A Graphical-User Interface for the U.S. Geological Survey's SUTRA Code

Total Page:16

File Type:pdf, Size:1020Kb

A Graphical-User Interface for the U.S. Geological Survey's SUTRA Code U.S. Department of the Interior U.S. Geological Survey A Graphical-User Interface for the U.S. Geological Survey’s SUTRA Code using Argus ONE (for Simulation of Variable-Density Saturated-Unsaturated Ground-Water Flow with Solute or Energy Transport) Open-File Report 97-421 Version of: October 24, 1997 About the cover: The image consists of two projects created with the Argus-SUTRA GUI. The upper project, “SUTRA”, is an irregular SUTRA finite-element mesh in which the spatially-varying values of hydraulic conductivity are represented elementwise by color. The interpolation method is Inverse Distance Squared. The letters were created in the Domain Outline layer, as open islands within the external domain boundary, resulting in holes in the mesh. Mesh density has a higher value (i.e. finer mesh) along the letters than at the external boundary. The lower project, “GUI”, is a constant-density areal transient transport SUTRA simulation, in which the solute concentrations are represented by the colored contours. The mesh is irregular and has a constant density. The letters are regions of very high hydraulic conductivity-1000 times greater than the rest of the domain. Each letter contains one or two points of specified hydraulic head set at a value of 100. Inflowing fluid at these points has a concentration of 100, while the initial background concentration is zero. The upper horizontal boundary of the domain is set to a specified hydraulic head of zero. Thus, the fluid flows from the points of specified head in each letter, through the highly permeable letter, towards the upper model boundary. The high-head points were chosen such that the solute would trace out the shape of each letter in its path towards the outflow boundary. The mesh is colored by the hydraulic conductivity value of each finite element, and the contours are drawn using the postprocessing module of the Argus-SUTRA GUI. A Graphical-User Interface for the U.S. Geological Survey’s SUTRA Code using Argus ONE (for Simulation of Variable-Density Saturated-Unsaturated Ground-Water Flow with Solute or Energy Transport) by Clifford I. Voss, David Boldt, and Allen M. Shapiro U.S. Geological Survey, Reston, VA ____________________________________________ U.S. GEOLOGICAL SURVEY Open-File Report 97-421 Reston, Virginia 1997 U.S. DEPARTMENT OF THE INTERIOR Bruce Babbitt, Secretary U.S. GEOLOGICAL SURVEY Mark Schaefer, Acting Director Although the computer program described in this report has been tested and used by the U.S. Geological Survey (USGS), no warranty, expressed or implied, is made by the USGS as to the accuracy of the functioning of the program and related material. The code and report may be changed without notice. Any use of trade, product, or firm names in this publication is for descriptive purposes only and does not imply endorsement by the U.S. Government. ____________________________________________________________________ For additional information write to: Copies of this report can be purchased from: Chief, Office of Ground Water U.S. Geological Survey U.S. Geological Survey Branch of Information Services 411 National Center Box 25286 Reston, VA 20192 Denver, Colorado 80225-0286 Table of Contents Abstract ..................................................................................................................................................................... 1 Overview Introduction ................................................................................................................................................................. 3 Computing Platforms and Required Files........................................................................................................ 4 Availability of Plug-in Extension (PIE) Code for SUTRA.............................................................................. 4 The Argus ONE Paradigm.................................................................................................................................. 4 Acknowledgments............................................................................................................................................... 5 System Requirements and Installation .................................................................................................................... 5 Simple Description of Software Use......................................................................................................................... 7 Simple Step-By-Step Applications of The Argus-SUTRA GUI ............................................................................ 8 Areal Ground-Water Flow Model ..................................................................................................................... 8 Areal Solute Transport Model.......................................................................................................................... 13 Areal Solute Transport Model With Barrier................................................................................................... 15 Areal Model With Transient Solute Transport .............................................................................................. 18 Henry Seawater Intrusion Problem with Variable-Density Flow............................................................... 19 User’s Guide Starting Argus ONE and the SUTRA Interface .................................................................................................... 25 SUTRA Project Information Dialog ........................................................................................................................ 25 Title Window ...................................................................................................................................................... 26 SUTRA Interface-Configuration Window...................................................................................................... 27 SUTRA Non-Spatial Information dialog ........................................................................................................ 29 Headings ...................................................................................................................................................... 32 Modes, Numerical Controls ...................................................................................................................... 