Search results for: magmatic intrusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 207

Search results for: magmatic intrusion

147 Identification of Suitable Sites for Rainwater Harvesting in Salt Water Intruded Area by Using Geospatial Techniques in Jafrabad, Amreli District, India

Authors: Pandurang Balwant, Ashutosh Mishra, Jyothi V., Abhay Soni, Padmakar C., Rafat Quamar, Ramesh J.

Abstract:

The sea water intrusion in the coastal aquifers has become one of the major environmental concerns. Although, it is a natural phenomenon but, it can be induced with anthropogenic activities like excessive exploitation of groundwater, seacoast mining, etc. The geological and hydrogeological conditions including groundwater heads and groundwater pumping pattern in the coastal areas also influence the magnitude of seawater intrusion. However, this problem can be remediated by taking some preventive measures like rainwater harvesting and artificial recharge. The present study is an attempt to identify suitable sites for rainwater harvesting in salt intrusion affected area near coastal aquifer of Jafrabad town, Amreli district, Gujrat, India. The physico-chemical water quality results show that out of 25 groundwater samples collected from the study area most of samples were found to contain high concentration of Total Dissolved Solids (TDS) with major fractions of Na and Cl ions. The Cl/HCO3 ratio was also found greater than 1 which indicates the salt water contamination in the study area. The geophysical survey was conducted at nine sites within the study area to explore the extent of contamination of sea water. From the inverted resistivity sections, low resistivity zone (<3 Ohm m) associated with seawater contamination were demarcated in North block pit and south block pit of NCJW mines, Mitiyala village Lotpur and Lunsapur village at the depth of 33 m, 12 m, 40 m, 37 m, 24 m respectively. Geospatial techniques in combination of Analytical Hierarchy Process (AHP) considering hydrogeological factors, geographical features, drainage pattern, water quality and geophysical results for the study area were exploited to identify potential zones for the Rainwater Harvesting. Rainwater harvesting suitability model was developed in ArcGIS 10.1 software and Rainwater harvesting suitability map for the study area was generated. AHP in combination of the weighted overlay analysis is an appropriate method to identify rainwater harvesting potential zones. The suitability map can be further utilized as a guidance map for the development of rainwater harvesting infrastructures in the study area for either artificial groundwater recharge facilities or for direct use of harvested rainwater.

Keywords: analytical hierarchy process, groundwater quality, rainwater harvesting, seawater intrusion

Procedia PDF Downloads 147
146 Intrusion Detection System Using Linear Discriminant Analysis

Authors: Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou

Abstract:

Most of the existing intrusion detection systems works on quantitative network traffic data with many irrelevant and redundant features, which makes detection process more time’s consuming and inaccurate. A several feature extraction methods, such as linear discriminant analysis (LDA), have been proposed. However, LDA suffers from the small sample size (SSS) problem which occurs when the number of the training samples is small compared with the samples dimension. Hence, classical LDA cannot be applied directly for high dimensional data such as network traffic data. In this paper, we propose two solutions to solve SSS problem for LDA and apply them to a network IDS. The first method, reduce the original dimension data using principal component analysis (PCA) and then apply LDA. In the second solution, we propose to use the pseudo inverse to avoid singularity of within-class scatter matrix due to SSS problem. After that, the KNN algorithm is used for classification process. We have chosen two known datasets KDDcup99 and NSLKDD for testing the proposed approaches. Results showed that the classification accuracy of (PCA+LDA) method outperforms clearly the pseudo inverse LDA method when we have large training data.

Keywords: LDA, Pseudoinverse, PCA, IDS, NSL-KDD, KDDcup99

Procedia PDF Downloads 202
145 Intrusiveness, Appraisal and Thought Control Strategies in Patients with Obsessive Compulsive Disorder

Authors: T. Arshad

Abstract:

A correlation study was done to explore the relationship of intrusiveness, appraisal and thought control strategies in patients with Obsessive Compulsive Disorder. Theoretical frame work for the present study was Salkovskis (1985) cognitive model of obsessive compulsive disorder. Sample of 100 patients (men=48, women=52) of age 14-62 years (M=32.13, SD=10.37) was recruited from hospitals of Lahore, Pakistan. Revised Obsessional Intrusion Inventory, Stress Appraisal Measure, Thought Control Questionnaire and Symptoms Checklist-R were self-administered. Findings revealed that intrusiveness is correlated with appraisals (controllable by self, controllable by others, uncontrollable, stressfulness) and thought control strategy (punishment). Furthermore, appraisals (uncontrollable, stressfulness, controllable by others) were emerged as strong predictors for different through control strategies (distraction, punishment and social control). Moreover, men have higher frequency of intrusion, whereas women were frequently using social control as thought control strategy. Results implied that intrusiveness, appraisals (controllable by others, uncontrollable, stressfulness) and thought control strategy (punishment) are related which maintains the disorder.

