Sample records for kevitsa intrusive complex

  1. In situ strontium and sulfur isotope investigation of the Ni-Cu-(PGE) sulfide ore-bearing Kevitsa intrusion, northern Finland

    NASA Astrophysics Data System (ADS)

    Luolavirta, Kirsi; Hanski, Eero; Maier, Wolfgang; Lahaye, Yann; O'Brien, Hugh; Santaguida, Frank

    2018-01-01

    The 2.06-Ga Kevitsa mafic-ultramafic intrusion in northern Finland hosts a large disseminated Ni-Cu-PGE deposit. The deposit occurs in the ultramafic olivine-pyroxene cumulates and shows a range in Ni tenors varying from 4-7 wt% (regular ore) to > 10 wt% (Ni-PGE ore). There are also a metal-poor sulfide mineralization (false ore) and contact mineralization that are uneconomic (Ni tenor < 4 wt%). The obtained 87Sr/86Sr(i) values of the Kevitsa ultramafic cumulates are highly radiogenic (> 0.7045) in comparison to the estimated depleted mantle Sr isotope ratio of 0.702 at 2.06 Ga. The sulfur δ 34S values are generally higher than + 2‰, which together with the Sr isotope data imply involvement of crustal material in the genesis of the Kevitsa intrusion and its ores. The 87Sr/86Sr(i) values obtained from the ore-bearing domain of the intrusion show stratigraphic variation and exceed 0.7050, with the maximum value reaching up to 0.7109. In contrast, in rocks around the ore domain, the initial Sr isotope compositions remain more or less constant (0.7047-0.7060) throughout the intrusive stratigraphy. The isotope data suggest that the ore-bearing domain of the intrusion represents a dynamic site with multiple injections of variably contaminated magma, whereas the surrounding part of the intrusion experienced a less vigorous emplacement history. No correlation is observed between the strontium and sulfur isotope compositions. This is explained by bulk assimilation of the silicate magma in a deeper staging magma chamber and variable assimilation of sulfur during magma transport into the Kevitsa magma chamber. The low level of metals in false ore and the Ni-depleted nature of its olivine suggest that some sulfides may have precipitated and deposited in the feeder conduit during the initial stage of magma emplacement. Cannibalization of early-formed sulfides by later magma injections may have been important in the formation of the economic ore deposit.

  2. Whole-rock and mineral compositional constraints on the magmatic evolution of the Ni-Cu-(PGE) sulfide ore-bearing Kevitsa intrusion, northern Finland

    NASA Astrophysics Data System (ADS)

    Luolavirta, Kirsi; Hanski, Eero; Maier, Wolfgang; Santaguida, Frank

    2018-01-01

    The 2.06 Ga mafic-ultramafic Kevitsa intrusion is located in the Central Lapland greenstone belt. The lower ultramafic part of the intrusion hosts a large disseminated Ni-Cu-(PGE) sulfide deposit with Ni tenors ranging widely from < 4 wt% (uneconomic false ore and contact mineralization) to 4-7 wt% (regular ore) and up to 40 wt% (Ni-PGE ore). The stratigraphy of the ultramafic cumulates is divided into the basal pyroxenite-gabbro (Basal series), olivine pyroxenite (OLPX), pyroxenite, and plagioclase-bearing (ol) websterite (pOLWB), of which the latter occurs together with minor microgabbros in the ore-bearing domain of the intrusion. Around the ore domain, the ultramafic cumulate succession records a simple lithological stratigraphy and modest and predictable variations in whole-rock and mineral compositions. The ore-bearing domain, in contrast, is characterized by a complex internal architecture, variations in whole-rock and mineral compositions, and the presence of numerous inclusions and xenoliths. The OLPXs are mainly composed of cumulus olivine (Fo77-89) and clinopyroxene (Mg#81-92) with variable amounts of oikocrystic orthopyroxene (Mg#79-84). They comprise the bulk of the ultramafic cumulates and are the dominant host rocks to the sulfide ore. The host rocks to the regular and false ore type are mineralogically and compositionally similar (Fo 80-83, mostly) and show mildly LREE-enriched REE patterns (CeN/YbN 2), characteristic for the bulk of the Kevitsa ultramafic cumulates. The abundance of orthopyroxene and magnetite is lowest in the host rocks to the Ni-PGE ore type, being in line with the mineral compositions of the silicates, which are the most primitive in the intrusion. However, it contrasts with the LREE-enriched nature of the ore type (CeN/YbN 7), indicating significant involvement of crustal material in the magma. The contrasting intrusive stratigraphy in the different parts of the intrusion likely reflects different emplacement histories. It is

  3. Integration of 2D and 3D reflection seismic data with deep boreholes in the Kevitsa Ni-Cu-PGE deposit, northern Finland

    NASA Astrophysics Data System (ADS)

    Koivisto, Emilia; Malehmir, Alireza; Voipio, Teemu; Wijns, Chris

    2013-04-01

    Kevitsa is a large disseminated sulphide Ni-Cu-PGE deposit hosted by the Kevitsa mafic-ultramafic intrusion in northern Finland and dated as about 2.06 Ga old. The Geological Survey of Finland first discovered the Kevitsa deposit in 1987. Open pit mining by Kevitsa Mining Oy/First Quantum Minerals Ltd. commenced in June 2012. The final pit depth is planned to be 550-600 m. The estimated ore reserves of the Kevitsa intrusion are about 240 million tones (using a nickel cut-off grade of 0.1%). The expected life-of-mine is 20-30 years. More than 400 hundred holes have been drilled in the Kevitsa area, but most are concentrated close to the known deposit and do not provide a comprehensive understanding of the extent of the intrusion. The basal contact of the intrusion is penetrated by only about 30 drill holes, most of which are shallow. A better knowledge of the geometry of the intrusion would provide a framework for near-mine and deep exploration in the area. An exact knowledge on the basal contact of the intrusion would also provide an exploration target for the contact-type mineralization that is often more massive and richer in Ni-Cu. In December 2007, a series of 2D reflection seismic profiles was acquired in the Kevitsa area. It consisted of four connected survey lines between 6 and 11 km long. In 2010, the initial positive results of the 2D seismic survey led Kevitsa Mining Oy/First Quantum Minerals Ltd. to initiate a 3D reflection seismic survey. The 3D seismic survey is limited to the closer vicinity of the known deposit, while the 2D seismic survey was designed to provide a more regional view of the Kevitsa intrusive complex. The main aims of the 2D and 3D seismic surveys were to delineate the shape and extent of the ore-bearing Kevitsa intrusion and the geometry of some of the host rock and surrounding units, and extract information about the larger-scale structures and structures important for mine-planning purposes. The 2D and 3D seismic data were used to

  4. High-resolution seismic imaging of the Kevitsa mafic-ultramafic Cu-Ni-PGE hosted intrusion, northern Finland

    NASA Astrophysics Data System (ADS)

    Malehmir, Alireza; Koivisto, Emilia; Wjins, Chris; Tryggvason, Ari; Juhlin, Christopher

    2014-05-01

    Kevitsa, in northern Finland, is a large nickel/copper ore body hosted by a massive mafic-ultramafic intrusion with measured and indicated resources of 240 million tons (cutoff 0.1%) grading 0.30% Ni and 0.41% Cu. Mining started in 2012 with an open pit that will extend down to about 550-600 m depth. The expected mine life is more than 20 years. Numerous boreholes are available in the area, but the majority of them are shallow and do not provide a comprehensive understanding of the dimensions of the intrusion. However, a number of boreholes do penetrate the basal contact of the intrusion. Most of these are also shallow and concentrated at the edge of the intrusion. A better knowledge of the geometry of the intrusion would provide a framework for near-mine and deep exploration in the area, but also a better understanding of the geology. Exact mapping of the basal contact of the intrusion would also provide an exploration target for the contact-type mineralization that is often more massive and richer in Ni-Cu than the disseminated mineralization away from the contact. With the objective of better characterizing the intrusion, a series of 2D profiles were acquired followed by a 3D reflection survey that covered an area of about 3 km by 3 km. Even though the geology is complex and the seismic P-wave velocity ranges between 5 to 8 km/s, conventional processing results show gently- to steeply-dipping reflections from depths of approximately 2 km to as shallow as 100 m. Many of these reflections are interpreted to originate from either fault systems or internal magmatic layering within the Kevitsa main intrusion. Correlations between the 3D surface seismic data and VSP data, based upon time shifts or phase changes along the reflections, support the interpretation that numerous faults are imaged in the volume. Some of these faults cross the planned open-pit mine at depths of about 300-500 m, and it is, therefore, critical to map them for mine planning. The seismic 3D

  5. Layered intrusions of the Duluth Complex, Minnesota, USA

    USGS Publications Warehouse

    Miller, J.D.; Ripley, E.M.; ,

    1996-01-01

    The Duluth Complex and associated subvolcanic intrusions comprise a large (5000 km2) intrusive complex in northeastern Minnesota that was emplaced into comagmatic volcanics during the development of the 1.1 Ga Midcontinent rift in North America. In addition to anorthositic and felsic intrusions, the Duluth Complex is composed of many individual mafic layered intrusions of tholeiitic affinity. The cumulate stratigraphies and cryptic variations of six of the better exposed and better studied intrusions are described here to demonstrate the variability in their cumulus mineral paragenesis.

  6. Petrogenesis of the Ni-Cu-PGE sulfide-bearing Tamarack Intrusive Complex, Midcontinent Rift System, Minnesota

    NASA Astrophysics Data System (ADS)

    Taranovic, Valentina; Ripley, Edward M.; Li, Chusi; Rossell, Dean

    2015-01-01

    The Tamarack Intrusive Complex (TIC, 1105.6 ± 1.2 Ma) in NE Minnesota, was emplaced during the early stages of the development of the Midcontinent Rift System (MRS, "Early Stage": 1110-1106 Ma). Country rocks of the TIC are those of the Paleoproterozoic Thomson Formation, part of the Animikie Group including sulfide-bearing metasedimentary black shale. The magmatic system is composed of at least two principal mafic-ultramafic intrusive sequences: the sulfide-barren Bowl Intrusion in the south and the "dike" area intrusions in the north which host Ni-Cu-Platinum Group Elements (PGE) mineralization with up to 2.33% Ni, 1.24% Cu, 0.34 g/t Pt, 0.23 g/t Pd and 0.18 g/t Au. Two distinct intrusive units in the "dike" area are the CGO (coarse-grained olivine-bearing) Intrusion, a sub-vertical dike-like body, and the overlying sub-horizontal FGO (fine-grained olivine-bearing) Intrusion. Both intrusions comprise peridotite, feldspathic peridotite, feldspathic pyroxenite, melatroctolite and melagabbro. Massive sulfides are volumetrically minor and mainly occur as lenses emplaced into the country rocks associated with both intrusions. Semi-massive (net-textured) sulfides are distributed at the core of the CGO Intrusion, surrounded by a halo of the disseminated sulfides. Disseminated sulfides also occur in lenses along the base of the FGO Intrusion. Olivine compositions in the CGO Intrusion are between Fo89 and Fo82 and in the FGO Intrusion from Fo84 to Fo82. TIC intrusions have more primitive olivine compositions than that of olivine in the sheet-like intrusions in the Duluth Complex (below Fo70), as well as olivine from the smaller, conduit-related, Eagle and East Eagle Intrusions in Northern Michigan (Fo86 to Fo75). The FeO/MgO ratios of the CGO and FGO Intrusion parental magmas, inferred from olivine compositions, are similar to those of picritic basalts erupted during the early stages of the MRS formation. Trace element ratios differ slightly from other intrusions in the

  7. Ultrabasic breccias in layered intrusions - The Rhum complex

    NASA Technical Reports Server (NTRS)

    Donaldson, C. H.

    1975-01-01

    Two breccias in the southwest part of the ultrabasic Rhum complex are considered. Aspects of field relations are discussed along with questions regarding the petrography of the matrix. Attention is given to textures and chemical mineralogy, the mechanism of brecciation, matrix magmas, and the possible implications of the findings. It is concluded that the Harris Bay and Ard Mheall ultrabasic breccias formed by brecciation due to the intrusion of feldspathic peridotite magmas.

  8. Mushy magma processes in the Tuolumne intrusive complex, Sierra Nevada, California

    NASA Astrophysics Data System (ADS)

    Memeti, V.; Paterson, S. R.

