.; Aksit, M.F.; Farrell, T.R.

    1999-08-10T23:59:59.000Z

    A gas-path leakage seal for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a turbine (such as combustor casing segments of a gas turbine). The seal includes a flexible and generally imperforate metal sheet assemblage having opposing first and second surfaces and two opposing raised edges extending a generally identical distance above and below the surfaces. A first cloth layer assemblage has a thickness generally equal to the previously-defined identical distance and is superimposed on the first surface between the raised edges. A second cloth layer assemblage is generally identical to the first cloth layer assemblage and is superimposed on the second surface between the raised edges. 5 figs.

  7. Copano Bay: Assessing the Accountability of Spatial/Temporal Variability in Benthic Molluscan Paleocommunities

    E-Print Network [OSTI]

    Horbaczewski, Adam Michael

    2008-08-19T23:59:59.000Z

    . In order to study this relationship, benthic molluscan live and dead assemblages are being collected from an ongoing time series and a spatial transect from Copano Bay, Texas. Previous work on this time series transect has demonstrated that death...

  8. Patterns in biodiversity and distribution of benthic Polychaeta in the Mississippi Canyon, Northern Gulf of Mexico

    E-Print Network [OSTI]

    Wang, Yuning

    2006-04-12T23:59:59.000Z

    ) and deep (> 1500 m). Results of statistical analyses revealed that depth was the most important determinant in organizing polychaete assemblages in the study area. The Mississippi Canyon and the Central Transect (a non-canyon area) were found...

  9. Characterization of Post-mortem Shell Alteration in Aransas Bay, Texas

    E-Print Network [OSTI]

    Schirm, David Edward

    2013-06-04T23:59:59.000Z

    Accumulations of dead shells in both modern coastal settings and in the rock record contain valuable information on past ecosystems and environmental conditions. However, death assemblages are not simply snapshots of living communities; rather...

  10. arizona: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    resource for a rich assemblage of cavity-nesting birds in the southwestern United States. To expand our knowledge of snag use by cavity-nesting birds in this region, we...

  11. The effects of multiple stressors on wetland communities: pesticides, pathogens and competing amphibians

    E-Print Network [OSTI]

    Blaustein, Andrew R.

    The effects of multiple stressors on wetland communities: pesticides, pathogens and competing. Larval amphibian growth and development were affected by carbaryl and the amphibian assemblage treatment effects among the treatments on amphibian growth and development. 4. We encourage future research

  12. Three-dimensional anatomy of a geothermal field, Coso, Southeast...

    Open Energy Info (EERE)

    distribution. The anomalies also correlate with high heat flow in the field and the termination of geothermal production to the south. I speculate that an intrusion is present in...

  13. Three-Dimensional Anatomy of a Geothermal Field Coso Southeast...

    Open Energy Info (EERE)

    distribution. The anomalies also correlate with high heat flow in the field and the termination of geothermal production to the south. I speculate that an intrusion is present in...

  14. The Center for Control, Dynamical Systems, and Computation Spring Seminars

    E-Print Network [OSTI]

    Akhmedov, Azer

    the market as well as national needs. The technology challenges associated with providing the functionality), Otis (elevators), Carrier (HVAC/R), UTC Fire & Security (intrusion/access control and fire safety

  15. Design Under Uncertainty Employing Stochastic Expansion Methods

    E-Print Network [OSTI]

    Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods and ability to produce functional representations of stochastic variability. PCE estimates coefficients with both techniques for general probabilistic analysis problems. Once PCE or SC representations have been

  16. Home NILM : a comprehensive energy monitoring toolkit

    E-Print Network [OSTI]

    Donnal, John Sebastian

    2013-01-01T23:59:59.000Z

    In this thesis we present two powerful new non-intrusive sensor designs, one for measuring equipment power consumption and one for measuring equipment vibration. We also discuss a unified data management framework for ...

  17. Tropospheric Rossby Wave Breaking and the NAO/NAM

    E-Print Network [OSTI]

    Strong, Courtenay; Magnusdottir, Gudrun

    2008-01-01T23:59:59.000Z

    and L. M. Polvani, 2000: Climatology of intrusions into theIdentification and ERA-15 climatology of potential vorticityof 1958–2006. A winter climatology of both anti- cyclonic

  18. Lessons Learned from Nonproliferation Successes and Failures

    E-Print Network [OSTI]

    Katz, Jonathan I.

    , Argentina, Brazil, South Africa, Libya, Syria) and fail- ures (USSR, France, China, India, Pakistan-off Treaty) is not verifiable without very intrusive inspections directed by accurate intel- ligence. Libya

  19. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  20. Centre for Telematics and Information Technology CTIT PROGRESS REPORT 2008-2009

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    Recovery at runtime 26 n Intrusion detection systems at high speeds 28 n Saving energy using virtual power plants 30 n Ranking the pages better 32 n VIDI grants for Djoerd Hiemstra and Peter-Paul Verbeek 34

  1. Nonvolcanic seafloor spreading and corner-flow rotation accommodated by extensional faulting at 15N on the Mid-

    E-Print Network [OSTI]

    mafic crust is constructed by volcanism and shallow magma intrusion (Figure 1a) [e.g., Sinton sections of intermediate- and slow- spreading ridges [Sinton and Detrick, 1992]. Non-

  2. Arc magmatism at different crustal levels, North Cascades, WA

    E-Print Network [OSTI]

    Shea, Erin Kathleen McLaren

    2014-01-01T23:59:59.000Z

    The mechanisms of magma ascent and emplacement inferred from study of intrusive complexes have long been the subject of intense debate. Current models favor incremental construction, but much of this work has been focused ...