Keywords: appraisal, intrusiveness, obsessive compulsive disorder, thought control strategies

Procedia PDF Downloads 364
144 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 164
143 Modal Composition and Tectonic Provenance of the Sandstones of Ecca Group, Karoo Supergroup in the Eastern Cape Province, South Africa

Authors: Christopher Baiyegunhi, Kuiwu Liu, Oswald Gwavava

Abstract:

Petrography of the sandstones of Ecca Group, Karoo Supergroup in the Eastern Cape Province of South Africa have been investigated on composition, provenance and influence of weathering conditions. Petrographic studies based on quantitative analysis of the detrital minerals revealed that the sandstones are composed mostly of quartz, feldspar and lithic fragments of metamorphic and sedimentary rocks. The sandstones have an average framework composition of 24.3% quartz, 19.3% feldspar, 26.1% rock fragments, and 81.33% of the quartz grains are monocrystalline. These sandstones are generally very fine to fine grained, moderate to well sorted, and subangular to subrounded in shape. In addition, they are compositionally immature and can be classified as feldspathic wacke and lithic wacke. The absence of major petrographically distinctive compositional variations in the sandstones perhaps indicate homogeneity of their source. As a result of this, it is inferred that the transportation distance from the source area was quite short and the main mechanism of transportation was by river systems to the basin. The QFL ternary diagrams revealed dissected and transitional arc provenance pointing to an active margin and uplifted basement preserving the signature of a recycled provenance. This is an indication that the sandstones were derived from a magmatic arc provenance. Since magmatic provenance includes transitional arc and dissected arc, it also shows that the source area of the Ecca sediments had a secondary sedimentary and metasedimentary rocks from a marginal belt that developed as a result of rifting. The weathering diagrams and semi-quantitative weathering index indicate that the Ecca sandstones are mostly from a plutonic source area, with climatic conditions ranging from arid to humid. The compositional immaturity of the sandstones is suggested to be due to weathering or recycling and low relief or short transport from the source area. The detrital modal compositions of these sandstones are related to back arc to island and continental margin arc. The origin and deposition of the Ecca sandstones are due to low-moderate weathering, recycling of pre-existing rocks, erosion and transportation of debris from the orogeny of the Cape Fold Belt.

Keywords: petrography, tectonic setting, provenance, Ecca Group, Karoo Basin

Procedia PDF Downloads 387
142 A New DIDS Design Based on a Combination Feature Selection Approach

Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman

Abstract:

Feature selection has been used in many fields such as classification, data mining and object recognition and proven to be effective for removing irrelevant and redundant features from the original data set. In this paper, a new design of distributed intrusion detection system using a combination feature selection model based on bees and decision tree. Bees algorithm is used as the search strategy to find the optimal subset of features, whereas decision tree is used as a judgment for the selected features. Both the produced features and the generated rules are used by Decision Making Mobile Agent to decide whether there is an attack or not in the networks. Decision Making Mobile Agent will migrate through the networks, moving from node to another, if it found that there is an attack on one of the nodes, it then alerts the user through User Interface Agent or takes some action through Action Mobile Agent. The KDD Cup 99 data set is used to test the effectiveness of the proposed system. The results show that even if only four features are used, the proposed system gives a better performance when it is compared with the obtained results using all 41 features.

Keywords: distributed intrusion detection system, mobile agent, feature selection, bees algorithm, decision tree

Procedia PDF Downloads 368
141 The Effect of Subsurface Dam on Saltwater Intrusion in Heterogeneous Coastal Aquifers

Authors: Antoifi Abdoulhalik, Ashraf Ahmed

Abstract:

Saltwater intrusion (SWI) in coastal aquifers has become a growing threat for many countries around the world. While various control measures have been suggested to mitigate SWI, the construction of subsurface physical barriers remains one of the most effective solutions for this problem. In this work, we used laboratory experiments and numerical simulations to investigate the effectiveness of subsurface dams in heterogeneous layered coastal aquifer with different layering patterns. Four different cases were investigated, including a homogeneous (case H), and three heterogeneous cases in which a low permeability (K) layer was set in the top part of the system (case LH), in the middle part of the system (case HLH) and the bottom part of the system (case HL). Automated image analysis technique was implemented to quantify the main SWI parameters under high spatial and temporal resolution. The method also provides transient salt concentration maps, allowing for the first time clear visualization of the spillage of saline water over the dam (advancing wedge condition) as well as the flushing of residual saline water from the freshwater area (receding wedge condition). The SEAWAT code was adopted for the numerical simulations. The results show that the presence of an overlying layer of low permeability enhanced the ability of the dam to retain the saline water. In such conditions, the rate of saline water spillage and inland extension may considerably be reduced. Conversely, the presence of an underlying low K layer led to a faster increase of saltwater volume on the seaward side of the wall, therefore considerably facilitating the spillage. The results showed that a complete removal of the residual saline water eventually occurred in all the investigated scenarios, with a rate of removal strongly affected by the hydraulic conductivity of the lower part of the aquifer. The data showed that the addition of the underlying low K layer in case HL caused the complete flushing to be almost twice longer than in the homogeneous scenario.