    2012-12-01

    Debates continue on the nature of volcanic-plutonic connections and the mechanisms of derivation of large volcanic eruptions, which require large volumes of magma to be readily available within a short period of time. Our focus to understand these magma plumbing systems has been to study the nature of their mid-to upper crustal sections, such as the 1,000 km2, 95-85 Ma old Tuolumne intrusive complex in the Sierra Nevada, California, USA. The Tuolumne intrusive complex is a great example where the magma mush model nicely explains observations derived from several datasets. These data suggest that a magma mush body was present and may have been quite extensive especially at times when the Tuolumne intrusive complex was undergoing waxing periods of magmatism (increased magma input), which alternated with waning periods of magmatism (decreased magma addition) and thus a smaller mush body, essentially mimicking in style periodic flare-ups and lulls at the arc scale. During waxing stages, magma erosion and mixing were the dominant processes, whereas waning stages allowed mush domains to continue to undergo fractional crystallization creating additional compositional variations. Over time, the imprint left behind by previous waxing and waning stages was partly overprinted, but individual crystals successfully recorded the compositions of these earlier magmas. Waxing periods in the Tuolumne intrusive complex during which large magma mush bodies formed are supported by the following evidence: 1) Hybrid units and gradational contacts are commonly present between major Tuolumne units. 2) CA-TIMS U/Pb zircon geochronology data demonstrate that antecrystic zircon recycling took place unidirectional from the oldest, marginal unit toward the younger, interior parts of the intrusion, where increasing zircon age spread encompasses the entire age range of the Tuolumne. 3) The younger, interior units also show an increasing scatter and complexity in geochemical element and isotope

  9. What lies beneath: geophysical mapping of a concealed Precambrian intrusive complex along the Iowa–Minnesota border

    USGS Publications Warehouse

    Drenth, Benjamin J.; Anderson, Raymond R.; Schulz, Klaus J.; Feinberg, Joshua M.; Chandler, Val W.; Cannon, William F.

    2015-01-01

    Large-amplitude gravity and magnetic highs over northeast Iowa are interpreted to reflect a buried intrusive complex composed of mafic–ultramafic rocks, the northeast Iowa intrusive complex (NEIIC), intruding Yavapai province (1.8–1.72 Ga) rocks. The age of the complex is unproven, although it has been considered to be Keweenawan (∼1.1 Ga). Because only four boreholes reach the complex, which is covered by 200–700 m of Paleozoic sedimentary rocks, geophysical methods are critical to developing a better understanding of the nature and mineral resource potential of the NEIIC. Lithologic and cross-cutting relations interpreted from high-resolution aeromagnetic and airborne gravity gradient data are presented in the form of a preliminary geologic map of the basement Precambrian rocks. Numerous magnetic anomalies are coincident with airborne gravity gradient (AGG) highs, indicating widespread strongly magnetized and dense rocks of likely mafic–ultramafic composition. A Yavapai-age metagabbro unit is interpreted to be part of a layered intrusion with subvertical dip. Another presumed Yavapai unit has low density and weak magnetization, observations consistent with felsic plutons. Northeast-trending, linear magnetic lows are interpreted to reflect reversely magnetized diabase dikes and have properties consistent with Keweenawan rocks. The interpreted dikes are cut in places by normally magnetized mafic–ultramafic rocks, suggesting that the latter represent younger Keweenawan rocks. Distinctive horseshoe-shaped magnetic and AGG highs correspond with a known gabbro, and surround rocks with weaker magnetization and lower density. Here, informally called the Decorah complex, the source body has notable geophysical similarities to Keweenawan alkaline ring complexes, such as the Coldwell and Killala Lake complexes, and Mesoproterozoic anorogenic complexes, such as the Kiglapait, Hettasch, and Voisey’s Bay intrusions in Labrador. Results presented here suggest that

  10. Intrusive dike complexes, cumulate cores, and the extrusive growth of Hawaiian volcanoes

    USGS Publications Warehouse

    Flinders, Ashton F.; Ito, Garrett; Garcia, Michael O.; Sinton, John M.; Kauahikaua, Jim; Taylor, Brian

    2013-01-01

    The Hawaiian Islands are the most geologically studied hot-spot islands in the world yet surprisingly, the only large-scale compilation of marine and land gravity data is more than 45 years old. Early surveys served as reconnaissance studies only, and detailed analyses of the crustal-density structure have been limited. Here we present a new chain-wide gravity compilation that incorporates historical island surveys, recently published work on the islands of Hawai‘i, Kaua‘i, and Ni‘ihau, and >122,000 km of newly compiled marine gravity data. Positive residual gravity anomalies reflect dense intrusive bodies, allowing us to locate current and former volcanic centers, major rift zones, and a previously suggested volcano on Ka‘ena Ridge. By inverting the residual gravity data, we generate a 3-D view of the dense, intrusive complexes and olivine-rich cumulate cores within individual volcanoes and rift zones. We find that the Hāna and Ka‘ena ridges are underlain by particularly high-density intrusive material (>2.85 g/cm3) not observed beneath other Hawaiian rift zones. Contrary to previous estimates, volcanoes along the chain are shown to be composed of a small proportion of intrusive material (<30% by volume), implying that the islands are predominately built extrusively.

  11. From intrusive to oscillating thoughts.

    PubMed

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  12. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    NASA Astrophysics Data System (ADS)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  13. Pre-Elsonian mafic magmatism in the Nain Igneous Complex, Labrador: the bridges layered intrusion

    USGS Publications Warehouse

    Ashwal, L.D.; Wiebe, R.A.; Wooden, J.L.; Whitehouse, M.J.; Snyder, Diane

    1992-01-01

    Decades of work on the pristine, unmetamorphosed, and well exposed anorthositic, mafic and granitic rocks of the Nain igneous complex, Labrador, have led to the conclusion that all plutonic rocks in that area were emplaced in a short time intercal at about 1300 ?? 10 Ma). We report here new isotopic data for mafic intrusive rocks that appear to have crystallized several hundred Ma earlier than the bulk of the plutonic activity in the Nain complex. The Bridges layered intrusion (BLI) is a small (15-20 km2) lens of layered mafic rocks about 1.5 km thick, surrounded and intruded by anorthositic, leuconoritic and leucotroctolitic plutons in the middle of the coastal section of the Nain igneous complex. BLI shows very well developed magmatic structures, including channel scours, slump structures, and ubiquitous modally graded layering. Most rocks, however, show granular textures indicative of recrystallization, presumably caused by emplacement of younger anorthositic rocks. BLI contains cumulate rocks with slightly more primitive mineral compositions (An60-83, Fo66-71) than those of other mafic intrusions in the Nain igneous complex, including Kiglapait. SmNd isotopic data for 7 BLI whole-rocks ranging in composition between olivine melagabbro and olivine leucogabbro yield an age of 1667 ?? 75 Ma, which we interpret as the time of primary crystallization. The internal isotopic systematics of the BLI have been reset, probably by intrusion of adjacent anorthositic plutons. A SmNd mineral isochron (plag, whole-rock, mafics) for a BLI olivine melagabbro gives an age of 1283 ?? 22 Ma, equivalent within error of a mineral array (plag, whole-rock, opx, cpx) for an adjacent, igneous-textured, leuconorite vein (1266 ?? 152 Ma). The initial Nd ratio for BLI corresponds to ??{lunate}Nd = -3.18 ?? 0.44. Other whole-rock samples, however, some with vein-like alteration (Chlorite, serpentine, amphiboles), show ??{lunate}Nd values as low as -9.1, suggesting variable contamination by

  14. Origin of Fe-Ti Oxide Mineralization in the Middle Paleoproterozoic Elet'ozero Syenite-Gabbro Intrusive Complex (Northern Karelia, Russia)

    NASA Astrophysics Data System (ADS)

    Sharkov, E. V.; Chistyakov, A. V.; Shchiptsov, V. V.; Bogina, M. M.; Frolov, P. V.

    2018-03-01

    Magmatic oxide mineralization widely developed in syenite-gabbro intrusive complexes is an important Fe and Ti resource. However, its origin is hotly debatable. Some researchers believe that the oxide ores were formed through precipitation of dense Ti-magnetite in an initial ferrogabbroic magma (Bai et al., 2012), whereas others consider them as a product of immiscible splitting of Fe-rich liquid during crystallization of Fe-Ti basaltic magma (Zhou et al., 2013). We consider this problem with a study of the Middle Paleoproterozoic (2086 ± 30 Ma) Elet'ozero Ti-bearing layered intrusive complex in northern Karelia (Baltic Shield). The first ore-bearing phase of the complex is mainly made up of diverse ferrogabbros, with subordinate clinopyroxenites and peridotites. Fe-Ti oxides (magnetite, Ti-magnetite, and ilmenite) usually account for 10-15 vol %, reaching 30-70% in ore varieties. The second intrusive phase is formed by alkaline and nepheline syenites. Petrographical, mineralogical, and geochemical data indicate that the first phase of the intrusion was derived from a moderately alkaline Fe-Ti basaltic melt, while the parental melt of the second phase was close in composition to alkaline trachyte. The orebodies comprise disseminated and massive ores. The disseminated Fe-Ti oxide ores make up lenses and layers conformable to general layering. Massive ores occur in subordinate amounts as layers and lenses, as well as cross-cutting veins. Elevated Nb and Ta contents in Fe-Ti oxides makes it possible to consider them complex ores. It is shown that the Fe-Ti oxide mineralization is related to the formation of a residual (Fe,Ti)-rich liquid, which lasted for the entire solidification history of the first intrusive phase. The liquid originated through multiple enrichment of Fe and Ti in the crystallization zone of the intrusion owing to the following processes: (1) precipitation of silicate minerals in the crystallization zone with a corresponding increase in the Fe and

  15. Intrusive origin of the Sudbury Igneous Complex: Structural and sedimentological evidence

    NASA Technical Reports Server (NTRS)

    Cowan, E. J.; Schwerdtner, W. M.

    1992-01-01

    In recent years, many geoscientists have come to believe that the Sudbury event was exogenic rather than endogenic. Critical to a recent exogenic hypothesis is the impact melt origin of the Sudbury Igneous Complex (SIC). Such origin implies that the SIC was emplaced before deposition of the Whitewater Group, in contrast to origins in which the SIC postdates the lithification of the Onaping Formation. Structural and sedimentological evidence is summarized herein that supports an intrusion of the SIC after lithification of all Whitewater Group strata, and conflicts with the hypothesis advanced by other researchers.

  16. Magma transport in sheet intrusions of the Alnö carbonatite complex, central Sweden.

    PubMed

    Andersson, Magnus; Almqvist, Bjarne S G; Burchardt, Steffi; Troll, Valentin R; Malehmir, Alireza; Snowball, Ian; Kübler, Lutz

    2016-06-10

    Magma transport through the Earth's crust occurs dominantly via sheet intrusions, such as dykes and cone-sheets, and is fundamental to crustal evolution, volcanic eruptions and geochemical element cycling. However, reliable methods to reconstruct flow direction in solidified sheet intrusions have proved elusive. Anisotropy of magnetic susceptibility (AMS) in magmatic sheets is often interpreted as primary magma flow, but magnetic fabrics can be modified by post-emplacement processes, making interpretation of AMS data ambiguous. Here we present AMS data from cone-sheets in the Alnö carbonatite complex, central Sweden. We discuss six scenarios of syn- and post-emplacement processes that can modify AMS fabrics and offer a conceptual framework for systematic interpretation of magma movements in sheet intrusions. The AMS fabrics in the Alnö cone-sheets are dominantly oblate with magnetic foliations parallel to sheet orientations. These fabrics may result from primary lateral flow or from sheet closure at the terminal stage of magma transport. As the cone-sheets are discontinuous along their strike direction, sheet closure is the most probable process to explain the observed AMS fabrics. We argue that these fabrics may be common to cone-sheets and an integrated geology, petrology and AMS approach can be used to distinguish them from primary flow fabrics.

  17. Magma transport in sheet intrusions of the Alnö carbonatite complex, central Sweden

    PubMed Central

    Andersson, Magnus; Almqvist, Bjarne S. G.; Burchardt, Steffi; Troll, Valentin R.; Malehmir, Alireza; Snowball, Ian; Kübler, Lutz

    2016-01-01

    Magma transport through the Earth’s crust occurs dominantly via sheet intrusions, such as dykes and cone-sheets, and is fundamental to crustal evolution, volcanic eruptions and geochemical element cycling. However, reliable methods to reconstruct flow direction in solidified sheet intrusions have proved elusive. Anisotropy of magnetic susceptibility (AMS) in magmatic sheets is often interpreted as primary magma flow, but magnetic fabrics can be modified by post-emplacement processes, making interpretation of AMS data ambiguous. Here we present AMS data from cone-sheets in the Alnö carbonatite complex, central Sweden. We discuss six scenarios of syn- and post-emplacement processes that can modify AMS fabrics and offer a conceptual framework for systematic interpretation of magma movements in sheet intrusions. The AMS fabrics in the Alnö cone-sheets are dominantly oblate with magnetic foliations parallel to sheet orientations. These fabrics may result from primary lateral flow or from sheet closure at the terminal stage of magma transport. As the cone-sheets are discontinuous along their strike direction, sheet closure is the most probable process to explain the observed AMS fabrics. We argue that these fabrics may be common to cone-sheets and an integrated geology, petrology and AMS approach can be used to distinguish them from primary flow fabrics. PMID:27282420

  18. Regional and contact metamorphism within the Moy Intrusive Complex, Grampian Highlands, Scotland

    NASA Astrophysics Data System (ADS)

    Zaleski, E.