33 Temporal Controls...................................................................................................................................... 34 Output .......................................................................................................................................................... 35 Iteration ........................................................................................................................................................ 36 Fluid Properties........................................................................................................................................... 37 Solid Matrix, Adsorption........................................................................................................................... 38 Production, Gravity.................................................................................................................................... 39 The Argus ONE Window and Argus ONE Layers .............................................................................................. 40 Saving and Retrieving Argus ONE-SUTRA Projects.................................................................................... 41 Layer List Window ............................................................................................................................................ 41 Visibility of Layers............................................................................................................................................. 42 Active and Inactive Layers ............................................................................................................................... 43 Layer Types......................................................................................................................................................... 43 Layers and Their Parameters ........................................................................................................................... 45 Interpretation of Contours and Point Data .................................................................................................... 45 Visualizing and Inspecting Values in Layers................................................................................................. 52 Adding or Changing Layers............................................................................................................................. 52 A Warning about Layer and Parameter Names..................................................................................... 53 SUTRA Model Layers............................................................................................................................................... 53 Domain Outline.................................................................................................................................................. 53 Mesh Density ...................................................................................................................................................... 56 Fishnet Mesh Layout ........................................................................................................................................
Recommended publications
  • SHARING FILES and FOLDERS in WTC and WORKSPACES WORKSPACES V1.3X USER GUIDE
    SHARING FILES AND FOLDERS IN WTC AND WORKSPACES WORKSPACES v1.3x USER GUIDE GlobalSCAPE, Inc. (GSB) Corporate Headquarters Address: 4500 Lockhill-Selma Road, Suite 150, San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical Support: (210) 366-3993 Web Support: http://www.globalscape.com/support/ © 2008-2017 GlobalSCAPE, Inc. All Rights Reserved August 2, 2017 Table of Contents How Do I Share Files? .................................................................................................................................................... 7 WTC Administration ...................................................................................................................................................... 9 Enabling User Access to the Web Transfer Client .................................................................................................. 9 Localization (Language) Settings .......................................................................................................................... 10 WTC Error Messages in EFT .................................................................................................................................. 11 Disable CRC ........................................................................................................................................................... 14 Disabling "Update Your Browser" Prompts .......................................................................................................... 14 Terms and
    [Show full text]
  • Command Line Interface Specification Windows
    Command Line Interface Specification Windows Online Backup Client version 4.3.x 1. Introduction The CloudBackup Command Line Interface (CLI for short) makes it possible to access the CloudBackup Client software from the command line. The following actions are implemented: backup, delete, dir en restore. These actions are described in more detail in the following paragraphs. For all actions applies that a successful action is indicated by means of exit code 0. In all other cases a status code of 1 will be used. 2. Configuration The command line client needs a configuration file. This configuration file may have the same layout as the configuration file for the full CloudBackup client. This configuration file is expected to reside in one of the following folders: CLI installation location or the settings folder in the CLI installation location. The name of the configuration file must be: Settings.xml. Example: if the CLI is installed in C:\Windows\MyBackup\, the configuration file may be in one of the two following locations: C:\Windows\MyBackup\Settings.xml C:\Windows\MyBackup\Settings\Settings.xml If both are present, the first form has precedence. Also the customer needs to edit the CloudBackup.Console.exe.config file which is located in the program file directory and edit the following line: 1 <add key="SettingsFolder" value="%settingsfilelocation%" /> After making these changes the customer can use the CLI instruction to make backups and restore data. 2.1 Configuration Error Handling If an error is found in the configuration file, the command line client will issue an error message describing which value or setting or option is causing the error and terminate with an exit value of 1.