  3. Laboratory simulation of subsurface airflow beneath a building

    E-Print Network [OSTI]

    Corsello, Joseph William

    2014-01-01T23:59:59.000Z

    Vapor intrusion is the vapor-phase migration of volatile organic compounds (VOCs) into buildings due to subsurface soil or groundwater contamination. Oxygen replenishment rates beneath a building are significant for ...

  4. Exhumation Of The Peruvian Andes; Insights From Mineral Chronometers

    E-Print Network [OSTI]

    Michalak, Melanie

    2013-01-01T23:59:59.000Z

    an elevated geothermal gradient and fast cooling rates.the geothermal gradient due to post-intrusive cooling fromgeothermal gradients are estimated at 20-26ºC/km, and closure depths for the ZHe cooling

  5. Progress on the Gulf of Mexico Hypoxia K. A. Kelling

    E-Print Network [OSTI]

    Balser, Teri C.

    changes · Loss of coastal wetlands · Intrusion of offshore waters · Climatic changes #12;Map system · Plant cover crops · Switch to conservation tillage · Increase tile spacing · Control water table

  6. Toxic hazards of underground excavation

    SciTech Connect (OSTI)

    Smith, R.; Chitnis, V.; Damasian, M.; Lemm, M.; Popplesdorf, N.; Ryan, T.; Saban, C.; Cohen, J.; Smith, C.; Ciminesi, F.

    1982-09-01T23:59:59.000Z

    Inadvertent intrusion into natural or man-made toxic or hazardous material deposits as a consequence of activities such as mining, excavation or tunnelling has resulted in numerous deaths and injuries in this country. This study is a preliminary investigation to identify and document instances of such fatal or injurious intrusion. An objective is to provide useful insights and information related to potential hazards due to future intrusion into underground radioactive-waste-disposal facilities. The methodology used in this study includes literature review and correspondence with appropriate government agencies and organizations. Key categories of intrusion hazards are asphyxiation, methane, hydrogen sulfide, silica and asbestos, naturally occurring radionuclides, and various mine or waste dump related hazards.

  7. ROYAL HOLLOWAY, UNIVERSITY OF LONDON NorthgateArinso Hosted My View Security Statement

    E-Print Network [OSTI]

    Royal Holloway, University of London

    controls, CCTV, environmental controls etc.) and logical security (firewalls, intrusion detection network protocol encrypts network traffic making it virtually impossible to intercepted and read questions. The answers to the security questions are encrypted in the system and therefore support staff

  8. Real-world Polymorphic Attack Detection Michalis Polychronakis,1

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    proposed network-level emulation, a heuristic detection method that scans network traffic to detect, sophisticated obfuscation schemes. Keywords Polymorphism, intrusion detection, code emulation 1. Introduction them under control for as long as possible. As detection mechanisms improve, attackers employ

  9. Automated classification of power signals

    E-Print Network [OSTI]

    Proper, Ethan R. (Ethan Richard)

    2008-01-01T23:59:59.000Z

    The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to monitor an entire system from a single reference point. The NILM and associated software convert the V/I signal to spectral ...

  10. CX-009096: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    U.S. Customs and Border Protection Non-Intrusive Inspection Tests CX(s) Applied: B3.10, B3.11 Date: 05/18/2012 Location(s): Washington Offices(s): Pacific Northwest Site Office

  11. Coordinated Variable Structure Switching Attacks for Smart Grid

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11T23:59:59.000Z

    attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

  12. E-Print Network 3.0 - area eastern desert Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in The Netherlands Origin of Late Precambrian Intrusive Carbonates, Eastern Desert of Egypt and Sudan: C, 0 and Sr... carbonates, Eastern Desert of Egypt and Sudan: C, 0 and Sr...

  13. Learning and Identifying Haptic Icons under Workload Technical Report TR-2004-15

    E-Print Network [OSTI]

    MacLean, Karon

    interface designers. Force feedback plays a direct role in many virtual and teleoperated environments; e, but without their intrusiveness. Auto manufacturers have begun introducing haptics into vehicle cockpits: BMW

  14. Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients

    E-Print Network [OSTI]

    Carrillo, Roberto

    2014-05-13T23:59:59.000Z

    appliance. Two maxillary and two mandibular MSIs (immediately loaded with 150gr coil springs) were used for the intrusion mechanics and vertical control. A matched control group was used to evaluate the skeletal changes that occurred during treatment. CBCT...