    1985-04-01

    In central Scotland, the Moy Intrusive Complex consists of (1) the Main Phase — syntectonic peraluminous granodiorite to granite emplaced at c. 455 Ma, intruded by (2) the Finglack Alaskite — post-tectonic leucocratic granite emplaced at 407+/-5 Ma. The Main Phase was emplaced into country rocks at amphibolite facies temperatures. Rb-Sr dates and a compositional spectrum of decreasing celadonite content in Main Phase muscovite suggest the persistence of c. 550° C temperatures for c. 30 Ma but with a declining pressure regime, i.e. isothermal uplift. The Finglack Alaskite was intruded at high structural level, leading to the development of a contact metamorphic aureole in the Main Phase. The thermal effects of contact metamorphism include intergrowths of andalusite, biotite and feldspar in pseudomorphs after muscovite. This is associated with recrystallized granoblastic quartz. Muscovite breakdown and reaction with adjacent biotite, quartz and feldspar, i.e. a function of local mineral assemblage rather than bulk rock composition, is postulated to explain the occurrence of metamorphic andalusite in a granitoid rock. The Main Phase pluton of the Moy Intrusive Complex lies within a NNE trending belt of c. 450 Ma Caledonian tectonic and magmatic activity paralleling the Moine Thrust, and extending from northern Scotland to the Highland Boundary Fault. Syntectonic ‘S-type’ magmatism with upper crustal source areas implies crustal thickening and suggests an intracratonic orogeny.

  19. Drilling the Bushveld Complex- the world's largest layered mafic intrusion

    NASA Astrophysics Data System (ADS)

    Ashwal, L. D.; Webb, S. J.; Trumbull, R. B.

    2013-12-01

    The fact that surprising new discoveries can be made in layered mafic intrusions (e.g., subtle 100-150 m cyclicity in apparently homogeneous cumulates over 1000s of m) means that we are still in the first-order characterization phase of understanding these objects. Accordingly, we have secured funding from ICDP for a planning workshop to be held in Johannesburg in early 2014, aimed at scientific drilling of the Bushveld Complex, the world's largest layered mafic intrusion. Science objectives include, but are not limited to: 1. Magma chamber processes & melt evolution. How many melts/magmas/mushes were involved, what were their compositions and how did they interact? What, if anything, is missing from the Complex, and where did it go? Did Bushveld magmatism have an effect upon Earth's atmosphere at 2 Ga? 2. Crust-mantle interactions & origin of Bushveld granitoids. Are Bushveld granites & rhyolites crustal melts, differentiates from the mafic magmas or products of immiscibility? How can the evolved isotopic signatures in the mafic rocks (e.g., epsilon Nd to -8) be understood? 3. Origin of ore deposits. What were the relative roles of gravity settling, magma mixing, immiscibility and hydrothermal fluid transport in producing the PGE, Cr and V deposits? We have identified 3 potential drilling targets representing a total of ~12 km of drill core. Exact locations of drill sites are to be discussed at the workshop. Target A- East-Central Bushveld Complex. We propose 3 overlapping 3 km boreholes that will provide the first roof-to-floor continuous coverage of the Rustenburg Layered Suite. These boreholes will represent a curated, internationally available reference collection of Bushveld material for present and future research. Target B- Southeastern Bushveld Complex. We propose a single borehole of ~2 km depth, collared in Rooiberg felsite, and positioned to intersect the Roof Zone, Upper Zone, Main Zone and floor of the Complex. Amongst other things, this site will

  20. Episodic growth of a Late Cretaceous and Paleogene intrusive complex of pegmatitic leucogranite, Ruby Mountains core complex, Nevada, USA

    USGS Publications Warehouse

    Howard, Keith A.; Wooden, J.L.; Barnes, C.G.; Premo, W.R.; Snoke, A.W.; Lee, S.-Y.

    2011-01-01

    Gneissic pegmatitic leucogranite forms a dominant component (>600 km3) of the midcrustal infrastructure of the Ruby Mountains–East Humboldt Range core complex (Nevada, USA), and was assembled and modified episodically into a batholithic volume by myriad small intrusions from ca. 92 to 29 Ma. This injection complex consists of deformed sheets and other bodies emplaced syntectonically into a stratigraphic framework of marble, calc-silicate rocks, quartzite, schist, and other granitoids. Bodies of pegmatitic granite coalesce around host-rock remnants, which preserve relict or ghost stratigraphy, thrusts, and fold nappes. Intrusion inflated but did not disrupt the host-rock structure. The pegmatitic granite increases proportionally downward from structurally high positions to the bottoms of 1-km-deep canyons where it constitutes 95%–100% of the rock. Zircon and monazite dated by U-Pb (sensitive high-resolution ion microprobe, SHRIMP) for this rock type cluster diffusely at ages near 92, 82(?), 69, 38, and 29 Ma, and indicate successive or rejuvenated igneous crystallization multiple times over long periods of the Late Cretaceous and the Paleogene. Initial partial melting of unexposed pelites may have generated granite forerunners, which were remobilized several times in partial melting events. Sources for the pegmatitic granite differed isotopically from sources of similar-aged interleaved equigranular granites. Dominant Late Cretaceous and fewer Paleogene ages recorded from some pegmatitic granite samples, and Paleogene-only ages from the two structurally deepest samples, together with varying zircon trace element contents, suggest several disparate ages of final emplacement or remobilization of various small bodies. Folded sills that merge with dikes that cut the same folds suggest that there may have been in situ partial remobilization. The pegmatitic granite intrusions represent prolonged and recurrent generation, assembly, and partial melting modification of a

  1. Petrogenesis and metallogenesis of the Wajilitag and Puchang Fe-Ti oxide-rich intrusive complexes, northwestern Tarim Large Igneous Province

    NASA Astrophysics Data System (ADS)

    Zhang, Dongyang; Zhang, Zhaochong; Huang, He; Cheng, Zhiguo; Charlier, Bernard

    2018-04-01

    The Wajilitag and Puchang intrusive complexes of the Tarim large igneous province (TLIP) are associated with significant resources of Fe-Ti oxide ores. These two mafic-ultramafic intrusions show differences in lithology and mineral chemistry. Clinopyroxenite and melagabbro are the dominant rock types in the Wajilitag complex, whereas the Puchang complex is generally gabbroic and anorthositic in composition with minor plagioclase-bearing clinopyroxenites in the marginal zone. Disseminated Fe-Ti oxide ores are found in the Wajilitag complex and closely associated with clinopyroxenites, whereas the Puchang complex hosts massive to disseminated Fe-Ti oxide ores mainly within its gabbroic rocks. The Wajilitag intrusive rocks are characterized by a restricted range of initial 87Sr/86Sr ratios (0.7038-0.7048) and positive εNd(t) (+0.04 - +3.01), indicating insignificant involvement of continental crustal contamination. The slightly higher initial 87Sr/86Sr ratios (0.7039-0.7059) and lower εNd(t) values (-1.05 - +2.35) of the Puchang intrusive rocks also suggest that the isotopic characteristics was controlled primarily by their mantle source, rather than by crustal contamination. Both complexes have Sr-Nd isotopic compositions close the neighboring kimberlitic rocks and their hosted mantle xenoliths in the TLIP. This indicates that the ferrobasaltic parental magmas were most probably originated from partial melting of a metasomatized subcontinental lithospheric mantle, modified recently with subduction-related materials by the impingement of the ascending mantle plume. The recycled subduction-related materials preserved in the lithospheric mantle could play a key role in the formation of the parental Fe-rich magmas in the context of an overall LIP system. The distinct variations in mineral assemblage for each complex and modeled results indicated that the Wajilitag and Puchang complexes experienced different crystallization path. Fe-Ti oxides in Wajilitag joined the

  2. Evolution of Palaeoproterozoic mafic intrusions located within the thermal aureole of the Sudbury Igneous Complex, Canada: Isotopic, geochronological and geochemical evidence

    NASA Astrophysics Data System (ADS)

    Prevec, Stephen A.; Baadsgaard, Halfdan

    2005-07-01

    Impact cratering and their resultant geological phenomena are recognised as significant factors in the lithological and biologic evolution of the earth. Age-dating of impact events is critical in correlating cause and effects for these catastrophic processes. The Falconbridge and Drury Township (Twp) intrusions were emplaced at the contact between Neoarchaean basement and Palaeoproterozoic volcanosedimentary rocks, and also lie at the southeast and southwest edges of the Sudbury Igneous Complex (SIC), within its thermal contact aureole. The Falconbridge Twp intrusion is dated at 2441 ± 3 Ma by U-Pb zircon, with evidence of Archaean inheritance from its host granitoids. Granitoids from the southernmost Abitibi Subprovince are dated here between 2670 ± 11 Ma for an undeformed Algoman granite, and 2696 ± 18 Ma for a foliated granitoid, consistent with existing data from the Abitibi Greenstone Belt and from the Wawa Subprovince. Major and trace element geochemical evidence, common-Pb isotopic compositions, and ɛNd2440 values between 0 and -1 are all consistent with a Palaeoproterozoic origin for the Falconbridge Twp intrusion, and support inclusion in the East Bull Lake-type suite of leucogabbroic plutons and sills. In contrast, the Drury Twp intrusion gives a U-Pb zircon age of 1859 ± 13 Ma, coincident with the date of SIC-emplacement. While the major and trace element compositions are comparable to the Falconbridge data, the Drury displays significant heterogeneity in ɛNd2440, with values ranging from +3.7 to -0.1, and contains more radiogenic Pb isotopic compositions. Field, geochemical and isotopic evidence clearly distinguishes this intrusion from constituents of the SIC itself, and indicates that the Drury too is a Palaeoproterozoic intrusion. This requires that apparently unshocked, undeformed magmatic-looking zircon has been grown or reset in a postmagmatic setting. This has significant implications for the identification of mantle-derived magmas and

  3. Intrusive hyaloclastite and peperitic breccias associated to sill and cryptodome emplacement on an Early Paleocene polymagmatic compound cone-dome volcanic complex from El Guanaco mine, Northern Chile

    NASA Astrophysics Data System (ADS)

    Páez, G. N.; Permuy Vidal, C.; Galina, M.; López, L.; Jovic, S. M.; Guido, D. M.

    2018-04-01

    This work explores the textural characteristics, morphology and facies architecture of well-preserved Paleocene hyaloclastic and peperitic breccias associated with subvolcanic intrusions at El Guanaco gold mine (Northern Chile). The El Guanaco mine volcanic sequence is part of a polymagmatic compound cone-dome volcanic complex grouping several dacitic domes and maar-diatremes, and subordinated subvolcanic intrusions of basaltic, andesitic and dacitic compositions. The Soledad-Peñafiel Fault System is a first order regional structure controlling the location and style of the volcanism in the region. Three different intrusive bodies (Basaltic sills, Dacitic cryptodomes and Andesitic cryptodomes) were found to intrude into a wet and poorly consolidated pyroclastic sequence representing the upper portions of a maar-diatreme. Consequently, extensive quench fragmentation and fluidization along their contacts occurred, leading to the formation of widespread breccia bodies enclosing a coherent nucleus. Differences in matrix composition allows to define two main breccias types: 1) poorly-sorted monomictic breccias (intrusive hyaloclastites) and 2) poorly-sorted tuff-matrix breccias (peperites). The observed facies architecture is interpreted as the result of the interplay of several factors, including: 1) magma viscosity, 2) the geometry of the intrusives, and 3) variations on the consolidation degree of the host rocks. Additionally, the overall geometry of each intrusive is interpreted to be controlled by the effective viscosity of the magmas along with the available magma volume at the time of the intrusions. The presence of three compositionally different subvolcanic bodies with intrusive hyaloclastite and peperite envelopes indicate, not only that all these intrusions occurred in a short period of time (probably less than 2-3 Ma), but also that the volcaniciclastic pile suffer little or none compaction nor consolidation during that time. The presence of three

  4. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena.

  5. Origin of a late Neoproterozoic (605 ± 13 Ma) intrusive carbonate-albitite complex in Southern Sinai, Egypt

    NASA Astrophysics Data System (ADS)

    Azer, Mokhles Kamal; Stern, Robert J.; Kimura, Jun-Ichi

    2010-03-01

    transformed some of the dolomitite into breunneritite. Recognition of Tarr-type should encourage similar hypabyssal complex intrusions to be sought for in association with A-type granitic plutons elsewhere.

  6. Cup-shaped Intrusions, Morphology and Emplacement Mechanism Investigate Through Analogue Modelling

    NASA Astrophysics Data System (ADS)

    Mathieu, L.; van Wyk de Vries, B.

