• Login
    View Item 
    •   Home
    • Conference Proceedings
    • Arizona-Nevada Academy of Science
    • Hydrology and Water Resources in Arizona and the Southwest
    • Hydrology and Water Resources in Arizona and the Southwest, Volume 01 (1971)
    • View Item
    •   Home
    • Conference Proceedings
    • Arizona-Nevada Academy of Science
    • Hydrology and Water Resources in Arizona and the Southwest
    • Hydrology and Water Resources in Arizona and the Southwest, Volume 01 (1971)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UA Campus RepositoryCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournal

    My Account

    LoginRegister

    About

    AboutUA Faculty PublicationsUA DissertationsUA Master's ThesesUA Honors ThesesUA PressUA YearbooksUA CatalogsUA Libraries

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Augmenting Annual Runoff Records Using Tree-Ring Data

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    hwr_01-001-012.pdf
    Size:
    144.7Kb
    Format:
    PDF
    Download
    Author
    Stockton, Charles W.
    Fritts, Harold C.
    Affiliation
    Laboratory of Tree-Ring Research, The University of Arizona, Tucson, Arizona, 85721
    Issue Date
    1971-04-23
    Keywords
    Water resources development -- Arizona.
    Hydrology -- Arizona.
    Hydrology -- Southwestern states.
    Water resources development -- Southwestern states.
    Runoff
    Statistical models
    Mathematical studies
    Climatic data
    Watersheds (basins)
    Arizona
    New Mexico
    Precipitation (atmospheric)
    Temperature
    Evapotranspiration
    Seasonal
    Spatial distribution
    Time series analysis
    Sampling
    Correlation analysis
    Regression analysis
    Variability
    Arid lands
    Hydrologic data
    Analysis of covariance
    Principal components analysis
    Show allShow less
    
    Metadata
    Show full item record
    Rights
    Copyright ©, where appropriate, is held by the author.
    Collection Information
    This article is part of the Hydrology and Water Resources in Arizona and the Southwest collections. Digital access to this material is made possible by the Arizona-Nevada Academy of Science and the University of Arizona Libraries. For more information about items in this collection, contact anashydrology@gmail.com.
    Publisher
    Arizona-Nevada Academy of Science
    Journal
    Hydrology and Water Resources in Arizona and the Southwest
    Abstract
    Statistical analyses of existing hydrologic records suffer from the problem that such records are of relatively short duration, and therefore may not necessarily be random samples of the infinite population of events. On the hypothesis that tree-ring series and runoff series respond to a common climatic signal or signals that permit prediction of annual runoff from annual ring-width index, tree-ring data are used to extend available runoff records backwards in time to permit more accurate estimates of the 3 most common statistics used in hydrology: the mean, the variance and the 1st order correlation. It is assumed that both series are generated by the climatic parameters of precipitation, temperature, evapotranspiration, seasonal regime and spatial distribution. Of major concern in the reconstruction of annual runoff series from tree-ring records was the difference in persistence within each of the 2 series. A matrix of the tree-ring data was constructed, lagged up to 3 times and principal components were extracted. The covariation in this matrix was then decomposed by extracting the Eigen-vectors, and multiple regression was then used to weight the respective series and the differences in persistence were determined. This method was applied to watersheds of diverse characteristics and improved estimates of the mean and variance were obtained.
    ISSN
    0272-6106
    Collections
    Hydrology and Water Resources in Arizona and the Southwest, Volume 01 (1971)

    entitlement

     

    Related items

    Showing items related by title, author, creator and subject.