Keywords: heterogeneous coastal aquifers, laboratory experiments, physical barriers, seawater intrusion control

Procedia PDF Downloads 210
140 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 149
139 Groundwater Quality in the Rhiss-Nekor Plain, Morocco: Impacts of Human Activities

Authors: Ali Ait Boughrous, Said Benyoussef, Hossain El Ouarghi, Moulay Abdelazize Aboulhassan, Samah Aitbnichou, Said Benguamra

Abstract:

The Rhiss-Nekor aquifer represents a primary water source for the central Rif region. Many operating structures were built for irrigation and drinking water supply. Because of the vulnerability of this aquifer, a thorough knowledge of the environment is needed to evaluate and protect resources. This work aims at the quality assessment of the water table of the plain Ghiss-Nekor and determination of pollution sources in order to establish a map of the web. The plain-Rhiss Nekor, with an area of 100 km2, is located on the Mediterranean coast of Morocco. It has a particular geological structure resulting from the opening of a graben at the end of the Tertiary, which is filled by the accumulation of hundreds of meters of sediment, generating considerable heterogeneity in deposits. This heterogeneity gives various hydrodynamic properties within the aquifer of the plain. The analysis of the water quality of twenty water points, well distributed over the plain, showed high natural salinity linked to the geological nature of the area. This salinity increases in the littoral area by the seawater intrusion phenomenon. This is accentuated by overexploitation of the ground water due to the growing demand. Some wells, located inland, are characterized by organic pollution caused by wastewater seepage from septic tanks and lost wells widespread in the region.

Keywords: anthropogenic factors, groundwater quality, marine intrusion, Rhiss-Nekor aquifer

Procedia PDF Downloads 111
138 Risk and Vulnerability Assessment of Agriculture on Climate Change: Bangnampriao District, Thailand

Authors: Charuvan Kasemsap

Abstract:

This research was studied in Bangnampriao District, Chachernsao Province, Thailand. The primary data relating to flooding, drought, and saline intrusion problem on agriculture were collected by surveying, focus group, and in-depth interview with agricultural officers, technical officers of irrigation department, and local government leader of Bangnampriao District. The likelihood and consequence of risk were determined the risk index by risk assessment matrix. In addition, the risk index and the total coping capacity scores were investigated the vulnerability index by vulnerability matrix. It was found that the high-risk drought and saline intrusion was dramatically along Bang Pakong River owing to the end destination of Chao Phraya Irrigation system of Central Thailand. This leads yearly the damage of rice paddy, mango tree, orchard, and fish pond. Therefore, some agriculture avoids rice growing during January to May, and also pumps fresh water from a canal into individual storage pond. However, Bangnampriao District will be strongly affected by the impacts of climate change. Monthly precipitations are expected to decrease in number; dry seasons are expected to be more in number and longer in duration. Thus, the risk and vulnerability of agriculture are also increasing. Adaptation strategies need to be put in place in order to enhance the resilience of the agriculture.

Keywords: agriculture, bangnampriao, climate change, risk assessment

Procedia PDF Downloads 395
137 ‘A Ghost of One’s Own’: Spectral Intrusions and Trauma in the Poetry of Joanna Baillie and Anne Bannerman

Authors: Elli Karampela

Abstract:

In Specters of Marx (1993), Jacques Derrida refers to the ghost as an Other presence that occupies the space of the self and emanates from there, haunting in its shadowy pastness and threatening/striving to break free. In times of change, ghosts both reflect the dissolution of set principles and voice traumas of the past that create a sense of fear and instability. This paper observes the way female ghosts create connections with the living in the poetry of Joanna Baillie and Anne Bannerman, both integral, albeit under-researched in different ways, writers of the English Romantic period working in the aftermath of the French Revolution. Especially at the beginning of the nineteenth century, when ghost narratives were devoured by readers and enjoyed as stories that re-awakened sensation in times of revolution, there was at the same time fear of intrusion by terror’s unruly forces that threatened to turn the readers restless. The ghost was particularly dangerous because it was associated with memory and the intrusion of past trauma in the here and now. As will be seen, both Baillie and Bannerman explore the idea of the female ghost’s ‘return’ (a Freudian term that will be approached) which breaks both time and space boundaries to raise the suppressed female voice, threaten stability, and correct wrongs. As a result, the varied manifestations of female ghosts render Baillie and Bannerman active in the contemporary discourse about human rights and the reclamation of the agency.

Keywords: poetry, romanticism, spectrality, trauma, women

Procedia PDF Downloads 179
136 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 94
135 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 328
134 Geological Characteristics of the Beni Snouss District

Authors: N. Hadj Mohamed, A. Boutaleb

Abstract:

The Beni Snouss area is characterized by horst and graben structures and it comprises deformed Palaeozoic sedimentary and magmatic rocks overlapping by Mesozoic sediments. Two structural units are distinguished: a Palaeozoic basement and a Mesozoic cover. The study area is densely faulted and major faults strike N110° to N140° and dip vertically The mineralized fault zones are readily distinguishable by their argillic wall rock alteration. The fault zones that are filled with mineralizations, aplites, microgranites and quartz run roughly parallel to each other and are apparently in the same fault system. The Palaeozoic basement rocks contain mineralization occurring as veins, veinlets and disseminations. The Liassic carbonate platform sequence contains Ba (Pb-Zn) sulphide deposits occurring mainly as strata bound, and open space filling.

Keywords: Algeria, basement, Beni Snouss, cover

Procedia PDF Downloads 255
133 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment

Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan

Abstract:

In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.