    2007-12-01

    We investigate the morphology of large-scale shallow-depth magma intrusions and sub-volcanic complexes with analogue models. Intrusions of analogue magma are done in a granular material that can contain a ductile layer. The model surface is flat to model the formation of plutonic intrusions and it is overlain by a cone when modelling late sub-volcanic complexes. For flat-top models, we obtain cup-shaped intrusions fed by dykes. Cup-shaped intrusions are inverted-cone like bodies. They are different from saucer-shaped intrusions as they possess neither a well developed sill-base, nor an outer rim. However, like saucers, cups are shallow depth intrusions that dome the country rocks. They initiate from an advancing dyke and first develop an inverted-cone like morphology. Then, the central thickness increases and thrusts form at the edge of the domed country rocks. At this stage, the intrusions progressively involve toward a lopolith shape. By using analogue magma of various viscosities we have been able to constrain key relationships: higher intrusion viscosity causes deeper initiation and the deeper they initiate, the larger is the intrusion diameter. A natural example of such intrusion might by the circles of volcanoes like the Azufre-Lastaria (Peru) that might be overlain be a large-scale cup-shaped intrusion. When adding a cone at the surface of the model and, sometimes, a thin ductile layer in the substratum, the morphology of cup-shaped intrusions vary. Note that the ductile layer of our models is not thick enough to induce the gravitational spreading of the cone. Generally, cup-shaped intrusions are asymmetric in cross section and elliptical in plan view. Their formation creates extension structures in the cone (croissant-shaped rift, straight rift or normal fault) and thrusts in some sectors below the cone. Both types of structures are bordered by strike-slip faults. Cups and saucers share many similarities, but differ probably in the fact that saucers are

  7. Titaniferous magnetite in the layered intrusive complex at Lakathah, Kingdom of Saudi Arabia

    USGS Publications Warehouse

    Martin, Conrad; Roberts, Ralph Jackson; Stoeser, D.B.

    1979-01-01

    The Lakathah layered intrusive complex about 90 km east of Qunfudhah contains significant resources of low-grade titanium-bearing rock. The complex is about 10 km in diameter and consists of three principal units: an outer syenite ring, an intermediate diorite-gabbro zone, and a central pyroxenite-hornblendite core. The principal mineralization zone is in the ultramafic core of the complex. The titanium is mainly in titaniferous magnetite, but some is in ilmenite intergrown with magnetite and in the titanium-bearing hornblende, kaersutite. The titaniferous magnetite is in concordant lenses and veinlets and is disseminated throughout the host rock. The lenses and veins range from a few centimeters to 3 m in width and are as much as 50 m long. The layered disseminated bodies contain as much as 25 percent magnetite. Exploratory drilling showed that an area 500 by 1000 m contains titaniferous rock averaging about 6.2 percent TiO2. This mineralized zone contains about 175,000,000 tons per 100 m depth. Material of this grade is not commercial at this time, but may be a future resource. Alluvial deposits along the Red Sea near Al Qunfudhah should be tested for possible deposits of titaniferous sand.

  8. Distributed intrusion detection system based on grid security model

    NASA Astrophysics Data System (ADS)

    Su, Jie; Liu, Yahui

    2008-03-01

    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  9. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    USGS Publications Warehouse

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  10. AdaBoost-based algorithm for network intrusion detection.

    PubMed

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  11. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    NASA Astrophysics Data System (ADS)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  12. Geochemical and Isotopic Features of Çaykara (Trabzon, NE Turkey) Intrusive Complex

    NASA Astrophysics Data System (ADS)

    Sen, Cuneyt; Aydınçakır, Emre; Aydin, Faruk; Dokuz, Abdurrahman; Karslı, Orhan; Yılmazer, Sinan; Dündar, Buket

    2017-04-01

    Çaykara (Trabzon) Intrusive Complex is located at the eastern part of the Kaçkar Batholith. In the complex, Gündoǧdu-Boǧalı Plutons is Upper Cretaceous in aged, and Uzundere and Eǧerler Plutons are Eocene in aged. Gündoǧdu-Boǧa Plutons crop out around Araklı-Bahçecik villages, and are represented by the granitic to granodioritic rocks in composition showing porphyritic-granular texture. These rocks contain dark coloured, semi-rounded to rounded, wedged, fine-grained diorite and monzodiorite anclaves. Uzuntarla Pluton extends at E-W from Köknar-Karaçam-Uzuntarla sub-districs to south of Çaykara towards Bahçecik sub-district of Araklı. The rocks of the Uzuntarla Pluton are generally diorite to granodiorite in composition with porphyritic in texture. Eǧerler Pluton exposes at southern of the Çaykara Intrusive Complex. It's mineralogical composition is changing from diorite to granite with medium-coarse grain granular texture. The Upper Cretaceous plutonic rocks are characterized by ɛNd(i) values range from -1.5 to -9.7, whereas 87Sr/86Sr(i) values range from 0.7052 to 0.7119. Nd model ages are between 0.94 and 1.52 Ga. 206Pb/204Pb(i), 207Pb/204Pb(i) and 208Pb/204Pb(i) contents of samples change from 18.24 to 18.72, 15.59 to 15.66 and 37.93-38.64, respectively. The δ18O values in the investigated samples range from 4.0 ‰ to 6.7 ‰ and have similar ratios to I-type granitoides.The Eocene plutonic rocks are characterized by ɛNd(i) values range from -0.4 to -6.0, whereas 87Sr/86Sr(i) values range from 0.7050 to 0.7143. Nd model ages are between 0.81 and 1.32 Ga. 206Pb/204Pb(i), 207Pb/204Pb(i) and 208Pb/204Pb(i) contents of samples change from 18.241to 18.57, 15.58 to 15.63 and 38.22-38.92, respectively. The δ18O values in the investigated samples range from 5.8 ‰ to 7.1 ‰ and have similar ratios to I-type granitoides. Upper Cretaceous and Eocene aged Plutons in the study area are high-K calc-alkaline in composition and display metaluminous to

  13. Draped aeromagnetic survey in Transantarctic Mountains over the area of the Butcher Ridge igneous complex showing extent of underlying mafic intrusion

    USGS Publications Warehouse

    Behrendt, John C.; Damaske, D.; Finn, C.A.; Kyle, P.; Wilson, T.J.

    2002-01-01

    A draped aeromagnetic survey over the area surrounding the Butcher Ridge igneous complex (BRIC), Transantarctic Mountains, was acquired in 1997-1998 as part of a larger Transantarctic Mountains Aerogeophysical Research Activity survey. The BRIC is a sill-like hypoabyssal intrusion ranging in composition from tholeiitic basalt to rhyolite. An 40Ar/39 Ar age of 174 Ma and the chemical character of the basaltic rocks show the BRIC to be part of the widespread Jurassic Ferrar suite of continental tholeiitic rocks, that extends for 3500 km across Antarctica. The aeromagnetic survey shows a horseshoe-shaped pattern of anomalies reaching amplitudes as great as 1900 nT generally associated with the bedrock topography where it is exposed. It is apparent that the high-amplitude anomaly pattern is more extensive than the 10-km-long exposed outcrop, first crossed by a single 1990 aeromagnetic profile. The highest-amplitude anomalies appear south of the profile acquired in 1990 and extend out of the survey area. The new aeromagnetic data allow determination of the extent of the interpreted Butcher mafic(?) intrusion beneath exposures of Beacon sedimentary rock and ice in the area covered, as well as beneath the small BRIC exposure. The magnetic anomalies show a minimum area of 3000 km2, a much greater extent than previously inferred. Magnetic models indicate a minimum thickness of ~1-2 km for a horizontal intrusion. However, nonunique models with magnetic layers decreasing in apparent susceptibility with depth are consistent with of a 4- to 8-km-thick layered intrusion. These magnetic models indicate progressively deeper erosion of the interpreted mafic-layered body from the south to north. The erosion has removed more magnetic upper layers that mask the magnetic effects of the lower less magnetic layers. The probable minimum volume of the intrusion in the area of the survey is ~6000 km3. An alternate, but less likely, interpretation of a series of dikes can also fit the

  14. Lithologic mapping of mafic intrusions in East Greenland using Landsat Thematic Mapper data

    NASA Technical Reports Server (NTRS)

    Naslund, H. Richard; Birnie, R. W.; Parr, J. T.

    1989-01-01

    The East Greenland Tertiary Igneous Province contains a variety of intrusive and extrusive rock types. The Skaergaard complex is the most well known of the intrusive centers. Landsat thematic mapping (TM) was used in conjunction with field spectrometer data to map these mafic intrusions. These intrusions are of interest as possible precious metal ore deposits. They are spectrally distinct from the surrounding Precambrian gneisses. However, subpixel contamination by snow, oxide surface coatings, lichen cover and severe topography limit the discrimination of lithologic units within the gabbro. Imagery of the Skaergaard and surrounding vicinity, and image processing and enhancement techniques are presented. Student theses and other publications resulting from this work are also listed.

  15. Petroleum Vapor Intrusion

    EPA Pesticide Factsheets

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  16. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  17. Igneous intrusion models for floor fracturing in lunar craters

    NASA Technical Reports Server (NTRS)

    Wichman, R. W.; Schultz, P. H.

    1991-01-01

    Lunar floor-fractured craters are primarily located near the maria and frequently contain ponded mare units and dark mantling deposits. Fracturing is confined to the crater interior, often producing a moat-like feature near the floor edge, and crater depth is commonly reduced by uplift of the crater floor. Although viscous relaxation of crater topography can produce such uplift, the close association of modification with surface volcanism supports a model linking floor fracture to crater-centered igneous intrusions. The consequences of two intrusion models for the lunar interior are quantitatively explored. The first model is based on terrestrial laccoliths and describes a shallow intrusion beneath the crater. The second model is based on cone sheet complexes where surface deformation results from a deeper magma chamber. Both models, their fit to observed crater modifications and possible implications for local volcanism are described.

  18. Granite intrusion in a metamorphic core complex: the example of the Mykonos laccolith (Cyclades, Greece)

    NASA Astrophysics Data System (ADS)

    Denèle, Yoann; Lecomte, Emmanuel; Jolivet, Laurent; Huet, Benjamin; Labrousse, Loïc.; Le Pourhiet, Laetitia; Lacombe, Olivier

    2010-05-01

    Numerical and analogical modelling underlined the importance of a pre-existing anomaly of viscosity-density such as a granite or migmatitic body below the brittle-ductile transition as a primary cause of metamorphic core complex (MCC) developpement. While field studies of MCC show a spatial and temporal link between MCC formation and plutonic activity, thermochronological studies show that there is no link between the intrusion of granites and the velocity of slip on the detachement plane. The Aegean domain is a good natural laboratory for studying the formation of MCC and syn-tectonic granites. In the northern Cyclades, the Mykonos-Delos-Rhenia MCC is characterised by the intrusion of a plurikilometric Late Miocene pluton of I-type granite within a migmatitic gneiss dome. AMS (Anisotropy of magnetic susceptibility) and microstructural studies in the Mykonos granites combined with recent cooling rate data allow us to use the granites as strain marker. The Mykonos granitoïds form a plurikilometric laccolith slightly deeping to the east and presenting an elliptical shape with a N170°E long axis. The laccolith is strongly asymmetrical with an outlying root zone in the SW cropping out on Delos and Rhenia islands and a major body mainly developed to the NE and cropping out on Mykonos Island. The laccolith consists of various petrographic facies presenting straight contacts that demonstrate emplacement by successive pulses of more or less differentiated magmas. The laccolith was developed at the interface between the Cycladic Basement and the Blueschists Unit and within the Blueschist Unit. Two events of deformation have been recorded in the granites. The first event is characterized by submagmatic and high to middle temperature protomylonite microstructures developped during or just after the intrusion. The second event of deformation characterized by low temperature mylonites and cataclasites close to the major detachment fault corresponds to the localization of

  19. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  20. Palaeomagnetism of the Early Permian Mount Leyshon Intrusive Complex and Tuckers Igneous Complex, North Queensland, Australia

    NASA Astrophysics Data System (ADS)

    Clark, D. A.; Lackie, M. A.

