7 resultados para Seawater Intrusion
em Digital Commons at Florida International University
Resumo:
This study investigates the potential release of from carbonate aquifers exposed to seawater intrusion. Adsorption and desorption of in the presence of deionized water (DIW) and seawater were conducted on a large block of Pleistocene age limestone to simulate the effects of seawater intrusion into a coastal carbonate aquifer at the laboratory scale. The limestone showed strong adsorption of in DIW, while adsorption was significantly less in the presence of seawater. Dissolution of CaCO3 was found to prevent adsorption at salinities less than 30 psu. Adsorption of was limited at higher salinities (30–33 psu), due to competition with ions for adsorption sites. At a salinity3 precipitated. Concentrations of between 2 and 5 μmol/L were released by desorption when the limestone was exposed to seawater. The results of this study suggest that as seawater intrudes into an originally freshwater coastal aquifer, adsorbed may be released into the groundwater. Consequently, adsorbed is expected to be released from coastal carbonate aquifers world-wide as sea level continues to rise exposing more of the freshwater aquifer to seawater.
Resumo:
Groundwater systems of different densities are often mathematically modeled to understand and predict environmental behavior such as seawater intrusion or submarine groundwater discharge. Additional data collection may be justified if it will cost-effectively aid in reducing the uncertainty of a model's prediction. The collection of salinity, as well as, temperature data could aid in reducing predictive uncertainty in a variable-density model. However, before numerical models can be created, rigorous testing of the modeling code needs to be completed. This research documents the benchmark testing of a new modeling code, SEAWAT Version 4. The benchmark problems include various combinations of density-dependent flow resulting from variations in concentration and temperature. The verified code, SEAWAT, was then applied to two different hydrological analyses to explore the capacity of a variable-density model to guide data collection. ^ The first analysis tested a linear method to guide data collection by quantifying the contribution of different data types and locations toward reducing predictive uncertainty in a nonlinear variable-density flow and transport model. The relative contributions of temperature and concentration measurements, at different locations within a simulated carbonate platform, for predicting movement of the saltwater interface were assessed. Results from the method showed that concentration data had greater worth than temperature data in reducing predictive uncertainty in this case. Results also indicated that a linear method could be used to quantify data worth in a nonlinear model. ^ The second hydrological analysis utilized a model to identify the transient response of the salinity, temperature, age, and amount of submarine groundwater discharge to changes in tidal ocean stage, seasonal temperature variations, and different types of geology. The model was compared to multiple kinds of data to (1) calibrate and verify the model, and (2) explore the potential for the model to be used to guide the collection of data using techniques such as electromagnetic resistivity, thermal imagery, and seepage meters. Results indicated that the model can be used to give insight to submarine groundwater discharge and be used to guide data collection. ^
Resumo:
In this manuscript we define a new term we call coastal groundwater discharge (CGD), which is related to submarine groundwater discharge (SGD), but occurs when seawater intrudes inland to force brackish groundwater to discharge to the coastal wetlands. A hydrologic and geochemical investigation of both the groundwater and surface water in the southern Everglades was conducted to investigate the occurrence of CGD associated with seawater intrusion. During the wet season, the surface water chemistry remained fresh. Enhanced chloride, sodium, and calcium concentrations, indicative of brackish groundwater discharge, were observed in the surface water during the dry season. Brackish groundwaters of the southern Everglades contain 1–2.3μM concentrations of total phosphorus (TP). These concentrations exceed the expected values predicted by conservative mixing of local fresh groundwater and intruding seawater, which both have TPμM. The additional source of TP may be from seawater sediments or from the aquifer matrix as a result of water–rock interactions (such as carbonate mineral dissolution and ion exchange reactions) induced by mixing fresh groundwater with intruding seawater. We hypothesize that CGD maybe an additional source of phosphorus (a limiting nutrient) to the coastal wetlands of the southern Everglades.
Resumo:
Coastal ecosystems lie at the forefront of sea level rise. We posit that before the onset of actual inundation, sea level rise will influence the species composition of coastal hardwood hammocks and buttonwood (Conocarpus erectus L.) forests of the Everglades National Park based on tolerance to drought and salinity. Precipitation is the major water source in coastal hammocks and is stored in the soil vadose zone, but vadose water will diminish with the rising water table as a consequence of sea level rise, thereby subjecting plants to salt water stress. A model is used to demonstrate that the constraining effect of salinity on transpiration limits the distribution of freshwater-dependent communities. Field data collected in hardwood hammocks and coastal buttonwood forests over 11 years show that halophytes have replaced glycophytes. We establish that sea level rise threatens 21 rare coastal species in Everglades National Park and estimate the relative risk to each species using basic life history and population traits. We review salinity conditions in the estuarine region over 1999–2009 and associate wide variability in the extent of the annual seawater intrusion to variation in freshwater inflows and precipitation. We also examine species composition in coastal and inland hammocks in connection with distance from the coast, depth to water table, and groundwater salinity. Though this study focuses on coastal forests and rare species of South Florida, it has implications for coastal forests threatened by saltwater intrusion across the globe.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
Major portion of hurricane-induced economic loss originates from damages to building structures. The damages on building structures are typically grouped into three main categories: exterior, interior, and contents damage. Although the latter two types of damages, in most cases, cause more than 50% of the total loss, little has been done to investigate the physical damage process and unveil the interdependence of interior damage parameters. Building interior and contents damages are mainly due to wind-driven rain (WDR) intrusion through building envelope defects, breaches, and other functional openings. The limitation of research works and subsequent knowledge gaps, are in most part due to the complexity of damage phenomena during hurricanes and lack of established measurement methodologies to quantify rainwater intrusion. This dissertation focuses on devising methodologies for large-scale experimental simulation of tropical cyclone WDR and measurements of rainwater intrusion to acquire benchmark test-based data for the development of hurricane-induced building interior and contents damage model. Target WDR parameters derived from tropical cyclone rainfall data were used to simulate the WDR characteristics at the Wall of Wind (WOW) facility. The proposed WDR simulation methodology presents detailed procedures for selection of type and number of nozzles formulated based on tropical cyclone WDR study. The simulated WDR was later used to experimentally investigate the mechanisms of rainwater deposition/intrusion in buildings. Test-based dataset of two rainwater intrusion parameters that quantify the distribution of direct impinging raindrops and surface runoff rainwater over building surface — rain admittance factor (RAF) and surface runoff coefficient (SRC), respectively —were developed using common shapes of low-rise buildings. The dataset was applied to a newly formulated WDR estimation model to predict the volume of rainwater ingress through envelope openings such as wall and roof deck breaches and window sill cracks. The validation of the new model using experimental data indicated reasonable estimation of rainwater ingress through envelope defects and breaches during tropical cyclones. The WDR estimation model and experimental dataset of WDR parameters developed in this dissertation work can be used to enhance the prediction capabilities of existing interior damage models such as the Florida Public Hurricane Loss Model (FPHLM).^
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.