Keywords: border security, sensors, abnormal activity detection, ontologies

Procedia PDF Downloads 455
132 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 42
131 Petrology of the Post-Collisional Dolerites, Basalts from the Javakheti Highland, South Georgia

Authors: Bezhan Tutberidze

Abstract:

The Neogene-Quaternary volcanic rocks of the Javakheti Highland are products of post-collisional continental magmatism and are related to divergent and convergent margins of Eurasian-Afroarabian lithospheric plates. The studied area constitutes an integral part of the volcanic province of Central South Georgia. Three cycles of volcanic activity are identified here: 1. Late Miocene-Early Pliocene, 2. Late Pliocene-Early /Middle/ Pleistocene and 3. Late Pleistocene. An intense basic dolerite magmatic activity occurred within the time span of the Late Pliocene and lasted until at least Late /Middle/ Pleistocene. The age of the volcanogenic and volcanogenic-sedimentary formation was dated by geomorphological, paleomagnetic, paleontological and geochronological methods /1.7-1.9 Ma/. The volcanic area of the Javakheti Highland contains multiple dolerite Plateaus: Akhalkalaki, Gomarethi, Dmanisi, and Tsalka. Petrographic observations of these doleritic rocks reveal fairly constant mineralogical composition: olivine / Fo₈₇.₆₋₈₂.₇ /, plagioclase / Ab₂₂.₈ An₇₅.₉ Or₁.₃; Ab₄₅.₀₋₃₂.₃ An₅₂.₉₋₆₂.₃ Or₂.₁₋₅.₄/. The pyroxene is an augite and may exhibit a visible zoning: / Wo 39.7-43.1 En 43.5-45.2 Fs 16.8-11.7/. Opaque minerals /magnetite, titanomagnetite/ is abundant as inclusions within olivine and pyroxene crystals. The texture of dolerites exhibits intergranular, holocrystalline to ophitic to sub ophitic granular. Dolerites are most common vesicular rocks. Vesicles range in shape from spherical to elongated and in size from 0.5 mm to than 1.5-2 cm and makeup about 20-50 % of the volume. The dolerites have been subjected to considerable alteration. The secondary minerals in the geothermal field are: zeolite, calcite, chlorite, aragonite, clay-like mineral /dominated by smectites/ and iddingsite –like mineral; rare quartz and pumpellyite are present. These vesicles are filled by secondary minerals. In the chemistry, dolerites are the calc-alkalic transition to sub-alkaline with a predominance of Na₂O over K₂O. Chemical analyses indicate that dolerites of all plateaus of the Javakheti Highland have similar geochemical compositions, signifying that they were formed from the same magmatic source by crystallization of olivine basalis magma which less differentiated / ⁸⁷Sr \ ⁸⁶Sr 0.703920-0704195/. There is one argument, which is less convincing, according to which the dolerites/basalts of the Javakheti Highland are considered to be an activity of a mantle plume. Unfortunately, there does not exist reliable evidence to prove this. The petrochemical peculiarities and eruption nature of the dolerites of the Javakheti Plateau point against their plume origin. Nevertheless, it is not excluded that they influence the formation of dolerite producing primary basaltic magma.

Keywords: calc-alkalic, dolerite, Georgia, Javakheti Highland

Procedia PDF Downloads 238
130 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 435
129 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 43
128 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 293
127 Deep Mill Level Zone (DMLZ) of Ertsberg East Skarn System, Papua; Correlation between Structure and Mineralization to Determined Characteristic Orebody of DMLZ Mine

Authors: Bambang Antoro, Lasito Soebari, Geoffrey de Jong, Fernandy Meiriyanto, Michael Siahaan, Eko Wibowo, Pormando Silalahi, Ruswanto, Adi Budirumantyo

Abstract:

The Ertsberg East Skarn System (EESS) is located in the Ertsberg Mining District, Papua, Indonesia. EESS is a sub-vertical zone of copper-gold mineralization hosted in both diorite (vein-style mineralization) and skarn (disseminated and vein style mineralization). Deep Mill Level Zone (DMLZ) is a mining zone in the lower part of East Ertsberg Skarn System (EESS) that product copper and gold. The Deep Mill Level Zone deposit is located below the Deep Ore Zone deposit between the 3125m to 2590m elevation, measures roughly 1,200m in length and is between 350 and 500m in width. DMLZ planned start mined on Q2-2015, being mined at an ore extraction rate about 60,000 tpd by the block cave mine method (the block cave contain 516 Mt). Mineralization and associated hydrothermal alteration in the DMLZ is hosted and enclosed by a large stock (The Main Ertsberg Intrusion) that is barren on all sides and above the DMLZ. Late porphyry dikes that cut through the Main Ertsberg Intrusion are spatially associated with the center of the DMLZ hydrothermal system. DMLZ orebody hosted in diorite and skarn, both dominantly by vein style mineralization. Percentage Material Mined at DMLZ compare with current Reserves are diorite 46% (with 0.46% Cu; 0.56 ppm Au; and 0.83% EqCu); Skarn is 39% (with 1.4% Cu; 0.95 ppm Au; and 2.05% EqCu); Hornfels is 8% (with 0.84% Cu; 0.82 ppm Au; and 1.39% EqCu); and Marble 7 % possible mined waste. Correlation between Ertsberg intrusion, major structure, and vein style mineralization is important to determine characteristic orebody in DMLZ Mine. Generally Deep Mill Level Zone has 2 type of vein filling mineralization from both hosted (diorite and skarn), in diorite hosted the vein system filled by chalcopyrite-bornite-quartz and pyrite, in skarn hosted the vein filled by chalcopyrite-bornite-pyrite and magnetite without quartz. Based on orientation the stockwork vein at diorite hosted and shallow vein in skarn hosted was generally NW-SE trending and NE-SW trending with shallow-moderate dipping. Deep Mill Level Zone control by two main major faults, geologist founded and verified local structure between major structure with NW-SE trending and NE-SW trending with characteristics slickenside, shearing, gauge, water-gas channel, and some has been re-healed.