    2003-06-01

    This study provides reliable, precisely defined and well-dated Early Permian (286 +/- 6 Ma) palaeomagnetic poles for Australia from the Mount Leyshon Intrusive Complex (MLIC) and the Tuckers Igneous Complex (TIC). Both complexes are associated with prominent negative magnetic anomalies, indicating the presence of rocks carrying stable remanence of reverse polarity, with a Koenigsberger ratio greater than unity. The characteristic remanence carried by the intrusive phases and by locally remagnetized, contact-metamorphosed host rocks is always of reverse polarity, consistent with acquisition during the Permo-Carboniferous (Kiaman) Reverse Superchron. The corresponding palaeopoles confirm that Australia occupied high latitudes in the Early Permian. The pole positions are: MLIC: lat. = 43.2 °S, long. = 137.3 °E dp = 6.0°, dm = 6.4° Q= 6; TIC: lat. = 47.5 °S, long. = 143.0 °E, dp = 6.0°, dm = 6.6° Q= 6. Permian palaeomagnetic overprinting is detectable at considerable distances from the MLIC (2-3 km), well beyond the zone of visible alteration. The primary nature of the Early Permian palaeomagnetic signature is established by full baked contact/aureole tests at both localities. Other new data from Australia are consistent with the poles reported here. Comparison of the Australian, African and South American Apparent Polar Wander Paths (APWP) suggests that mean Permian and Triassic poles from West Gondwana, particularly from South America, are biased by remagnetization in the Jurassic-Cretaceous and that the Late Palaeozoic-Mesozoic APWP for Gondwana is best defined by Australian data. The Australian APWP exhibits substantial movement through the Mesozoic. Provided only that the time-averaged palaeofield was zonal, the Early Triassic palaeomagnetic data from Australia provide an important palaeogeographic constraint that the south geographic pole was within, or very close to, SE Australia around 240 Ma. The new Early Permian poles are apparently more consistent

  1. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    NASA Astrophysics Data System (ADS)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    moving upwards and laterally through the cumulate pile. The Rum layered intrusion is an open intrusive complex, composed of individual partially molten zones, evolving independently. The Rum layered intrusion offers a direct overview of processes taking place in shallow intra-plate and ridge magma chambers. Intrusion of hot magma into a pre-existing cumulate pile results in the modification both the incoming liquid and the host-rock cumulates. Our study highlights the necessity of considering this type of process when modelling the geochemistry of lavas erupted from magma chambers subject to repeated replenishment.

  2. Ratio of Major Ions in Groundwater to Determine Saltwater Intrusion in Coastal Areas

    NASA Astrophysics Data System (ADS)

    Sudaryanto; Naily, Wilda

    2018-02-01

    Saltwater or seawater intrusion into groundwater aquifers occurs mostly in big cities and developing coastal cities. Coastal hydrology is associated with complex and highly dynamic environmental characteristics of interactions between groundwater, surface water, and water from the estuary. The rise of sea levels and excessive use of groundwater for clean water source trigger saltwater intrusion. Identification of saltwater intrusion into groundwater can be done by groundwater sampling and major ion analysis. The major ions dissolved in water are Ca, Mg, Na, K, Cl, HCO3, and SO4; the major ion ratios are Cl/Br, Ca/Mg, Ca/ (HCO3 and SO4), and Na/Cl. By knowing whether groundwater quality has been or has not been influenced by saltwater, groundwater zones can be determined in every coastal area. In addition, by analyzing and reviewing some concepts about the intrusion or contamination of saltwater into groundwater, there will be sufficient results for the identification of saltwater intrusion.

  3. Influence of Age, Thought Content, and Anxiety on Suppression of Intrusive Thoughts

    PubMed Central

    Beadel, Jessica R.; Green, Jennifer S.; Hosseinbor, Shahrzad; Teachman, Bethany A.

    2013-01-01

    Understanding differences in responses following attempts to suppress versus simply monitor intrusive thoughts is important given the established relationship between intrusive thinking and numerous forms of psychopathology. Moreover, these differences may vary as a function of age. Because of the links between aging and both enhancement in emotion regulation skills and decline in inhibition skills, older and younger adults were expected to differ in their responses (e.g., experience of negative affect and thought recurrence) to attempts at suppressing intrusive thoughts. This study examined whether efforts to suppress thought content that varied in valence and age-relevance differentially affected older (N = 40, aged 66–92) and younger (N = 42, aged 16–25) adults’ ability to inhibit intrusive thought recurrence and their resulting negative affect. Interestingly, older adults experienced less recurrence for most thoughts than younger adults. Also, for several dependent variables (negative affect and perceived difficulty suppressing intrusive thoughts), older adults showed less decline in their magnitude of response across thinking periods (i.e., from suppression to monitoring) than did younger adults. These age effects were not generally moderated by level of trait anxiety, though higher anxiety did predict intrusive thought responding in expected directions, such as greater negative affect. These findings point to independent influences of age and anxiety, and suggest a complex mix of risk and protective factors for older adults’ responses to intrusive thoughts. PMID:23395408

  4. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  5. Deep intrusions, lateral magma transport and related uplift at ocean island volcanoes

    NASA Astrophysics Data System (ADS)

    Klügel, Andreas; Longpré, Marc-Antoine; García-Cañada, Laura; Stix, John

    2015-12-01

    Oceanic intraplate volcanoes grow by accumulation of erupted material as well as by coeval or discrete magmatic intrusions. Dykes and other intrusive bodies within volcanic edifices are comparatively well studied, but intrusive processes deep beneath the volcanoes remain elusive. Although there is geological evidence for deep magmatic intrusions contributing to volcano growth through uplift, this has rarely been demonstrated by real-time monitoring. Here we use geophysical and petrological data from El Hierro, Canary Islands, to show that intrusions from the mantle and subhorizontal transport of magma within the oceanic crust result in rapid endogenous island growth. Seismicity and ground deformation associated with a submarine eruption in 2011-2012 reveal deep subhorizontal intrusive sheets (sills), which have caused island-scale uplift of tens of centimetres. The pre-eruptive intrusions migrated 15-20 km laterally within the lower oceanic crust, opening pathways that were subsequently used by the erupted magmas to ascend from the mantle to the surface. During six post-eruptive episodes between 2012 and 2014, further sill intrusions into the lower crust and upper mantle have caused magma to migrate up to 20 km laterally, resulting in magma accumulation exceeding that of the pre-eruptive phase. A comparison of geobarometric data for the 2011-2012 El Hierro eruption with data for other Atlantic intraplate volcanoes shows similar bimodal pressure distributions, suggesting that eruptive phases are commonly accompanied by deep intrusions of sills and lateral magma transport. These processes add significant material to the oceanic crust, cause uplift, and are thus fundamentally important for the growth and evolution of volcanic islands. We suggest that the development of such a magma accumulation zone in the lower oceanic crust begins early during volcano evolution, and is a consequence of increasing size and complexity of the mantle reservoir system, and potentially

  6. The Mesozoic-Cenozoic igneous intrusions and related sediment-dominated hydrothermal activities in the South Yellow Sea Basin, the Western Pacific continental margin

    NASA Astrophysics Data System (ADS)

    Yumao, Pang; Xunhua, Zhang; Guolin, Xiao; Luning, Shang; Xingwei, Guo; Zhenhe, Wen

    2018-04-01

    Various igneous complexes were identified in multi-channel seismic reflection profiles from the South Yellow Sea Basin. It is not rare that magmatic intrusions in sedimentary basins cause strong thermal perturbations and hydrothermal activities. Some intrusion-related hydrothermal vent complexes have been identified and they are considered to originate from the deep sedimentary contact aureole around igneous intrusions and terminate in upper vents structures, and are linked by a vertical conduit system. The upper vent complexes are usually eye-shaped, dome-shaped, fault-related, crater-shaped or pock-shaped in seismic profiles. A schematic model was proposed to illustrate the structures of different types of hydrothermal vent complexes. A conceptual conduit model composed of an upper pipe-like part and a lower branching part was also derived. Hydrothermal vent complexes mainly developed during the Middle-Late Cretaceous, which is coeval with, or shortly after the intrusion. The back-arc basin evolution of the area which is related to the subduction of the Paleo-Pacific plate during the Mesozoic-Cenozoic may be the principal factor for voluminous igneous complexes and vent complexes in this area. It is significant to study the characteristics of igneous complexes and related hydrothermal vent complexes, which will have implications for the future study of this area.

  7. Lu-Hf isotopic memory of plume-lithosphere interaction in the source of layered mafic intrusions, Windimurra Igneous Complex, Yilgarn Craton, Australia

    NASA Astrophysics Data System (ADS)

    Nebel, O.; Arculus, R. J.; Ivanic, T. J.; Nebel-Jacobsen, Y. J.

    2013-10-01

    Most layered mafic intrusions (LMI) are formed via multiple magma injections into crustal magma chambers. These magmas are originally sourced from the mantle, likely via plume activity, but may interact with the overriding lithosphere during ascent and emplacement in the crust. The magma injections lead to the establishment of different layers and zones with complex macroscopic, microscopic and cryptic compositional layering through magmatic differentiation and associated cumulate formation, sometimes accompanied by crustal assimilation. These complex mineralogical and petrological processes obscure the nature of the mantle sources of LMI, and typically have limited the degree to which parental liquids can be fully characterised. Here, we present Lu-Hf isotope data for samples from distinct layers of the Upper Zone of the Windimurra Igneous Complex (WIC), an immense late-Archean LMI in the West Australian Yilgarn Craton. Lu-Hf isotope systematics of whole rocks are well correlated (MSWD=5.6, n=17) with an age of ˜3.05±0.05 Ga and initial ɛHf˜+8. This age, however, is older than whole rock Sm-Nd and zircon U-Pb ages of the intrusion, both of which are ca. 2.8 Ga. Stratigraphically-controlled initial Hf isotope variations (associated with multiple episodes of emplacement at ca. 2.8 Ga) indicate isotope mixing between a near-chondritic and an ultra-radiogenic component, the latter with ɛHf[2.8 Ga]>+15. This Hf isotope mixing creates a pseudochron-relationship at the time of intrusion of ˜250 Myr that is superimposed on subsequent radiogenic ingrowth after crystallisation, generating an age that predates the actual emplacement event. Mixing between late-stage crystallisation products (melt + crystals) from the Middle Zone and replenishing, plume-derived liquids was followed by crystal accumulation in a chemically evolving magma chamber. The ultra-radiogenic Hf isotope endmember in the WIC mantle source requires parent-daughter ratios consistent with very early

  8. 40Ar/39Ar dates from alkaline intrusions of the northern Crazy Mountains, south-central Montana

    NASA Astrophysics Data System (ADS)

    Harlan, S. S.

    2005-05-01

    The Crazy Mountains basin of south-central Montana is a complex foreland basin that formed during the interaction of thin-skinned, decollement-style folds of the Montana thrust belt and the basement-involved folds and thrust faults of the Rocky Mountain foreland province. Near the depositional center of the basin, synorogenic strata of the Paleocene Fort Union Formation have been intruded and locally thermally metamorphosed by strongly alkaline to subalkaline Tertiary intrusive rocks. The subalkaline rocks are found mostly in the southern Crazy Mountains and form stocks (Big Timber stock, Loco Mountain stock), radiating dikes and sills. With the exception of the Ibex Mountain sill (?), the alkaline rocks are restricted to the northern Crazy Mountains. New 40Ar/39Ar dates are reported from the strongly alkaline rocks, including the Comb Creek stock and dike swarm, the Ibex Mountain sill(?), and sills from the Robinson anticline intrusive complex. The alkaline rocks of the Robinson anticline intrusive complex are exposed in the easternmost folds of the Cordilleran fold and thrust belt, but despite their arcuate and apparently folded map geometry they have been shown to post-date folding. Hornblende from a trachyte sill in the Robinson anticline intrusive complex yielded a relatively simple age spectrum with a weighted mean of 50.61 ± 0.14 Ma (2σ), which probably records the age of sill emplacement. Nepheline syenite and mafic nepheline syenites of the Comb Creek stock and a dike from its radial dike swarm, two sills from the Robinson antlicline intrusive complex, and the Ibex Mountains sill(?) gave biotite plateau dates ranging from 50.03 to 50.22 Ma, with 2σ errors of ± 0.11 to 0.19 Ma. Because these dates are from fairly small, hypabyssal intrusions, they must have cooled quickly and thus these dates closely approximate the emplacement age of the intrusions. These data indicate that the strongly alkaline intrusions were emplaced during a fairly restricted

  9. Geochemistry and field geology of shoshonitic magmas in the Late Cretaceous foreland fold and thrust belt of southwestern Montana: Results from the North Doherty Mountain Intrusive Complex

    NASA Astrophysics Data System (ADS)

    Beranek, L. P.; Burton, B. R.; Ihinger, P. D.

    2002-12-01

    The North Doherty Mountain Intrusive Complex (NDMIC) is one of several satellite plutons related to the areally extensive Boulder batholith of southwestern Montana. The Boulder batholith comprises multiple plutons and intrusive phases, and the magmatism has long been thought to be the result of subduction due to its calc-alkaline granodioritic composition. The batholith is situated in the Helena salient, which differs from other parts of the North American Cordilleran foreland because there, magmatism spatially and temporally overlaps with deformation in the foreland fold and thrust belt. The North Doherty Mountain Intrusive Complex (NDMIC) is one of several satellite plutons related to the Boulder batholith and represents an ideal microcosm of the batholith for petrogenetic and structural studies because it exposes both mafic and felsic units and was emplaced in the limb of a major thrust related fold. We present new geologic mapping and detailed trace element geochemical analyses to show that the entire mafic-to-felsic suite of rocks in the NDMIC are cogenetic and shoshonitic in character. Shoshonites are unusual magmas that are distinguished by their high concentrations of K, Rb, Sr, Ba, Zr, and Th contents, and are thought to represent partial melting at great depths within the mantle wedge above a subducting slab. The presence of shoshonitic magma in the Cordilleran foreland fold and thrust belt provides important clues into the nature of the formation of this unusual magma type and can provide insights into our understanding of magmatism in foreland structural settings.