    [Show full text]
  • Dealing with Document Size Limits
    Dealing with Document Size Limits Introduction The Electronic Case Filing system will not accept PDF documents larger than ten megabytes (MB). If the document size is less than 10 MB, it can be filed electronically just as it is. If it is larger than 10 MB, it will need to be divided into two or more documents, with each document being less than 10 MB. Word Processing Documents Documents created with a word processing program (such as WordPerfect or Microsoft Word) and correctly converted to PDF will generally be smaller than a scanned document. Because of variances in software, usage, and content, it is difficult to estimate the number of pages that would constitute 10 MB. (Note: See “Verifying File Size” below and for larger documents, see “Splitting PDF Documents into Multiple Documents” below.) Scanned Documents Although the judges’ Filing Preferences indicate a preference for conversion of documents rather than scanning, it will be necessary to scan some documents for filing, e.g., evidentiary attachments must be scanned. Here are some things to remember: • Documents scanned to PDF are generally much larger than those converted through a word processor. • While embedded fonts may be necessary for special situations, e.g., trademark, they will increase the file size. • If graphs or color photos are included, just a few pages can easily exceed the 10 MB limit. Here are some guidelines: • The court’s standard scanner resolution is 300 dots per inch (DPI). Avoid using higher resolutions as this will create much larger file sizes. • Normally, the output should be set to black and white.
    [Show full text]
  • Attacker Antics Illustrations of Ingenuity
    ATTACKER ANTICS ILLUSTRATIONS OF INGENUITY Bart Inglot and Vincent Wong FIRST CONFERENCE 2018 2 Bart Inglot ◆ Principal Consultant at Mandiant ◆ Incident Responder ◆ Rock Climber ◆ Globetrotter ▶ From Poland but live in Singapore ▶ Spent 1 year in Brazil and 8 years in the UK ▶ Learning French… poor effort! ◆ Twitter: @bartinglot ©2018 FireEye | Private & Confidential 3 Vincent Wong ◆ Principal Consultant at Mandiant ◆ Incident Responder ◆ Baby Sitter ◆ 3 years in Singapore ◆ Grew up in Australia ©2018 FireEye | Private & Confidential 4 Disclosure Statement “ Case studies and examples are drawn from our experiences and activities working for a variety of customers, and do not represent our work for any one customer or set of customers. In many cases, facts have been changed to obscure the identity of our customers and individuals associated with our customers. ” ©2018 FireEye | Private & Confidential 5 Today’s Tales 1. AV Server Gone Bad 2. Stealing Secrets From An Air-Gapped Network 3. A Backdoor That Uses DNS for C2 4. Hidden Comment That Can Haunt You 5. A Little Known Persistence Technique 6. Securing Corporate Email is Tricky 7. Hiding in Plain Sight 8. Rewriting Import Table 9. Dastardly Diabolical Evil (aka DDE) ©2018 FireEye | Private & Confidential 6 AV SERVER GONE BAD Cobalt Strike, PowerShell & McAfee ePO (1/9) 7 AV Server Gone Bad – Background ◆ Attackers used Cobalt Strike (along with other malware) ◆ Easily recognisable IOCs when recorded by Windows Event Logs ▶ Random service name – also seen with Metasploit ▶ Base64-encoded script, “%COMSPEC%” and “powershell.exe” ▶ Decoding the script yields additional PowerShell script with a base64-encoded GZIP stream that in turn contained a base64-encoded Cobalt Strike “Beacon” payload.
    [Show full text]
  • Powershell Integration with Vmware View 5.0
    PowerShell Integration with VMware® View™ 5.0 TECHNICAL WHITE PAPER PowerShell Integration with VMware View 5.0 Table of Contents Introduction . 3 VMware View. 3 Windows PowerShell . 3 Architecture . 4 Cmdlet dll. 4 Communication with Broker . 4 VMware View PowerCLI Integration . 5 VMware View PowerCLI Prerequisites . 5 Using VMware View PowerCLI . 5 VMware View PowerCLI cmdlets . 6 vSphere PowerCLI Integration . 7 Examples of VMware View PowerCLI and VMware vSphere PowerCLI Integration . 7 Passing VMs from Get-VM to VMware View PowerCLI cmdlets . 7 Registering a vCenter Server . .. 7 Using Other VMware vSphere Objects . 7 Advanced Usage . 7 Integrating VMware View PowerCLI into Your Own Scripts . 8 Scheduling PowerShell Scripts . 8 Workflow with VMware View PowerCLI and VMware vSphere PowerCLI . 9 Sample Scripts . 10 Add or Remove Datastores in Automatic Pools . 10 Add or Remove Virtual Machines . 11 Inventory Path Manipulation . 15 Poll Pool Usage . 16 Basic Troubleshooting . 18 About the Authors . 18 TECHNICAL WHITE PAPER / 2 PowerShell Integration with VMware View 5.0 Introduction VMware View VMware® View™ is a best-in-class enterprise desktop virtualization platform. VMware View separates the personal desktop environment from the physical system by moving desktops to a datacenter, where users can access them using a client-server computing model. VMware View delivers a rich set of features required for any enterprise deployment by providing a robust platform for hosting virtual desktops from VMware vSphere™. Windows PowerShell Windows PowerShell is Microsoft’s command line shell and scripting language. PowerShell is built on the Microsoft .NET Framework and helps in system administration. By providing full access to COM (Component Object Model) and WMI (Windows Management Instrumentation), PowerShell enables administrators to perform administrative tasks on both local and remote Windows systems.
