69 resultados para Mercury intrusion porosimetry


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pulicat Lake sediments are often severely polluted with the toxic heavy metal mercury. Several mercury-resistant strains of Bacillus species were isolated from the sediments and all the isolates exhibited broad spectrum resistance (resistance to both organic and inorganic mercuric compounds). Plasmid curing assay showed that all the isolated Bacillus strains carry chromosomally borne mercury resistance. Polymerase chain reaction and southern hybridization analyses using merA and merB3 gene primers/probes showed that five of the isolated Bacillus strains carry sequences similar to known merA and merB3 genes. Results of multiple sequence alignment revealed 99% similarity with merA and merB3 of TnMERI1 (class II transposons). Other mercury resistant Bacillus species lacking homology to these genes were not able to volatilize mercuric chloride, indicating the presence of other modes of resistance to mercuric compounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pulicat Lake sediments are often severely polluted with the toxic heavy metal mercury. Several mercury-resistant strains of Bacillus species were isolated from the sediments and all the isolates exhibited broad spectrum resistance (resistance to both organic and inorganic mercuric compounds). Plasmid curing assay showed that all the isolated Bacillus strains carry chromosomally borne mercury resistance. Polymerase chain reaction and southern hybridization analyses using merA and merB3 gene primers/probes showed that five of the isolated Bacillus strains carry sequences similar to known merA and merB3 genes. Results of multiple sequence alignment revealed 99% similarity with merA and merB3 of TnMERI1 (class II transposons). Other mercury resistant Bacillus species lacking homology to these genes were not able to volatilize mercuric chloride, indicating the presence of other modes of resistance to mercuric compounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The electrochemical reduction of Cu(II)-CyDTA (CyDTA — trans 1,2-cyclohexanediamine N, N, N′, N′ tetraacetic acid) by impedance method reveals the unusual behaviour of complex plane polarograms owing to potential dependence of double layer capacitance. The impedance plane plots by frequency variation method indicates the quasi-reversible nature of the system. From these plots the chargetransfer resistance at various potentials was evaluated. The standard rate constant was evaluated which complements the prediction of impedance plots for the quasireversible behaviour of the system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study of electrochemical reduction of Cu(II)-EDTA system by phase sensitive a.c. impedance method at dropping mercury electrode reveals several interesting features. The complex plane polarograms exhibit loop like shape in contrast to the classical zinc ion reduction where crest like shape is found. Again, the relative placement of peaks of in-phase and quadrature components, and the relative placement of portions before and after the peaks of complex plane polarograms are different from that of zinc ion reduction. The complex plane plots suggest that electrochemical reduction of Cu-EDTA is charge transfer controlled.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a low-complexity algorithm for intrusion detection in the presence of clutter arising from wind-blown vegetation, using Passive Infra-Red (PIR) sensors in a Wireless Sensor Network (WSN). The algorithm is based on a combination of Haar Transform (HT) and Support-Vector-Machine (SVM) based training and was field tested in a network setting comprising of 15-20 sensing nodes. Also contained in this paper is a closed-form expression for the signal generated by an intruder moving at a constant velocity. It is shown how this expression can be exploited to determine the direction of motion information and the velocity of the intruder from the signals of three well-positioned sensors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main objective of this investigation was to understand the strength development of clays below fusion or vitrification temperatures of 900°C. The other objective was to establish threshold temperatures to produce a satisfactory construction material from clayey sediments from the Western Beaufort Sea for shore protection of artificial islands with minimum expense of thermal energy. Studies were, therefore, conducted using kaolinite, bentonite, and a clayey sediment from the Beaufort Sea. Unconfined-compressive-strength tests were conducted on clay samples heat treated from 110 to 700°C. Furthermore, to understand the factors responsible for strength-development-thermogravimetric studies and pore-size analysis, using mercury porosimetry, were also conducted. A gradual increase in strength was obtained with an increase in firing temperature. However, substantial and permanent increase in strength occurred only after dehydroxylation of all the clays studied; Clay samples heated to temperatures above dehydroxylation became resistant to disintegration upon immersion in water. Results indicate that the clayey sediments from Western Beaufort Sea have to be heat treated to about 600°C to produce granular material for use as a fill or shore-protection material for artificial islands.