    • Thumbnail

      An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation

      Hariri, Salim; Pacheco Ramirez, Jesus Horacio; Hariri, Salim; Akoglu, Ali; Ditzler, Gregory (The University of Arizona., 2017)
      Advances in mobile and pervasive computing, social network technologies and the exponential growth in Internet applications and services will lead to the development of the Internet of Things (IoT). The IoT services will be a key enabling technology to the development of smart infrastructures that will revolutionize the way we do business, manage critical services, and how we secure, protect, and entertain ourselves. Large-scale IoT applications, such as critical infrastructures (e.g., smart grid, smart transportation, smart buildings, etc.) are distributed systems, characterized by interdependence, cooperation, competition, and adaptation. The integration of IoT premises with sensors, actuators, and control devices allows smart infrastructures to achieve reliable and efficient operations, and to significantly reduce operational costs. However, with the use of IoT, we are experiencing grand challenges to secure and protect such advanced information services due to the significant increase in the attack surface. The interconnections between a growing number of devices expose the vulnerability of IoT applications to attackers. Even devices which are intended to operate in isolation are sometimes connected to the Internet due to careless configuration or to satisfy special needs (e.g., they need to be remotely managed). The security challenge consists of identifying accurately IoT devices, promptly detect vulnerabilities and exploitations of IoT devices, and stop or mitigate the impact of cyberattacks. An Intrusion Detection System (IDS) is in charge of monitoring the behavior of protected systems and is looking for malicious activities or policy violations in order to produce reports to a management station or even perform proactive countermeasures against the detected threat. Anomaly behavior detection is a technique that aims at creating models for the normal behavior of the network and detects any significant deviation from normal operations. With the ability to detect new and novel attacks, the anomaly detection is a promising IDS technique that is actively pursued by researchers. Since each IoT application has its own specification, it is hard to develop a single IDS which works properly for all IoT layers. A better approach is to design customized intrusion detection engines for different layers and then aggregate the analysis results from these engines. On the other hand, it would be cumbersome and takes a lot of effort and knowledge to manually extract the specification of each system. So it will be appropriate to formulate our methodology based on machine learning techniques which can be applied to produce efficient detection engines for different IoT applications. In this dissertation we aim at formalizing a general methodology to perform anomaly behavior analysis for IoT. We first introduce our IoT architecture for smart infrastructures that consists of four layers: end nodes (devices), communications, services, and application. Then we show our multilayer IoT security framework and IoT architecture that consists of five planes: function specification or model plane, attack surface plane, impact plane, mitigation plane, and priority plane. We then present a methodology to develop a general threat model in order to recognize the vulnerabilities in each layer and the possible countermeasures that can be deployed to mitigate their exploitation. In this scope, we show how to develop and deploy an anomaly behavior analysis based intrusion detection system (ABA-IDS) to detect anomalies that might be triggered by attacks against devices, protocols, information or services in our IoT framework. We have evaluated our approach by launching several cyberattacks (e.g. Sensor Impersonation, Replay, and Flooding attacks) against our testbeds developed at the University of Arizona Center for Cloud and Autonomic Computing. The results show that our approach can be used to deploy effective security mechanisms to protect the normal operations of smart infrastructures integrated to the IoT. Moreover, our approach can detect known and unknown attacks against IoT with high detection rate and low false alarms.
    • Thumbnail

      REDUCTION AND ANALYSIS PROGRAM FOR TELEMETRY RECORDINGS (RAPTR): ANALYSIS AND DECOMMUTATION SOFTWARE FOR IRIG 106 CHAPTER 10 DATA

      Kim, Jeong Min; Eglin Air Force Base (International Foundation for Telemetering, 2005-10)
      Solid State On-Board Recording is becoming a revolutionary way of recording airborne telemetry data and IRIG 106 Chapter 10 “Solid State On-Board Recorder Standard” provides interface documentation for solid state digital data acquisition. The Reduction and Analysis Program for Telemetry Recordings (RAPTR) is a standardized and extensible software application developed by the 96th Communications Group, Test and Analysis Division, at Eglin AFB, and provides a data reduction capability for disk files in Chapter 10 format. This paper provides the system description and software architecture of RAPTR and presents the 96th Communication Group’s total solution for Chapter 10 telemetry data reduction.
    • Thumbnail

      Discourse analysis of Retrospective Miscue Analysis sessions: Talking about the reading process with a fourth-grade reader

      Goodman, Yetta M.; Fox, Dana L.; Black, Wendy Lou (The University of Arizona., 1999)
      The purpose of this study was to examine the discourse of six selected Retrospective Miscue Analysis (RMA) session transcripts for effective and promising procedures, questions and discussion strategies. Data sources consisted of session transcripts and interviews to determine how the RMA team's discourse accomplished their intended purposes across six RMA sessions with a fourth grade reader. Phases of the analysis included (1) verifying the existing data sets, (2) selecting six RMA sessions from the set of eleven, (3) conducting and analyzing interviews with the RMA team, (4) structural analysis of sessions, (5) speech act analysis of discourse moves, (6) sequential analysis of question cycles, (7) categorization of patterns that emerged in the data. Three broad discourse themes, based on the RMA team's stated purposes for the RMA sessions, guided the categorization of team members' talk: (1) discourse moves providing revaluing, (2) discourse moves providing instruction, and (3) discourse moves encouraging the reader's strategy use. The structural analysis of the RMA sessions generated elements of the instructional sequences and phases that made up each session, and a profile of RMA session procedures. Findings revealed: the RMA team used a wide range of question types to analyze miscues; discourse patterns involved in instruction and revaluing involved a variety of question cycles, position statement and 'you-statements' about the readers' reading strategies; problematic discourse sequences stemmed from problematic questions, responses and belief structures involved in interactions; by analyzing other readers in comparison with his own reading the reader's self-concept increased.
    The University of Arizona Libraries | 1510 E. University Blvd. | Tucson, AZ 85721-0055
    Tel 520-621-6442 | repository@u.library.arizona.edu
    DSpace software copyright © 2002-2017  DuraSpace
    Quick Guide | Contact Us | Send Feedback
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.