  10. The New Paleomagnetic Data from the Permian-Triassic Intrusions of the North-Western Siberian Platform: Implications for the Evolution of the Magmatic Activity

    NASA Astrophysics Data System (ADS)

    Latyshev, A.; Ulyahina, P.; Krivolutskaya, N.

    2017-12-01

    The Siberian Traps Large Igneous Province (LIP) is the area of the great scientific interest due to the huge Cu-Ni and PGE deposits related to the mafic intrusions located in Norilsk region. Though this area has been an object of the detailed investigations for many decades, the genesis of these deposits is still debated. Nowadays, 7 Permian-Triassic intrusive complexes are distinguished in Norilsk region, however their age, order of emplacement and correlation with the volcanic section are discussed. We perform the results of the detailed paleomagnetic study of the intrusions from the North-Western Siberian platform (Norilsk and Culumbe regions), including the ore-bearing Chernogorsky intrusion and some apophyses of the ore-bearing bodies. Our results demonstrate the contrasting paleomagnetic directions in different intrusions, providing an opportunity of the paleomagnetic division of the intrusive complexes and types. Moreover, some intrusions belonging to the same "Norilsk" type yield statistically different paleomagnetic directions. In addition, we found both normally and reversely magnetized intrusions in the most ancient Ergalakhsky complex. Besides, we carried out the detailed investigation of the anisotropy of magnetic susceptibility (AMS) in Norilsk intrusions. While about a half of the studied sites demonstrates so-called "normal" type of AMS ellipsoid, the other intrusions yield reverse or dispersed distributions. Nevertheless, in "normal" sites the shallow north-west directions of the maximal axis K1 are predominant. It is consistent with the idea that the magmatic transport in Norilsk region was controlled by the Norilsk-Kharaelakh regional fault. This work was supported by RFBR (projects #16-35-60114, 17-05-01121, 15-05-09250) and the Ministry of Education and Science RF (project #14.Z50.31.0017).

  11. Platinum-group element geochemistry of zoned ultramafic intrusive suites, Klamath Mountains, California and Oregon.

    USGS Publications Warehouse

    Gray, F.; Page, N.J.; Carlson, C.A.; Wilson, S.A.; Carlson, R.R.

    1986-01-01

    Analyses for platinum-group elements of the varied rock suites of three Alaskan-type ultramafic to mafic multi-intrusive bodies are reported. Ir and Ru are less than analytical sensitivities of 100 and 20 ppb; Rh is less than or near 1 ppb. Average Pd assays vary among the rocks within intrusive complexes and between the three complexes (6.3, 13.7, 36.4 ppb); average Pt assays vary little among the same samples (27.9, 60.9, 34.0 ppb). Statistically adjusted Pt/(Pt + Pd) ratios increase in each suite from gabbro through clinopyroxenite to olivine-rich rocks, possibly owing to Pd fractionation.-G.J.N.

  12. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE must...

  13. Layered intrusion formation by top down thermal migration zone refining (Invited)

    NASA Astrophysics Data System (ADS)

    Lundstrom, C.

    2009-12-01

    The formation of layered mafic intrusions by crystallization from cooling magmas represents the textbook example of igneous differentiation, often attributed to fractional crystallization through gravitational settling. Yet in detail, such interpretations have significant problems such that it remains unclear how these important features form. Put in the Earth perspective that no km scale blob of >50% melt has ever been imaged geophysically and that geochronological studies repeatedly indicate age inconsistencies with “big tank” magma chambers, it may be questioned if km scale magma chambers have ever existed. I will present the case for forming layered intrusions by a top down process whereby arriving basaltic magma reaches a permeability barrier, begins to underplate and forms the intrusion incrementally by sill injection with the body growing downward at ~1 mm/yr rate or less. A temperature gradient zone occurs in the overlying previously emplaced sills, leading to chemical components migrating by diffusion. As long as the rate of diffusion can keep up with rate of sill addition, the body will differentiate along a path similar to a liquid line of descent. In this talk, I will integrate data from 3 areas: 1) laboratory experiments examining the behavior of partially molten silicates in a temperature gradient (thermal migration); 2) numerical modeling of the moving temperature gradient zone process using IRIDIUM (Boudreau, 2003); 3) measurements of Fe isotope ratios and geochronology from the Sonju Lake Intrusion in the Duluth Complex. This model provides the ability to form km scale intrusions by a seismically invisible means, can explain million year offsets in chronology, and has implications for reef development and PGE concentration. Most importantly, this model of top down layered intrusion formation, following a similar recent proposal for granitoid formation (Lundstrom, 2009), represents a testable hypothesis: because temperature gradient driven

  14. [Analysis of intrusion errors in free recall].

    PubMed

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  15. Evaluating sensitivity of complex electrical methods for monitoring CO2 intrusion into a shallow groundwater system and associated geochemical transformations

    NASA Astrophysics Data System (ADS)

    Dafflon, B.; Wu, Y.; Hubbard, S. S.; Birkholzer, J. T.; Daley, T. M.; Pugh, J. D.; Peterson, J.; Trautz, R. C.

    2011-12-01

    A risk factor of CO2 storage in deep geological formations includes its potential to leak into shallow formations and impact groundwater geochemistry and quality. In particular, CO2 decreases groundwater pH, which can potentially mobilize naturally occurring trace metals and ions commonly absorbed to or contained in sediments. Here, geophysical studies (primarily complex electrical method) are being carried out at both laboratory and field scales to evaluate the sensitivity of geophysical methods for monitoring dissolved CO2 distribution and geochemical transformations that may impact water quality. Our research is performed in association with a field test that is exploring the effects of dissolved CO2 intrusion on groundwater geochemistry. Laboratory experiments using site sediments (silica sand and some fraction of clay minerals) and groundwater were initially conducted under field relevant CO2 partial pressures (pCO2). A significant pH drop was observed with inline sensors with concurrent changes in fluid conductivity caused by CO2 dissolution. Electrical resistivity and electrical phase responses correlated well with the CO2 dissolution process at various pCO2. Specifically, resistivity decreased initially at low pCO2 condition resulting from CO2 dissolution followed by a slight rebound because of the transition of bicarbonate into non-dissociated carbonic acid at lower pH slightly reducing the total concentration of dissociated species. Continuous electrical phase decreases were also observed, which are interpreted to be driven by the decrease of surface charge density (due to the decrease of pH, which approaches the PZC of the sediments). In general, laboratory experiments revealed the sensitivity of electrical signals to CO2 intrusion into groundwater formations and can be used to guide field data interpretation. Cross well complex electrical data are currently being collected periodically throughout a field experiment involving the controlled release of

  16. Machine Learning in Intrusion Detection

    DTIC Science & Technology

    2005-07-01

    machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate

  17. Intrusion detection: systems and models

    NASA Technical Reports Server (NTRS)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  18. No evidence for differential dose effects of hydrocortisone on intrusive memories in female patients with complex post-traumatic stress disorder--a randomized, double-blind, placebo-controlled, crossover study.

    PubMed

    Ludäscher, Petra; Schmahl, Christian; Feldmann, Robert E; Kleindienst, Nikolaus; Schneider, Miriam; Bohus, Martin

    2015-10-01

    Post-traumatic stress disorder is characterized by intrusive traumatic memories. Presently, a controversial debate is ongoing regarding whether reduced cortisol secretion in post-traumatic stress disorder promotes an automatic retrieval of trauma-associated memories. Hence, a pharmacological elevation of cortisol was proposed to decrease post-traumatic stress disorder symptoms, particularly intrusions. The present study investigated the impact of two different doses of hydrocortisone on automatic memory retrieval using a randomized, double-blind, placebo-controlled, crossover study in 30 inpatients with post-traumatic stress disorder. All participants were female and received various psychotropic medications. They were randomly assigned to one of two groups within a crossover design: they received either 1 week placebo followed by 1 week hydrocortisone 10/d, followed by 1 week placebo, followed by hydrocortisone 30 mg/d (15 participants) or 1 week hydrocortisone 30 mg/d, followed by 1 week placebo, followed by 1 week hydrocortisone 10 mg/d, followed by 1 week placebo (15 participants). The outcome measures were the frequency and the intensity of intrusions, the overall symptomatology of post-traumatic stress disorder and the general psychopathology. We did not find any differences in the frequency and the intensity of post-traumatic stress disorder-related intrusions between the 10 mg hydrocortisone, the 30 mg hydrocortisone and the placebo condition. All effect sizes for the hydrocortisone condition vs. placebo were very small. Additionally, the overall symptomatology of post-traumatic stress disorder and the general psychopathology did not differ between the hydrocortisone therapies and placebo. Our results do not show any effect of the hydrocortisone administration on intrusions in complex post-traumatic stress disorder. © The Author(s) 2015.

  19. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT.

    PubMed

    Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime

    2017-08-26

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.

  1. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT

    PubMed Central

    Carro, Belen; Sanchez-Esguevillas, Antonio

    2017-01-01

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host’s network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery. PMID:28846608

  2. Stress reaction process-based hierarchical recognition algorithm for continuous intrusion events in optical fiber prewarning system

    NASA Astrophysics Data System (ADS)

    Qu, Hongquan; Yuan, Shijiao; Wang, Yanping; Yang, Dan

    2018-04-01

    To improve the recognition performance of optical fiber prewarning system (OFPS), this study proposed a hierarchical recognition algorithm (HRA). Compared with traditional methods, which employ only a complex algorithm that includes multiple extracted features and complex classifiers to increase the recognition rate with a considerable decrease in recognition speed, HRA takes advantage of the continuity of intrusion events, thereby creating a staged recognition flow inspired by stress reaction. HRA is expected to achieve high-level recognition accuracy with less time consumption. First, this work analyzed the continuity of intrusion events and then presented the algorithm based on the mechanism of stress reaction. Finally, it verified the time consumption through theoretical analysis and experiments, and the recognition accuracy was obtained through experiments. Experiment results show that the processing speed of HRA is 3.3 times faster than that of a traditional complicated algorithm and has a similar recognition rate of 98%. The study is of great significance to fast intrusion event recognition in OFPS.

  3. Research on artificial neural network intrusion detection photochemistry based on the improved wavelet analysis and transformation

    NASA Astrophysics Data System (ADS)

    Li, Hong; Ding, Xue

    2017-03-01

    This paper combines wavelet analysis and wavelet transform theory with artificial neural network, through the pretreatment on point feature attributes before in intrusion detection, to make them suitable for improvement of wavelet neural network. The whole intrusion classification model gets the better adaptability, self-learning ability, greatly enhances the wavelet neural network for solving the problem of field detection invasion, reduces storage space, contributes to improve the performance of the constructed neural network, and reduces the training time. Finally the results of the KDDCup99 data set simulation experiment shows that, this method reduces the complexity of constructing wavelet neural network, but also ensures the accuracy of the intrusion classification.

  4. Intrusion Detection in Database Systems

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Sohrabi, Mina; Rafsanjani, Marjan Kuchaki

    Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated.

  5. Saltwater intrusion monitoring in Florida

    USGS Publications Warehouse

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  6. Intrusion Triggering of Explosive Eruptions: Lessons Learned from EYJAFJALLAJÖKULL 2010 Eruptions and Crustal Deformation Studies

    NASA Astrophysics Data System (ADS)

    Sigmundsson, F.; Hreinsdottir, S.; Hooper, A. J.; Arnadottir, T.; Pedersen, R.; Roberts, M. J.; Oskarsson, N.; Auriac, A.; Decriem, J.; Einarsson, P.; Geirsson, H.; Hensch, M.; Ofeigsson, B. G.; Sturkell, E. C.; Sveinbjornsson, H.; Feigl, K.