Keywords: copper-gold, DMLZ, skarn, structure

Procedia PDF Downloads 476
126 Hydro-Climatological, Geological, Hydrogeological and Geochemical Study of the Coastal Aquifer System of Chiba Watershed (Cape Bon Peninsula)

Authors: Khawla Askri, Mohamed Haythem Msaddek, AbdelAziz Sebei

Abstract:

Climate change combined with the increase in anthropogenic activities will affect coastal groundwater systems around the world and, more particularly, the Cap Bon region in the North East of Tunisia. This study aims to study the impact of climate change and human stress on the salinization and quantification of groundwater in the Wadi Chiba watershed. In this regard, a hydro-climatological study and a hydrogeological study were carried out based on the characterization of the aquifer system of the eastern coast at the level of the watershed of Wadi Chiba in order to seek to identify, first of all, the degradation of the state of the aquifer on the quantitative level by the study of the piezometric and its evolution over time. Secondly, we sought to identify the degradation of the state of the aquifer qualitatively by using the geochemical method, in particular the major elements, to assess the mineralization of the aquifer water and understand its hydrogeochemical functioning. The study of the Na + / Cl- and Ca2 + / Mg2 + chemical relationships confirmed the presence of a marine intrusion downstream of the Wadi Chiba watershed northeast of Cap-Bon accompanied by a piezometric depression. For this purpose, we proceeded to: 1) Mapping of both piezometric data and salinity. 2) The interpretation of the mapping results. 3)Identification of the origin of the localized deterioration in the quality of the aquifer water. Finally, the analysis of the results showed that the scarcity of water is already forcing human actions in the Chiba watershed due to the irrigation of agricultural lands and the overexploitation of the water table in the study area.

Keywords: climate change, human activities, water table, Wadi Chiba watershed, piezometric depression, marine intrusion

Procedia PDF Downloads 54
125 Geochemical Evolution of Microgranular Enclaves Hosted in Cambro-Ordovician Kyrdem Granitoids, Meghalaya Plateau, Northeast India

Authors: K. Mohon Singh

Abstract:

Cambro-Ordovician (512.5 ± 8.7 Ma) felsic magmatism in the Kyrdem region of Meghalaya plateau, herewith referred to as Kyrdem granitoids (KG), intrudes the low-grade Shillong Group of metasediments and Precambrian Basement Gneissic complex forming an oval-shaped plutonic body with longer axis almost trending N-S. Thermal aureole is poorly developed or covered under the alluvium. KG exhibit very coarse grained porphyritic texture with abundant K-feldspar megacrysts (up to 9cm long) and subordinate amount of amphibole, biotite, plagioclase, and quartz. The size of K-feldspar megacrysts increases from margin (Dwarksuid) to the interior (Kyrdem) of the KG pluton. Late felsic pulses as fine grained granite, leucocratic (aplite), and pegmatite veins intrude the KG at several places. Grey and pink varieties of KG can be recognized, but pink colour of KG is the result of post-magmatic fluids, which have not affected the magnetic properties of KG. Modal composition of KG corresponds to quartz monzonite, monzogranite, and granodiorite. KG has been geochemically characterized as metaluminous (I-type) to peraluminous (S-type) granitoids. The KG is characterized by development of variable attitude of primary foliations mostly marked along the margin of the pluton and is located at the proximity of Tyrsad-Barapani lineament. The KG contains country rock xenoliths (amphibolite, gneiss, schist, etc.) which are mostly confined to the margin of the pluton, and microgranular enclaves (ME) are hosted in the porphyritic variety of KG. Microgranular Enclaves (ME) in Kyrdem Granitoids are fine- to medium grained, mesocratic to melanocratic, phenocryst bearing or phenocryst-free, rounded to ellipsoidal showing typical magmatic textures. Mafic-felsic phenocrysts in ME are partially corroded and dissolved because of their involvement in magma-mixing event, and thus represent xenocrysts. Sharp to diffused contacts of ME with host Kyrdem Granitoids, fine grained nature and presence of acicular apatite in ME suggest comingling and undercooling of coeval, semi-solidified ME magma within partly crystalline felsic host magma. Geochemical features recognize the nature of ME (molar A/CNK=0.76-1.42) and KG (molar A/CNK =0.41-1.75) similar to hybrid-type formed by mixing of mantle-derived mafic and crustal-derived felsic magmas. Major and trace including rare earth elements variations of ME suggest the involvement of combined processes such as magma mixing, mingling and crystallization differentiation in the evolution of ME but KG variations appear primarily controlled by fractionation of plagioclase, hornblende biotite, and accessory phases. Most ME are partially to nearly re-equilibrate chemically with felsic host KG during magma mixing and mingling processes.