    [Show full text]
  • Linux-PATH.Pdf
    http://www.linfo.org/path_env_var.html PATH Definition PATH is an environmental variable in Linux and other Unix-like operating systems that tells the shell which directories to search for executable files (i.e., ready-to-run programs ) in response to commands issued by a user. It increases both the convenience and the safety of such operating systems and is widely considered to be the single most important environmental variable. Environmental variables are a class of variables (i.e., items whose values can be changed) that tell the shell how to behave as the user works at the command line (i.e., in a text-only mode) or with shell scripts (i.e., short programs written in a shell programming language). A shell is a program that provides the traditional, text-only user interface for Unix-like operating systems; its primary function is to read commands that are typed in at the command line and then execute (i.e., run) them. PATH (which is written with all upper case letters) should not be confused with the term path (lower case letters). The latter is a file's or directory's address on a filesystem (i.e., the hierarchy of directories and files that is used to organize information stored on a computer ). A relative path is an address relative to the current directory (i.e., the directory in which a user is currently working). An absolute path (also called a full path ) is an address relative to the root directory (i.e., the directory at the very top of the filesystem and which contains all other directories and files).
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • Visual Validation of SSL Certificates in the Mozilla Browser Using Hash Images
    CS Senior Honors Thesis: Visual Validation of SSL Certificates in the Mozilla Browser using Hash Images Hongxian Evelyn Tay [email protected] School of Computer Science Carnegie Mellon University Advisor: Professor Adrian Perrig Electrical & Computer Engineering Engineering & Public Policy School of Computer Science Carnegie Mellon University Monday, May 03, 2004 Abstract Many internet transactions nowadays require some form of authentication from the server for security purposes. Most browsers are presented with a certificate coming from the other end of the connection, which is then validated against root certificates installed in the browser, thus establishing the server identity in a secure connection. However, an adversary can install his own root certificate in the browser and fool the client into thinking that he is connected to the correct server. Unless the client checks the certificate public key or fingerprint, he would never know if he is connected to a malicious server. These alphanumeric strings are hard to read and verify against, so most people do not take extra precautions to check. My thesis is to implement an additional process in server authentication on a browser, using human recognizable images. The process, Hash Visualization, produces unique images that are easily distinguishable and validated. Using a hash algorithm, a unique image is generated using the fingerprint of the certificate. Images are easily recognizable and the user can identify the unique image normally seen during a secure AND accurate connection. By making a visual comparison, the origin of the root certificate is known. 1. Introduction: The Problem 1.1 SSL Security The SSL (Secure Sockets Layer) Protocol has improved the state of web security in many Internet transactions, but its complexity and neglect of human factors has exposed several loopholes in security systems that use it.