    2010-12-01

    Gradual inflation of magma chambers often precedes eruptions at highly active volcanoes. During eruptions, rapid deflation occurs as magma flows out and pressure is reduced. Less is known about the deformation style at moderately active volcanoes, such as Eyjafjallajökull, Iceland, where an explosive summit eruption of trachyandesite beginning on 14 April 2010 caused exceptional disruption to air traffic. This eruption was preceded by an effusive flank eruption of olivine basalt from 20 March - 12 April 2010. Geodetic and seismic observations revealed the growth of an intrusive complex in the roots of the volcano during three months prior to eruptions. After initial horizontal growth, modelling indicates both horizontal and sub-vertical growth in three weeks prior the first eruption. The behaviour is attributed to subsurface variations in crustal stress and strength originating from complicated volcano foundations. A low-density layer may capture magma allowing pressure to build before an intrusion can ascend towards higher levels. The intrusive complex was formed by olivine basalt as erupted on the volcano flank 20 March - 12 April; the intrusive growth halted at the onset of this eruption. Deformation associated with the eruption onset was minor as the dike had reached close to the surface in the days before. Isolated eruptive vents opening on long-dormant volcanoes may represent magma leaking upwards from extensive pre-eruptive intrusions formed at depth. A deflation source activated during the summit eruption of trachyandesite is distinct from, and adjacent to, all documented sources of inflation in the volcano roots. Olivine basalt magma which recharged the volcano appears to have triggered the summit eruption, although the exact mode of triggering is uncertain. Scenarios include stress triggering or propagation of olivine basalt into more evolved magma. The trachyandesite includes crystals that can be remnants of minor recent intrusion of olivine basalt

  7. Modal Composition and Age of Intrusions in North-Central and Northeast Nevada

    USGS Publications Warehouse

    du Bray, Edward A.; Crafford, A. Elizabeth Jones

    2007-01-01

    Introduction Data presented in this report characterize igneous intrusions of north-central and northeast Nevada and were compiled as part of the Metallogeny of the Great Basin project conducted by the U.S. Geological Survey (USGS) between 2001 and 2007. The compilation pertains to the area bounded by lats 38.5 and 42 N., long 118.5 W., and the Nevada-Utah border (fig. 1). The area contains numerous large plutons and smaller stocks but also contains equally numerous smaller, shallowly emplaced intrusions, including dikes, sills, and endogenous dome complexes. Igneous intrusions (hereafter, intrusions) of multiple ages are major constituents of the geologic framework of north-central and northeast Nevada (Stewart and Carlson, 1978). Mesozoic and Cenozoic intrusions are particularly numerous and considered to be related to subduction along the west edge of the North American plate during this time. Henry and Ressel (2000) and Ressel and others (2000) have highlighted the association between magmatism and ore deposits along the Carlin trend. Similarly, Theodore (2000) has demonstrated the association between intrusions and ore deposits in the Battle Mountain area. Decades of geologic investigations in north-central and northeast Nevada (hereafter, the study area) demonstrate that most hydrothermal ore deposits are spatially, and probably temporally and genetically, associated with intrusions. Because of these associations, studies of many individual intrusions have been conducted, including those by a large number of Master's and Doctoral thesis students (particularly University of Nevada at Reno students and associated faculty), economic geologists working on behalf of exploration and mining companies, and USGS earth scientists. Although the volume of study area intrusions is large and many are associated with ore deposits, no synthesis of available data that characterize these rocks has been assembled. Compilations that have been produced for intrusions in Nevada

  8. Emplacement and magnetic fabrics of rapakivi granite intrusions within Wiborg and Åland rapakivi granite batholiths in Finland

    NASA Astrophysics Data System (ADS)

    Karell, Fredrik; Ehlers, Carl; Airo, Meri-Liisa

    2014-02-01

    Anisotropy of magnetic susceptibility (AMS) studies were carried out in two areas in Finland: the Ruotsinpyhtää intrusion within the Wiborg rapakivi granite batholith and the Saltvik intrusions within the Åland rapakivi granite batholith. The main aim of this study was to understand the emplacement history of these mid-Proterozoic rapakivi granites. Aeromagnetic images reveal structures of ca. 5-10 km intrusions that build up the large rapakivi granite batholiths of Åland and Wiborg. Magnetic susceptibility data from the database of the Geological Survey of Finland, including more than 1700 samples from the Wiborg rapakivi batholith and almost 900 samples from the Åland rapakivi batholith, were compared with measurements from the present study. The mean susceptibility is ca. 1500 μSI for the Wiborg batholith and ca. 10,000 μSI for the Åland batholith. Samples taken for this study demonstrate that the mean value for the Ruotsinpyhtää intrusion is ca. 1200 μSI and for the Saltvik intrusions ca. 24,000 μSI. Thermomagnetic measurements reveal that the magnetic susceptibility is mainly derived either from paramagnetic minerals or from magnetite. The absence of solid-state deformation features such as breccia or contact deformation indicates a cauldron-type subsidence emplacement. The AMS measurements from Ruotsinpyhtää confirm these proposals, with concentric gently dipping magnetic foliations that support a ring complex structure above a piston-type subsidence system. The Saltvik area consists of a number of smaller elliptical intrusions of different rapakivi granites forming a multiple intrusive complex. The magnetic fabric shows a general westward dipping of the pyterlite and eastward dipping of the contiguous even-grained rapakivi granite, which indicates a central inflow of magma batches towards the east and west resulting from a laccolitic emplacement of magma batches, while the main mechanism for space creation was derived from subsidence.

  9. Vapor Intrusion

    EPA Pesticide Factsheets

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  10. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    NASA Astrophysics Data System (ADS)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  11. High precision ages from the Torres del Paine Intrusion, Chile

    NASA Astrophysics Data System (ADS)

    Michel, J.; Baumgartner, L.; Cosca, M.; Ovtcharova, M.; Putlitz, B.; Schaltegger, U.

    2006-12-01

    The upper crustal bimodal Torres del Paine Intrusion, southern Chile, consists of the lower Paine-Mafic- Complex and the upper Paine-Granite. Geochronologically this bimodal complex is not well studied except for a few existing data from Halpern (1973) and Sanchez (2006). The aim of this study is to supplement the existing data and to constrain the age relations between the major magmatic pulses by applying high precision U-Pb dating on accessory zircons and 40Ar/39Ar-laser-step-heating-ages on biotites from the Torres del Paine Intrusion. The magmatic rocks from mafic complex are fine to medium-grained and vary in composition from quartz- monzonites to granodiorites and gabbros. Coarse-grained olivine gabbros have intruded these rocks in the west. The granitic body is represented by a peraluminous, biotite-orthoclase-granite and a more evolved leucocratic granite in the outer parts towards the host-rock. Field observations suggest a feeder-zone for the granite in the west and that the granite postdates the mafic complex. Two granite samples of the outermost margins in the Northeast and South were analyzed. The zircons were dated by precise isotope-dilution U-Pb techniques of chemically abraded single grains. The data are concordant within the analytical error and define weighted mean 206/238U ages of 12.59 ± 0.03 Ma and 12.58 ± 0.01 Ma for the two samples respectively. A 40Ar/39Ar-age for the second sample yield a date of 12.37 ± 0.11 Ma. Three 40Ar/39Ar -ages of biotites were obtained for rocks belonging to the mafic complex. A hbl-bio- granodiorite from the central part, approximately 150 m below the subhorizontal contact with the granite, gives an age of 12.81 ± 0.11 Ma. A hbl-bio-granodiorite and an olivine-gabbro west of the feeder-zone date at 12.42 ± 0.14 Ma and 12.49 ± 0.11 Ma, respectively. The obtained older age of 12.81 Ma for the granodiorite in the central part is consistent with structural relationships of brittle fracturing of the mafic

  12. A system for distributed intrusion detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snapp, S.R.; Brentano, J.; Dias, G.V.

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of ourmore » present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.« less

  13. Nonexplosive and explosive magma/wet-sediment interaction during emplacement of Eocene intrusions into Cretaceous to Eocene strata, Trans-Pecos igneous province, West Texas

    USGS Publications Warehouse

    Befus, K.S.; Hanson, R.E.; Miggins, D.P.; Breyer, J.A.; Busbey, A.B.

    2009-01-01

    Eocene intrusion of alkaline basaltic to trachyandesitic magmas into unlithified, Upper Cretaceous (Maastrichtian) to Eocene fluvial strata in part of the Trans-Pecos igneous province in West Texas produced an array of features recording both nonexplosive and explosive magma/wet-sediment interaction. Intrusive complexes with 40Ar/39Ar dates of ~ 47-46??Ma consist of coherent basalt, peperite, and disrupted sediment. Two of the complexes cutting Cretaceous strata contain masses of conglomerate derived from Eocene fluvial deposits that, at the onset of intrusive activity, would have been > 400-500??m above the present level of exposure. These intrusive complexes are inferred to be remnants of diatremes that fed maar volcanoes during an early stage of magmatism in this part of the Trans-Pecos province. Disrupted Cretaceous strata along diatreme margins record collapse of conduit walls during and after subsurface phreatomagmatic explosions. Eocene conglomerate slumped downward from higher levels during vent excavation. Coherent to pillowed basaltic intrusions emplaced at the close of explosive activity formed peperite within the conglomerate, within disrupted Cretaceous strata in the conduit walls, and within inferred remnants of the phreatomagmatic slurry that filled the vents during explosive volcanism. A younger series of intrusions with 40Ar/39Ar dates of ~ 42??Ma underwent nonexplosive interaction with Upper Cretaceous to Paleocene mud and sand. Dikes and sills show fluidal, billowed, quenched margins against the host strata, recording development of surface instabilities between magma and groundwater-rich sediment. Accentuation of billowed margins resulted in propagation of intrusive pillows into the adjacent sediment. More intense disruption and mingling of quenched magma with sediment locally produced fluidal and blocky peperite, but sufficient volumes of pore fluid were not heated rapidly enough to generate phreatomagmatic explosions. This work suggests that

  14. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    USGS Publications Warehouse

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  15. Water Intrusion Problems in Transit Tunnels

    DOT National Transportation Integrated Search

    1986-05-01

    This report presents the findings of five case studies in which an in-depth analysis was made of tunnel water intrusion problems in transit tunnels. Water intrusion parameters of transit systems in Atlanta, Boston, Buffalo, New York and Washington, D...

  16. multiUQ: An intrusive uncertainty quantification tool for gas-liquid multiphase flows

    NASA Astrophysics Data System (ADS)

    Turnquist, Brian; Owkes, Mark

    2017-11-01

    Uncertainty quantification (UQ) can improve our understanding of the sensitivity of gas-liquid multiphase flows to variability about inflow conditions and fluid properties, creating a valuable tool for engineers. While non-intrusive UQ methods (e.g., Monte Carlo) are simple and robust, the cost associated with these techniques can render them unrealistic. In contrast, intrusive UQ techniques modify the governing equations by replacing deterministic variables with stochastic variables, adding complexity, but making UQ cost effective. Our numerical framework, called multiUQ, introduces an intrusive UQ approach for gas-liquid flows, leveraging a polynomial chaos expansion of the stochastic variables: density, momentum, pressure, viscosity, and surface tension. The gas-liquid interface is captured using a conservative level set approach, including a modified reinitialization equation which is robust and quadrature free. A least-squares method is leveraged to compute the stochastic interface normal and curvature needed in the continuum surface force method for surface tension. The solver is tested by applying uncertainty to one or two variables and verifying results against the Monte Carlo approach. NSF Grant #1511325.

  17. Rapid laccolith intrusion driven by explosive volcanic eruption

    NASA Astrophysics Data System (ADS)

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-11-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ~0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ~20-200 m and overpressures (~1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  18. Rapid laccolith intrusion driven by explosive volcanic eruption.

    PubMed

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  19. The Torres del Paine intrusion as a model for a shallow magma chamber

    NASA Astrophysics Data System (ADS)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  20. Young women's experiences of intrusive behavior in 12 countries.

    PubMed

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  1. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  2. Intrusion-based reasoning and depression: cross-sectional and prospective relationships.

    PubMed

    Berle, David; Moulds, Michelle L

    2014-01-01

    Intrusion-based reasoning refers to the tendency to form interpretations about oneself or a situation based on the occurrence of a negative intrusive autobiographical memory. Intrusion-based reasoning characterises post-traumatic stress disorder, but has not yet been investigated in depression. We report two studies that aimed to investigate this. In Study 1 both high (n = 42) and low (n = 28) dysphoric participants demonstrated intrusion-based reasoning. High-dysphoric individuals engaged in self-referent intrusion-based reasoning to a greater extent than did low-dysphoric participants. In Study 2 there were no significant differences in intrusion-based reasoning between currently depressed (n = 27) and non-depressed (n = 51) participants, and intrusion-based reasoning did not predict depressive symptoms at 6-month follow-up. Interestingly, previously (n = 26) but not currently (n = 27) depressed participants engaged in intrusion-based reasoning to a greater extent than never-depressed participants (n = 25), indicating the possibility that intrusion-based reasoning may serve as a "scar" from previous episodes. The implications of these findings are discussed.

  3. An automatically tuning intrusion detection system.

    PubMed

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  4. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  5. Rapid laccolith intrusion driven by explosive volcanic eruption

    PubMed Central

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-01-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ∼20–200 m and overpressures (∼1–10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards. PMID:27876800

  6. Petrology, composition, and age of intrusive rocks associated with the Quartz Hill molybdenite deposit, southeastern Alaska.

    USGS Publications Warehouse

    Hudson, T.; Smith, James G.; Elliott, R.L.