Keywords: geochemistry, Kyrdem Granitoids, microgranular enclaves, Northeast India

Procedia PDF Downloads 91
124 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks

Authors: Afnan Al-Romi, Iman Al-Momani

Abstract:

The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.

Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN

Procedia PDF Downloads 293
123 Geochemical Characterization of Geothermal Waters in Albania, Preliminary Results

Authors: Aurela Jahja, Katarzyna Wątor, Arjan Beqiraj, Piotr Rusiniak, Nevton Kodhelaj

Abstract:

Albanian geological terrains represent an important node of the Alpine – Mediterranean mountain belt and are divided into several predominantly NNW - SSE striking geotectonic units, which, based on the presence or lack of Cretaceous transgression and magmatic rocks, belong to Internal or External Albanides. The internal (Korabi, Mirdita and Gashi) units are characterized by the Lower Cretaceous discordance and the presence of abundant magmatic rocks whereas in the external (Alps, Krasta-Cukali, Kruja, Ionian, Sazani and Peri Adriatic Depression) units an almost continuous sedimentation from Triassic to Paleogene is evidenced. The internal and external units show relevant differences in both geothermal and heat flow density values. The gradient values vary from 15-21.3 to 36 mK/m, while the heat flow density ranges from 42 to 60 mW/m2, in the external (Preadriatic Depression) and internal (ophiolitic belt) units, respectively. The geothermal fluids, which are found in natural springs and deep oil wells of Albania, are located in four thermo-mineral provinces: a) Peshkopi (Korabi) province; b) Kruja province; c) Preadriatic basin province, and d) South Ionian province. Thirteen geothermal waters were sampled from 11 natural springs and 2 deep wells, of which 6 springs and 2 wells from Kruja, 1 spring from Peshkopia, 2 springs from Preadriatic basin and 2 springs South Ionian province. Temperature, pH and Electrical Conductivity were measured in situ, while in laboratory were analyzed by ICP method major anions and cations and several trace elements (B, Li, Sr, Rb, I, Br, etc.). The measured values of temperature, pH and electrical conductivity range within 17-63°C, 6.26-7.92 and 724- 26856µS/cm intervals, respectively. The chemical type of the Albania thermal waters is variable. In the Kruja province prevail the Cl-SO4-NaCa and Cl-Na-Ca water types; while SO4-Ca, HCO3-Ca and Cl-HCO3-Na-Ca, and Cl-Na are found in the provinces of Peshkopi, Ionian and Preadriatic basin, respectively. In the Cl-SO4-HCO3 triangular diagram most of the geothermal waters are close to the chloride corner that belong to “mature waters”, typical of geothermal deep and hot fluids. Only samples from the Ionian province are located within the region of high bicarbonate concentration and they can be classified as peripheral waters that may have mixed with cold groundwater. In the Na-Ca-Mg and Na-K-Mg triangular diagram the majority of waters fall in the corner of sodium, suggesting that their cation ratios are controlled by mineral-solution equilibrium. There is a linear relationship between Cl and B which indicates the mixing of geothermal water with cold water, where the low-chlorine thermal waters from Ionian basin and Preadriatic depression provinces are distinguished by high-chlorine thermal waters from Kruja province. The Cl/Br molar ration of the thermal waters from Kruja province ranges from 1000 to 2660 and separates them from the thermal waters of Ionian basin and Preadriatic depression provinces having Cl/Br molar ratio lower than 650. The apparent increase of Cl/Br molar ratio that correlates with the increasing of the chloride, is probably related with dissolution of the Halite.

Keywords: geothermal fluids, geotectonic units, natural springs, deep wells, mature waters, peripheral waters

Procedia PDF Downloads 186
122 Subtropical Potential Vorticity Intrusion Drives Increasing Tropospheric Ozone over the Tropical Central Pacific

Authors: Debashis Nath

Abstract:

Drawn from multiple reanalysis datasets, an increasing trend and westward shift in the number of Potential Vorticity (PV) intrusion events over the Pacific are evident. The increased frequency can be linked to a long-term trend in upper tropospheric (UT, 200 hPa) equatorial westerly wind and subtropical jets (STJ) during boreal winter to spring. These may be resulting from anomalous warming and cooling over the western Pacific warm pool and the tropical eastern Pacific, respectively. The intrusions brought dry and ozone rich air of stratospheric origin deep into the tropics. In the tropical UT, interannual ozone variability is mainly related to convection associated with El Niño/Southern Oscillation. Zonal mean stratospheric overturning circulation organizes the transport of ozone rich air poleward and downward to the high and midlatitudes leading there to higher ozone concentration. In addition to these well described mechanisms, we observe a long-term increasing trend in ozone flux over the northern hemispheric outer tropical (10–25°N) central Pacific that results from equatorward transport and downward mixing from the midlatitude UT and lower stratosphere (LS) during PV intrusions. This increase in tropospheric ozone flux over the Pacific Ocean may affect the radiative processes and changes the budget of atmospheric hydroxyl radicals. The results demonstrate a long-term increase in outer tropical Pacific PV intrusions linked with the strengthening of the upper tropospheric equatorial westerlies and weakening of the STJ. Zonal variation in SST, characterized by gradual warming in the western Pacific–warm pool and cooling in the central–eastern Pacific, is associated with the strengthening of the Pacific Walker circulation. In the Western Pacific enhanced convective activity leads to precipitation, and the latent heat released in the process strengthens the Pacific Walker circulation. However, it is linked with the trend in global mean temperature, which is related to the emerging anthropogenic greenhouse signal and negative phase of PDO. On the other hand, the central-eastern Pacific cooling trend is linked to the weakening of the central–eastern Pacific Hadley circulation. It suppresses the convective activity due to sinking air motion and imports less angular momentum to the STJ leading to a weakened STJ. While, more PV intrusions result from this weaker STJ on its equatorward side; significantly increase the stratosphere-troposphere exchange processes on the longer timescale. This plays an important role in determining the atmospheric composition, particularly of tropospheric ozone, in the northern outer tropical central Pacific. It may lead to more ozone of stratospheric origin in the LT and even in the marine boundary, which may act as harmful pollutants and affect the radiative processes by changing the global budgets of atmospheric hydroxyl radicals.