    [Show full text]
  • A Graphical User Interface for PHAST
    GoPhast: A Graphical User Interface for PHAST Techniques and Methods 6-A20 U.S. Department of the Interior U.S. Geological Survey Cover: GoPhast screen view for Example 2 (p. 74). The grid has been colored to show the distribution of initial hydraulic head. The status bar (at bottom) shows the coordinates of the mouse cursor, the column and row numbers at the cursor position, the value of initial head in the user’s choice of units at the cursor position, and a description of how the initial head value at that location was specified. GoPhast: A Graphical User Interface for PHAST By Richard B. Winston Techniques and Methods 6-A20 U.S. Department of the Interior U.S. Geological Survey U.S. Department of the Interior P. Lynn Scarlett, Acting Secretary U.S. Geological Survey P. Patrick Leahy, Acting Director U.S. Geological Survey, Reston, Virginia: 2006 Any use of trade, product, or firm names in this publication is for descriptive purposes only and does not imply endorsement by the U.S. Government. Suggested citation: Winston, R.B., 2006, GoPhast: A Graphical User Interface for PHAST: U.S. Geological Survey Techniques and Methods 6-A20, 98 p. Contents 1. Abstract..................................................................................................................................... 1 2. Introduction............................................................................................................................... 1 2.1 Reasons for Using Graphical User Interfaces ......................................................................
    [Show full text]
  • Augmented Reality Tangible Interfaces for CAD Design Review
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1-1-2005 Augmented reality tangible interfaces for CAD design review Ronald Sidharta Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Recommended Citation Sidharta, Ronald, "Augmented reality tangible interfaces for CAD design review" (2005). Retrospective Theses and Dissertations. 20909. https://lib.dr.iastate.edu/rtd/20909 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Augmented reality tangible interfaces for CAD design review by Ronald Sidharta A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major: Human Computer Interaction Program of Study Committee: Adrian Sannier (Co-major Professor) Carolina Cruz-Neira (Co-major Professor) Dirk Reiners Ying Cai Iowa State University Ames, Iowa 2005 Copyright © Ronald Sidharta, 2005. All rights reserved. 11 Graduate College Iowa State University This is to certify that the master's thesis of Ronald Sidharta has met the thesis requirements of Iowa State University Signatures have been redacted for privacy 111 TABLE OF CONTENTS ABSTRACT ...........................................................................................................................
    [Show full text]
  • Technical Note Image Studio™ Software Export Guide
    Technical Note Image Studio™ Software Export Guide Developed for: Image Studio Software Please refer to your manual to confirm that this protocol is appropriate for the applications compatible with your instrument model. Published July 2014. Revised September 2014. The most recent version of this Technical Note is posted at http://biosupport.licor.com/support Page 2 - Image Studio™ Software Export Guide Table of Contents Page I. Introduction 3 II. Explanation of Exportable Image Formats 3 JPEG File Type 3 PNG File Type 3 TIFF File Type 3 III. Exporting Images and Movies: For Presentation Only 4 Export Single Image View 4 Current Image 4 Selected Images in the Images Table 4 Export Color Bar Only 5 Exporting Multiple Image View 6 Exporting from Single Image View or Multiple Image View Without Annotations 6 Using the Export Dialog Box: for Single Image View and Multiple Image View 6 Resizing Images 7 Choosing the Desired Image Format and Resolution 7 Naming the Exported Image Using the File Name Text Field 7 Using the Insert Button to Add Images Table Values to File Name 8 IV. Exporting Movies 8 When to Use 8 Procedure 9 V. Definition of Acquisition Folders and When to Export 9 Acquisition Folder vs. Zip Files 10 Exporting Acquisition Folders and Zip Files 10 VI. Exporting a Lab Book 12 Layout Template 13 Editing the Layout 14 Editing Header Options 15 What a Header Is 15 Editing Headers 15 Saving a Customized Lab Book Layout 16 VII. Changing the Page Setup, Previewing, and Saving a Lab Book 17 Image Studio™ Software Export Guide - Page 3 VIII.
    [Show full text]
  • Path Howto Path Howto
    PATH HOWTO PATH HOWTO Table of Contents PATH HOWTO..................................................................................................................................................1 Esa Turtiainen etu@dna.fi.......................................................................................................................1 1. Introduction..........................................................................................................................................1 2. Copyright.............................................................................................................................................1 3. General.................................................................................................................................................1 4. Init........................................................................................................................................................1 5. Login....................................................................................................................................................1 6. Shells....................................................................................................................................................1 7. Changing user ID.................................................................................................................................1 8. Network servers...................................................................................................................................1
    [Show full text]