Role of Modern Methods of Data Analysis for Interpretation of Hydrologic Data in Arizona
AffiliationDepartment of Hydrology and Water Resources, University of Arizona, Tucson, Arizona 85721
Department of Systems and Industrial Engineering | Department of Watershed Management
KeywordsHydrology -- Arizona.
Water resources development -- Arizona.
Hydrology -- Southwestern states.
Water resources development -- Southwestern states.
Time series analysis
MetadataShow full item record
RightsCopyright ©, where appropriate, is held by the author.
Collection InformationThis article is part of the Hydrology and Water Resources in Arizona and the Southwest collections. Digital access to this material is made possible by the Arizona-Nevada Academy of Science and the University of Arizona Libraries. For more information about items in this collection, contact email@example.com.
PublisherArizona-Nevada Academy of Science
AbstractMathematical models, requiring substantial data, of hydrologic and water resources systems are under intensive investigation. The processes of data analysis and model building are interrelated so that models may be used to forecast for scientific reasons or decision making. Examples are drawn from research on modeling aquifers, watersheds, streamflow and precipitation in Arizona. Classes of problems include model choice, parameter estimates, initial condition, input identification, forecasting, valuation, control, presence of multiple objectives, and uncertainty. Classes of data analysis include correlation methods, system identification, stationarity, independence or randomness, seasonality, event based approach, fitting of probability distributions, and analysis for runs, range and crossing levels. Time series, event based and regression methods are reviewed. The issues discussed are applied to tree-ring analyses, streamflow gaging stations, and digital modeling of small watersheds and the Tucson aquifers.
Showing items related by title, author, creator and subject.
An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and EvaluationHariri, Salim; Pacheco Ramirez, Jesus Horacio; Hariri, Salim; Akoglu, Ali; Ditzler, Gregory (The University of Arizona., 2017)Advances in mobile and pervasive computing, social network technologies and the exponential growth in Internet applications and services will lead to the development of the Internet of Things (IoT). The IoT services will be a key enabling technology to the development of smart infrastructures that will revolutionize the way we do business, manage critical services, and how we secure, protect, and entertain ourselves. Large-scale IoT applications, such as critical infrastructures (e.g., smart grid, smart transportation, smart buildings, etc.) are distributed systems, characterized by interdependence, cooperation, competition, and adaptation. The integration of IoT premises with sensors, actuators, and control devices allows smart infrastructures to achieve reliable and efficient operations, and to significantly reduce operational costs. However, with the use of IoT, we are experiencing grand challenges to secure and protect such advanced information services due to the significant increase in the attack surface. The interconnections between a growing number of devices expose the vulnerability of IoT applications to attackers. Even devices which are intended to operate in isolation are sometimes connected to the Internet due to careless configuration or to satisfy special needs (e.g., they need to be remotely managed). The security challenge consists of identifying accurately IoT devices, promptly detect vulnerabilities and exploitations of IoT devices, and stop or mitigate the impact of cyberattacks. An Intrusion Detection System (IDS) is in charge of monitoring the behavior of protected systems and is looking for malicious activities or policy violations in order to produce reports to a management station or even perform proactive countermeasures against the detected threat. Anomaly behavior detection is a technique that aims at creating models for the normal behavior of the network and detects any significant deviation from normal operations. With the ability to detect new and novel attacks, the anomaly detection is a promising IDS technique that is actively pursued by researchers. Since each IoT application has its own specification, it is hard to develop a single IDS which works properly for all IoT layers. A better approach is to design customized intrusion detection engines for different layers and then aggregate the analysis results from these engines. On the other hand, it would be cumbersome and takes a lot of effort and knowledge to manually extract the specification of each system. So it will be appropriate to formulate our methodology based on machine learning techniques which can be applied to produce efficient detection engines for different IoT applications. In this dissertation we aim at formalizing a general methodology to perform anomaly behavior analysis for IoT. We first introduce our IoT architecture for smart infrastructures that consists of four layers: end nodes (devices), communications, services, and application. Then we show our multilayer IoT security framework and IoT architecture that consists of five planes: function specification or model plane, attack surface plane, impact plane, mitigation plane, and priority plane. We then present a methodology to develop a general threat model in order to recognize the vulnerabilities in each layer and the possible countermeasures that can be deployed to mitigate their exploitation. In this scope, we show how to develop and deploy an anomaly behavior analysis based intrusion detection system (ABA-IDS) to detect anomalies that might be triggered by attacks against devices, protocols, information or services in our IoT framework. We have evaluated our approach by launching several cyberattacks (e.g. Sensor Impersonation, Replay, and Flooding attacks) against our testbeds developed at the University of Arizona Center for Cloud and Autonomic Computing. The results show that our approach can be used to deploy effective security mechanisms to protect the normal operations of smart infrastructures integrated to the IoT. Moreover, our approach can detect known and unknown attacks against IoT with high detection rate and low false alarms.