Keywords: PV intrusion, westerly duct, ozone, Central Pacific

Procedia PDF Downloads 211
121 Participation of Titanium Influencing the Petrological Assemblage of Mafic Dyke: Salem, South India

Authors: Ayoti Banerjee, Meenakshi Banerjee

Abstract:

The study of metamorphic reaction textures is important in contributing to our understanding of the evolution of metamorphic terranes. Where preserved, they provide information on changes in the P-T conditions during the metamorphic history of the rock, and thus allow us to speculate on the P-T-t evolution of the terrane. Mafic dykes have attracted the attention of petrologists because they act as window to mantle. This rock represents a mafic dyke of doleritic composition. It is fine to medium grained in which clinopyroxene are enclosed by the lath shaped plagioclase grains to form spectacular ophitic texture. At places, sub ophitic texture was also observed. Grains of pyroxene and plagioclase show very less deformation typically plagioclase showing deformed lamella along with plagioclase-clinopyroxene-phyric granoblastic fabric within a groundmass of feldspar microphenocrysts and Fe–Ti oxides. Both normal and reverse zoning were noted in the plagioclase laths. The clinopyroxene grains contain exsolved phases such as orthopyroxene, plagioclase, magnetite, ilmenite along the cleavage traces and the orthopyroxene lamella form granules in the periphery of the clinopyroxene grains. Garnet corona also develops preferentially around plagioclase at the contact of clinopyroxene, ilmenite or magnetite. Tiny quartz and K-fs grains showed symplectic intergrowth with garnet at a few places. The product quartz formed along with garnet rims the coronal garnet and the reacting clinopyroxene. Thin amphibole corona formed along the periphery of deformed plagioclase and clinopyroxene occur as patches over the magmatic minerals. The amphibole coronas cannot be assigned to a late magmatic stage and are interpreted as reactive being restricted to the contact between clinopyroxene and plagioclase, thus postdating the crystallization of both. The amphibole and garnet do not share grain boundary in the entire rock and is thus pointing towards simultaneous crystallization. Olivine is absent. Spectacular myrmekitic growth of orthoclase and quartz rimming the plagioclase is consistent with the potash metasomatic effects that is also found in other rocks of this region. These textural features are consistent with a phase of fluid induced metamorphism (retrogression). But the appearance of coronal garnet and amphibole exclusive of each other reflects the participation if Ti as the prime reason. Presence of Ti as a reactant phase is a must for amphibole forming reactions whereas it is not so in case of garnet forming reactions although the reactants are the same plagioclase and clinopyroxene in both cases. These findings are well validated by petrographical and textural analysis. In order to obtain balanced chemical reactions that explain formation of amphibole and garnet in the mafic dyke rocks a matrix operation technique called Singular Value Decomposition (SVD) was adopted utilizing the measured chemical compositions of the minerals. The computer program C-Space was used for this purpose and the required compositional matrix. Data fed to C-Space was after doing cation-calculation of the oxide percentages obtained from EPMA analysis. The Garnet-Clinopyroxene geothermometer yielded a temperature of 650 degrees Celsius. The Garnet-Clinopyroxene-Plagioclase geobarometer and Al-in amphibole yielded roughly 7.5 kbar pressure.

Keywords: corona, dolerite, geothermometer, metasomatism, metamorphic reaction texture, retrogression

Procedia PDF Downloads 240
120 Spatial Dynamic of Pico- and Nano-Phytoplankton Communities in the Mouth of the Seine River

Authors: M. Schapira, S. Françoise, F. Maheux, O. Pierre-Duplessix, E. Rabiller, B. Simon, R. Le Gendre

Abstract:

Pico- and nano-phytoplankton are abundant and ecologically critical components of the autotrophic communities in the pelagic realm. While the role of physical forcing related to tidal cycle, water mass intrusion, nutrient availability, mixing and stratification on microphytoplankton blooms have been widely investigated, these are often overlooked for pico- and nano-phytoplankton especially in estuarine waters. This study investigates changes in abundances and community composition of pico- and nano-phytoplankton under different estuarine tidal conditions in the mouth of the Seine River in relation to nutrient availability, water column stratification and spatially localized currents. Samples were collected each day at high tide, over spring tide to neap tide cycle, from 21 stations homogeneously distributed in the Seine river month in May 2011. Vertical profiles of temperature, salinity and fluorescence were realized at each sampling station. Sub-surface water samples (i.e. 1 m depth) were collected for nutrients (i.e. N, P and Si), phytoplankton biomass (i.e. Chl a) and pico- and nano-phytoplankton enumeration and identification. Pico- and nano-phytoplankton populations were identified and quantified using flow cytometry. Total abundances tend to decrease from spring tide to neap tide. Samples were characterized by high abundances of Synechococcus and Cryptophyceae. The composition of the pico- and nano-phytoplankton varied greatly under the different estuarine tidal conditions. Moreover, at the scale of the river mouth, the pico- and nano-phytoplankton population exhibited patchy distribution patterns that were closely controlled by water mass intrusion from the Sea, freshwater inputs from the Seine River and the geomorphology of the river mouth. This study highlights the importance of physical forcing to the community composition of pico- and nano-phytoplankton that may be critical for the structure of the pelagic food webs in estuarine and adjacent coastal seas.

Keywords: nanophytoplancton, picophytoplankton, physical forcing, river mouth, tidal cycle

Procedia PDF Downloads 328
119 Effect of Sanitary-Environmental Conditions of Diabetic Hypertension Incidence of Displaced Persons

Authors: Radmila Maksimovic, Sonja Ketin, Rade Biocanin, Jelena Maksimovic

Abstract:

The abnormal conditions of life and work genetic factors often play a major role in incidence of diabetes-diabetes, heart disease and vascular disease, jaundice, and post traumatic stress. Trauma and post traumatic stress are most common in the displaced persons,and the focus of this paper is to shed light on this issue in former Yugoslavia, Yugoslavia and now in our country. This is caused by increased beta-cell sensitivity to viruses, the development of autoimmune antibodies against its own pancreascells, degenerative changes in cells that r esult in change of structure and insulin. In this paper, we dealt with traumatic events and long-term psycho social consequences for internally displaced persons, several years after displacement, and found a high level of PTSD symptoms. This stress is present in almost 1/3 of internally displaced persons, and every sixth person is suffering from PTSD in the past. Respondents generally suffer from symptoms of intrusion, but there was a large number of symptoms, avoidance and increased arousal. We also found that gender, age andeducation related to the symptoms. Females, and older respondents and internally displaced persons with lower levels of education how a higher level of PTSD symptoms, especially symptoms of intrusion and increase darousal. It is a highly traumatized sample in which more than 1/2 of respondents experienced more than three traumatic events in life,although the number of traumas experienced before, during and after the conflict varies.We found that during the war, internally displaced persons haveexperienced more traumatic events compared with the periodbefore and after the conflict. Trauma are different in type. No significant correlation between the number of experienced trauma and PTSD, suggesting that it is necessary to further study the structure of past traumas and the intermediary effects of certain risk factors and protective factors.

Keywords: living environment, displaced persons, jaundice, diabetes, trauma, diabetic hypertension, post-traumatic stress (PTSD), treatment

Procedia PDF Downloads 362
118 Impact of Climate Change and Anthropogenic Effect on Hilsa Fishery Management in South-East Asia: Urgent Need for Trans-Boundary Policy

Authors: Dewan Ali Ahsan

Abstract:

Hilsa (Tenualosa ilisha) is one of the most important anadromous fish species of the trans-boundary ecosystem of Bangladesh, India and Myanmar. Hilsa is not only an economically important species specially for Bangladesh and India, but also for the integral part of the culture of the Bangladesh and India. This flag-ship species in Bangladesh contributed alone of 10.82% of the total fish production of the country and about 75% of world’s total catch of hilsa comes from Bangladesh alone. As hilsa is an anadromous fish, it migrates from the Bay of Bengal to rivers for spawning, nursing and growing and for all of these purposes hilsa needs freshwaters. Ripe broods prefer turbid, fast flowing freshwater for spawning but young prefer clear and slow flowing freshwater. Climate change (salinity intrusion, sea level rise, temperature rise, impact of fresh water flow), unplanned developmental activities and other anthropogenic activities all together are severely damaging the hilsa stock and its habitats. So, climate change and human interferences are predicted to have a range of direct and indirect impacts on marine and freshwater hilsa fishery, with implications for fisheries-dependent economies, coastal communities and fisherfolk. The present study identified that salinity intrusion, siltation in river bed, decrease water flow from upstream, fragmentation of river in dry season, over exploitation, use of small mesh nets are the major reasons to affect the upstream migration of hilsa and its sustainable management. It has been also noticed that Bangladesh government has taken some actions for hilsa management. Government is trying to increase hilsa production not only by conserving jatka (juvenile hilsa) but also protecting the brood hilsa during the breeding seasons by imposing seasonal ban on fishing, restricted mesh size etc. Unfortunately, no such management plans are available for Indian and Myanmar territory. As hilsa is a highly migratory trans-boundary fish in the Bay of Bengal (and all of these countries share the same stock), it is essential to adopt a joint management policy (by Bangladesh-India-Myanmar) for the sustainable management for the hilsa stock.

Keywords: hilsa, climate change, south-east Asia, fishery management

Procedia PDF Downloads 477