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The problem of sensor-network-based distributed intrusion detection in the presence of clutter is considered. It is argued that sensing is best regarded as a local phenomenon in that only sensors in the immediate vicinity of an intruder are triggered. In such a setting, lack of knowledge of intruder location gives rise to correlated sensor readings. A signal-space view-point is introduced in which the noise-free sensor readings associated to intruder and clutter appear as surfaces f(s) and f(g) and the problem reduces to one of determining in distributed fashion, whether the current noisy sensor reading is best classified as intruder or clutter. Two approaches to distributed detection are pursued. In the first, a decision surface separating f(s) and f(g) is identified using Neyman-Pearson criteria. Thereafter, the individual sensor nodes interactively exchange bits to determine whether the sensor readings are on one side or the other of the decision surface. Bounds on the number of bits needed to be exchanged are derived, based on communication-complexity (CC) theory. A lower bound derived for the two-party average case CC of general functions is compared against the performance of a greedy algorithm. Extensions to the multi-party case is straightforward and is briefly discussed. The average case CC of the relevant greaterthan (CT) function is characterized within two bits. Under the second approach, each sensor node broadcasts a single bit arising from appropriate two-level quantization of its own sensor reading, keeping in mind the fusion rule to be subsequently applied at a local fusion center. The optimality of a threshold test as a quantization rule is proved under simplifying assumptions. Finally, results from a QualNet simulation of the algorithms are presented that include intruder tracking using a naive polynomial-regression algorithm. 2010 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of quickest detection of an intrusion using a sensor network, keeping only a minimal number of sensors active. By using a minimal number of sensor devices,we ensure that the energy expenditure for sensing, computation and communication is minimized (and the lifetime of the network is maximized). We model the intrusion detection (or change detection) problem as a Markov decision process (MDP). Based on the theory of MDP, we develop the following closed loop sleep/wake scheduling algorithms: 1) optimal control of Mk+1, the number of sensors in the wake state in time slot k + 1, 2) optimal control of qk+1, the probability of a sensor in the wake state in time slot k + 1, and an open loop sleep/wake scheduling algorithm which 3) computes q, the optimal probability of a sensor in the wake state (which does not vary with time),based on the sensor observations obtained until time slot k.Our results show that an optimum closed loop control onMk+1 significantly decreases the cost compared to keeping any number of sensors active all the time. Also, among the three algorithms described, we observe that the total cost is minimum for the optimum control on Mk+1 and is maximum for the optimum open loop control on q.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fusion of multiple intrusion detection systems results in a more reliable and accurate detection for a wider class of intrusions. The paper presented here introduces the mathematical basis for sensor fusion and provides enough support for the acceptability of sensor fusion in performance enhancement of intrusion detection systems. The sensor fusion system is characterized and modeled with no knowledge of the intrusion detection systems and the intrusion detection data. The theoretical analysis is supported with an experimental illustration with three of the available intrusion detection systems using the DARPA 1999 evaluation data set.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have investigated the self-assembly of didecyldiselenide on gold containing mercury using X-ray photoelectron spectroscopy, cyclic voltammetry and infrared spectroscopy. The analysis of intensity and chemical shift of selected Se, Hg, and Au photoelectron lines on samples with increasing Hg content, show that didecyldiselenide adsorption strongly contributed to segregation of bulk Hg to the surface. The voltammetry results support this conclusion and suggest the formation of Hg-Au surface amalgam. The Hg surface segregation effect must be related to the restructuring of the surface following initial adsorption, and to the strong selenophilicity of Hg. The reflectance absorbance infrared spectroscopy studies show that the molecular layer on Hg-Au substrates lacks good order.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A transverse magnetic field was used to fix the cathode spot of a low pressure mercury arc with liquid cathode It was noticed that such fixation causes consider-abledepression of the emission zone below the mercury level.This depression varies with the arc current and the magnetic field and is associated with an increase in the arc voltage drop. It indicates appreciable pressure in the emission zone.