REDUCTION AND ANALYSIS PROGRAM FOR TELEMETRY RECORDINGS (RAPTR): ANALYSIS AND DECOMMUTATION SOFTWARE FOR IRIG 106 CHAPTER 10 DATAKim, Jeong Min; Eglin Air Force Base (International Foundation for Telemetering, 2005-10)Solid State On-Board Recording is becoming a revolutionary way of recording airborne telemetry data and IRIG 106 Chapter 10 “Solid State On-Board Recorder Standard” provides interface documentation for solid state digital data acquisition. The Reduction and Analysis Program for Telemetry Recordings (RAPTR) is a standardized and extensible software application developed by the 96th Communications Group, Test and Analysis Division, at Eglin AFB, and provides a data reduction capability for disk files in Chapter 10 format. This paper provides the system description and software architecture of RAPTR and presents the 96th Communication Group’s total solution for Chapter 10 telemetry data reduction.
DESIGN, SYNTHESIS, NMR CONFORMATIONAL ANALYSIS AND DOCKING ANALYSIS OF NOVEL MULTIFUNCTIONAL MOLECULES FOR PAINHruby, Victor J.; Kumarasinghe, Isuru Ransiri; Hruby, Victor J.; Glass, Richard; Mash, Eugene; McEvoy, Megan; Vanderah, Todd (The University of Arizona., 2010)Currently, opioids are extensively used in clinical practices in order to treat pain in patients. However, prolonged administration of opioids are not feasible due to the development of side effects especially tolerance, constipation, addiction and dependence. Our drug design is mainly aimed to reduce opioid induce side effects such as development of tolerance. The first strategy examined involves design and synthesis of peptide based single molecules that have a mu agonist and delta agonist pharmacophore in combination with a COX2 inhibitory pharmacophore. A new molecule, 3-17 having good delta agonist activity, partial COX2 inhibitory activity and weak mu agonist activity was produced. Moreover, Investigation of the bioactivities of the synthesized ligands including 3-17 in terms of their ligand receptor interactions were probed using NMR conformational analysis along with docking analysis to the respective homology modeled mu and delta opioid receptors as well as the COX2 enzyme. As a further continuation of this work, instead of peptide based mu agonist and delta agonist type pharmacophore, the highly mu selective fentanyl pharmacophore was used in combination with a pyrazole based and a pyrazolone based COX pharmacophore. Based on the SAR study and docking analysis of synthesized ligands to the homology modeled mu opioid receptor, an ideal tolerant position without significant loss of mu opioid agonist activity for fentanyl were found. The second strategy involves design and synthesis of a peptide based single molecule that has a mu agonist and a delta antagonist pharmacophore in combination with a NK1 antagonist pharmacophore. A novel molecule (4-2) containing delta antagonist activity, weak mu agonist activity and NK1 antagonist activity was identified. Its homology modeled mu opioid receptor bound conformation was compared with that of reference ligands. Docking analysis of modified 4-2 to the homology modeled mu opioid receptor revealed that it can be further modified to obtain better mu agonist activity. 4-2 showed antinociception for 45 min period of time after injection in tail flick assay. In addition to studies that were directed to avoid tolerance development due to opioid administration, peptide based potential analgesics such as biphalin was modified by introducing more peptidomimetic character in order to enhance its blood brain barrier permeability and proteolytic stability. The novel molecule (6-7) was produced in this study and its antinociception lasted for 30 min period of time after injection in the tail flick assay.