  15. Natural gas seeps in the northern Gulf of Mexico: A geological investigation.

    E-Print Network [OSTI]

    Tinkle, Anthony Robert

    1973-01-01T23:59:59.000Z

    ruptured by faulting and folding. 4) Oil Seeps along unconformi. ties 5) Seeps associated with intrusions, such as mud volcanoes, igneous intrusions and piercement salt domes. L-'nk also noted that seepages are most numerous . 'n areas of young... attention more and more towards offshore explor- ation, as the present census of major oil fields in the United States today is generally believed to be close to the probable maximum. At the same time, tho para, llel growth '. n ecological consciousness...

  16. Origin of cratonic basins

    SciTech Connect (OSTI)

    de V. Klein, G.; Hsui, A.T.

    1987-12-01T23:59:59.000Z

    Tectonic subsidence curves show that the Illinois, Michigan, and Williston basins formed by initial fault-controlled mechanical subsidence during rifting and by subsequent thermal subsidence. Thermal subsidence began around 525 Ma in the Illinois Basin, 520-460 Ma in the Michigan Basin, and 530-500 Ma in the Williston Basin. In the Illinois Basin, a second subsidence episode (middle Mississippian through Early Permian) was caused by flexural foreland subsidence in response to the Alleghanian-Hercynian orogeny. Past workers have suggested mantle phase changes at the base of the crust, mechanical subsidence in response to isostatically uncompensated excess mass following igneous intrusions, intrusion of mantle plumes into the crust, or regional thermal metamorphic events as causes of basin initiation. Cratonic basins of North America, Europe, Africa, and South America share common ages of formation, histories of sediment accumulation, temporal volume changes of sediment fills, and common dates of interregional unconformities. Their common date of formation suggests initiation of cratonic basins in response to breakup of a late Precambrian supercontinent. This supercontinent acted as a heat lens that caused partial melting of the lower crust and upper mantle followed by emplacement of anorogenic granites during extensional tectonics in response to supercontinent breakup. Intrusion of anorogenic granites and other partially melted intrusive rocks weakened continental lithosphere, thus providing a zone of localized regional stretching and permitting formation of cratonic basins almost simultaneously over sites of intrusion of these anorogenic granites and other partially melted intrusive rocks.

  17. A Learning System for Discriminating Variants of Malicious Network Traffic

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL; Symons, Christopher T [ORNL; Gillen, Rob [ORNL

    2013-01-01T23:59:59.000Z

    Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacks and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.

  18. Crustal deformation and source models of the Yellowstone volcanicfield from geodetic data

    SciTech Connect (OSTI)

    Vasco, D.W.; Puskas, C.M.; Smith, R.B.; Meertens, C.M.

    2006-07-05T23:59:59.000Z

    Geodetic observations, comprised of InterferometricSynthetic Aperture Radar (InSAR), Global Positioning System (GPS). andleveling measurements, are used to infer volume change in the subsurfaceassociated with the Yellowstone volcanic system. We find that existingfaults play a significant role in controlling subsurface volume increasesand decreases due to fluid migration within the volcanic system. Forexample, subsidence from 1992 to 1995 appears to be associated withvolume changes below the Elephant Back fault zone and a north-southtrending fault which cuts across the caldera. Furthermore, we are able toimage an episode of magma intrusion near the northern edge of the calderawhich parallels and is adjacent to the north trending volume decrease.The primary intrusion occurred between 1996 and 2000, though theintrusion appears to have continnued, shallowed, and changed shapebetween 2000 and 2001. There is evidence that the intrusive activityaffected extensional fauts to the north of the caldera.

  19. Dike/Drift Interactions

    SciTech Connect (OSTI)

    E. Gaffiney

    2004-11-23T23:59:59.000Z

    This report presents and documents the model components and analyses that represent potential processes associated with propagation of a magma-filled crack (dike) migrating upward toward the surface, intersection of the dike with repository drifts, flow of magma in the drifts, and post-magma emplacement effects on repository performance. The processes that describe upward migration of a dike and magma flow down the drift are referred to as the dike intrusion submodel. The post-magma emplacement processes are referred to as the post-intrusion submodel. Collectively, these submodels are referred to as a conceptual model for dike/drift interaction. The model components and analyses of the dike/drift interaction conceptual model provide the technical basis for assessing the potential impacts of an igneous intrusion on repository performance, including those features, events, and processes (FEPs) related to dike/drift interaction (Section 6.1).

  20. Autonomous navigation system and method

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID) [Idaho Falls, ID; Few, Douglas A. (Idaho Falls, ID) [Idaho Falls, ID

    2009-09-08T23:59:59.000Z

    A robot platform includes perceptors, locomotors, and a system controller, which executes instructions for autonomously navigating a robot. The instructions repeat, on each iteration through an event timing loop, the acts of defining an event horizon based on the robot's current velocity, detecting a range to obstacles around the robot, testing for an event horizon intrusion by determining if any range to the obstacles is within the event horizon, and adjusting rotational and translational velocity of the robot accordingly. If the event horizon intrusion occurs, rotational velocity is modified by a proportion of the current rotational velocity reduced by a proportion of the range to the nearest obstacle and translational velocity is modified by a proportion of the range to the nearest obstacle. If no event horizon intrusion occurs, translational velocity is set as a ratio of a speed factor relative to a maximum speed.