    1979-01-01

    A large porphyry molybdenum deposit (Quartz Hill deposit) was recently discovered in the heart of the Coast Range batholithic complex about 70 km E of Ketchikan, SE Alaska. Intrusive rocks associated with the mineral deposit form two composite epizonal to hypabyssal stocks and many dikes in country rocks. All observed metallization and alteration is within the Quartz Hill stock. Molybdenite forms fracture coatings and occurs in veins with quartz. Alteration is widespread and includes development of secondary quartz, pyrite, K-feldspar, biotite, white mica, chlorite, and zeolite. Field relations indicate that the stocks were emplaced after regional uplift and erosion of the Coast Range batholithic complex, and K-Ar data show that intrusion and alteration took place in late Oligocene time, about 27 to 30 Ma ago. Data from the Ketchikan quadrangle indicate that porphyry molybdenum metallization in the Coast Range batholithic complex is associated with regionally extensive but spotty, middle Tertiary or younger, felsic magmatism. -from Authors

  7. Vapor Intrusion Characterization Report (Revision 1.0)

    EPA Pesticide Factsheets

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  8. Intrusive Memories of Distressing Information: An fMRI Study

    PubMed Central

    Battaglini, Eva; Liddell, Belinda; Das, Pritha; Malhi, Gin; Felmingham, Kim

    2016-01-01

    Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI) to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42) viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13) demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13). Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC) and dorsolateral prefrontal cortex (dlPFC), inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories. PMID:27685784

  9. Zircon U-Pb ages and Hf isotopes for the Diablillos Intrusive Complex, Southern Puna, Argentina: Crustal evolution of the Lower Paleozoic Orogen, Southwestern Gondwana margin

    NASA Astrophysics Data System (ADS)

    Ortiz, Agustín; Hauser, Natalia; Becchio, Raúl; Suzaño, Néstor; Nieves, Alexis; Sola, Alfonso; Pimentel, Marcio; Reimold, Wolf

    2017-12-01

    The evolution of the rocks of the Lower Paleozoic Orogen in Puna, at the Southwestern Gondwana margin, has been widely debated. In particular, the scarce amount of geological and geochemical data available for the Diablillos Intrusive Complex, Eastern Magmatic Belt, Southern Puna, require a further study for new evidence towards the understanding of sources, magmatic processes and emplacement of magmas, in order to better comprehend the crustal evolution in this setting. We present new combined U-Pb and Hf isotope analyses on zircon by LA-MC-ICP-MS from monzogranite, granodiorite and diorite rocks of the Diablillos Intrusive Complex. We obtained 206Pb/238U concordant weighted average ages of 517 ± 3 Ma and 515 ± 6 Ma for the monzogranite and diorite, respectively, and a concordant age of 521 ± 4 Ma for the granodiorite. These ages permit to constrain the climax of magmatic activity in the Diablillos Complex around ∼515-520 Ma, while the emplacement of the complex took place between ∼540 Ma and 490 Ma (representing a ca. 50 Ma magmatic event). Major and trace element data, initial 87Sr/86Sr values varying from 0.70446 to 0.71278, positive and negative ɛNd(t) values between +2.5 and -4, as well as ɛHf(t) for zircon data between + 3 and -3 indicate that the analyzed samples represent contaminated magmas. The ɛHf(t) and the ɛNd(t) values for this complex specify that these rocks are derived from interaction of a dominant Mesoproterozoic crystalline and/or a metasedimentary source and juvenile mantle-derived magmas, with a TDM model age range of ∼1.2-1.5 Ga, with later reworking during lower Paleozoic times. The combined data obtained in this contribution together with previous data, allow us to suggest that the formation of the Eastern Magmatic Belt of the Puna was part of a long-lived magmatic event during Early Paleozoic times. Whereby the granitoids of the Eastern Magmatic Belt formed through intra-crustal recycling at an active continental margin, with

  10. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex.

    PubMed

    McHugh, Thomas; Beckley, Lila; Sullivan, Terry; Lutes, Chris; Truesdale, Robert; Uppencamp, Rob; Cosky, Brian; Zimmerman, John; Schumacher, Brian

    2017-11-15

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampled during most vapor intrusion investigations. We have used a tracer study and VOC concentration measurements to evaluate the role of the combined sanitary/storm sewer line in VOC transport at the USEPA vapor intrusion research duplex in Indianapolis, Indiana. The results from the tracer study demonstrated gas migration from the sewer main line into the duplex. The migration pathway appears to be complex and may include leakage from the sewer lateral at a location below the building foundation. Vapor samples collected from the sewer line demonstrated the presence of tetrachloroethene (PCE) and chloroform in the sewer main in front of the duplex and at multiple sample locations within the sewer line upstream of the duplex. These test results combined with results from the prior multi-year study of the duplex indicate that the sewer line plays an important role in transport of VOCs from the subsurface source to the immediate vicinity of the duplex building envelope. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    DOE PAGES

    McHugh, Thomas; Beckley, Lila; Sullivan, Terry; ...

    2017-04-26

    We report the role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampled during most vapor intrusion investigations. We have used a tracer study and VOC concentration measurements to evaluate the role of the combined sanitary/storm sewer line in VOC transport at the USEPA vapor intrusion research duplex in Indianapolis, Indiana. The results from the tracer study demonstrated gas migration from the sewer main line into themore » duplex. The migration pathway appears to be complex and may include leakage from the sewer lateral at a location below the building foundation. Vapor samples collected from the sewer line demonstrated the presence of tetrachloroethene (PCE) and chloroform in the sewer main in front of the duplex and at multiple sample locations within the sewer line upstream of the duplex. Finally, these test results combined with results from the prior multi-year study of the duplex indicate that the sewer line plays an important role in transport of VOCs from the subsurface source to the immediate vicinity of the duplex building envelope.« less

  12. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McHugh, Thomas; Beckley, Lila; Sullivan, Terry

    We report the role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampled during most vapor intrusion investigations. We have used a tracer study and VOC concentration measurements to evaluate the role of the combined sanitary/storm sewer line in VOC transport at the USEPA vapor intrusion research duplex in Indianapolis, Indiana. The results from the tracer study demonstrated gas migration from the sewer main line into themore » duplex. The migration pathway appears to be complex and may include leakage from the sewer lateral at a location below the building foundation. Vapor samples collected from the sewer line demonstrated the presence of tetrachloroethene (PCE) and chloroform in the sewer main in front of the duplex and at multiple sample locations within the sewer line upstream of the duplex. Finally, these test results combined with results from the prior multi-year study of the duplex indicate that the sewer line plays an important role in transport of VOCs from the subsurface source to the immediate vicinity of the duplex building envelope.« less

  13. Assessment of Mitigation Systems on Vapor Intrusion ...

    EPA Pesticide Factsheets

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor environments are often negatively pressurized with respect to outdoor air and soil gas (for example, from exhaust fans or the stack effect), and this pressure difference allows soil gas containing subsurface vapors to flow into indoor air through advection. In addition, concentration differentials cause VOCs and radon to migrate from areas of higher to lower concentrations through diffusion, which is another cause of vapor intrusion. Current practice for evaluating the vapor intrusion pathway involves a multiple line of evidence approach based on direct measurements in groundwater, external soil gas, subslab soil gas, and/or indoor air. No single line of evidence is considered definitive, and direct measurements of vapor intrusion can be costly, especially where significant spatial and temporal variability require repeated measurements at multiple locations to accurately assess the chronic risks of long-term exposure to volatile organic compounds (VOCs) like chloroform, perchloroethylene (PCE), and trichloroethylene (TCE).

  14. Risk-Based Evaluation of Total Petroleum Hydrocarbons in Vapor Intrusion Studies

    PubMed Central

    Brewer, Roger; Nagashima, Josh; Kelley, Michael; Heskett, Marvin; Rigby, Mark

    2013-01-01

    This paper presents a quantitative method for the risk-based evaluation of Total Petroleum Hydrocarbons (TPH) in vapor intrusion investigations. Vapors from petroleum fuels are characterized by a complex mixture of aliphatic and, to a lesser extent, aromatic compounds. These compounds can be measured and described in terms of TPH carbon ranges. Toxicity factors published by USEPA and other parties allow development of risk-based, air and soil vapor screening levels for each carbon range in the same manner as done for individual compounds such as benzene. The relative, carbon range makeup of petroleum vapors can be used to develop weighted, site-specific or generic screening levels for TPH. At some critical ratio of TPH to a targeted, individual compound, the overwhelming proportion of TPH will drive vapor intrusion risk over the individual compound. This is particularly true for vapors associated with diesel and other middle distillate fuels, but can also be the case for low-benzene gasolines or even for high-benzene gasolines if an adequately conservative, target risk is not applied to individually targeted chemicals. This necessitates a re-evaluation of the reliance on benzene and other individual compounds as a stand-alone tool to evaluate vapor intrusion risk associated with petroleum. PMID:23765191

  15. Magmatic intrusions in the lunar crust

    NASA Astrophysics Data System (ADS)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  16. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    PubMed Central

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression. PMID:27069381

  17. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    PubMed

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  18. Meso to Neoproterozoic layered mafic-ultramafic rocks from the Virorco back-arc intrusion, Argentina

    NASA Astrophysics Data System (ADS)

    Ferracutti, Gabriela; Bjerg, Ernesto; Hauzenberger, Christoph; Mogessie, Aberra; Cacace, Francisco; Asiain, Lucía

    2017-11-01

    The Virorco layered mafic-ultramafic intrusion is part of a belt that extends over 100 km from NE to SW in the Eastern Sierras Pampeanas of San Luis, Argentina. The rocks of this belt carry a Fe-Cu-Ni sulphide mineralization in veins and as disseminated and massive ore. Platinum group minerals are associated with the sulphides. The Virorco intrusion exhibits modal, textural and cryptic layering. New results allow the characterization of six layered units (Modal Layered Unit, Pyroxenitic Macro-Layered Unit, Gabbroic Unit, Banded Unit, Hornblende Norite Unit and Gabbronorite Unit) present in three sectors of the intrusion (Eastern, Central and Western). The units from the Western Sector (Banded Unit, Hornblende Norite Unit and Gabbronorite Unit) and the Modal Layered Unit from the Eastern Sector belong to the Marginal Border Series of the intrusion. Meanwhile, the Central sector units (Pyroxenitic Macro-Layered Unit and Gabbroic Unit) are from the Layered Series. The presence of crescumulate texture (Modal Layered Unit) and colloform banding (Banded Unit) are evidences of "in situ" crystallization due to supercooling of a MgO-rich hydrated mafic magma, where cooling proceeded from the walls towards the interior of the magma chamber. In previous studies the mafic-ultramafic rocks have been considered to be Cambrian to Ordovician. Here we present a Sm-Nd whole rock isochron which shows that the formation age of these intrusions is 1002 ± 150 Ma and that the protolith age of the Pringles Metamorphic Complex metasedimentary rocks is 1289 ± 97 Ma. Our study also indicates that the San Luis mafic-ultramafic layered intrusives most probably formed in a back-arc tectonic setting, from an enriched sub-continental mantle, influenced by a subducting slab and/or crust injection into the Pampia Terrane prior to its collision with the Rio de la Plata Craton.

  19. Forced folding and complex overburden deformation associated with magmatic intrusion in the Vøring Basin, offshore Norway

    NASA Astrophysics Data System (ADS)

    Omosanya, Kamaldeen Olakunle; Johansen, Ståle E.; Eruteya, Ovie Emmanuel; Waldmann, Nicolas

    2017-06-01

    In this study, three-dimensional seismic reflection and borehole data from the Vøring Basin, offshore Norway have been used to characterize a supra-sill related forced fold to understand its evolution and relevance in the context of regional tectonics. Magmatic sills were recognised to be positive high-amplitude anomalies with similar polarity to the seabed reflection. The seismic dataset reveals two groups of sills in the study area comprising interconnected sills beneath the regional forced fold, and those intruded into the overburden. Magmatic sills forming the interconnected sill complex are emplaced at a depth of about 5.5 s TWTT below the modern seafloor. Aspect ratio (length/width), A for the sills ranges from 1.63-6.90. The regional forced fold is interpreted based on its bathymetric and seismic-stratigraphic expression on horizon H7, which is part of the Palaeocene to Eocene Tang Formation. Amplitude of the accommodation fold is about 780 km2. Hydrothermal vent complexes and fluid-flow conduits in the study area develop above the sill edges and on the flanks of the interconnected sill complex extending from the lower part of the Tang Formation to the uppermost section of the Brygge Formation evidencing vertically focussed fluid flow in the study area. The overlying overburden is in turn deformed and structurally compartmentalized through forced folding and Late Cenozoic tectonics. We demonstrate that accommodation folding is formed in response to the emplacement of several interconnected sills during the opening of the Norwegian-Greenland Seas. Sill emplacement in the study area causes uplift of the Cretaceous to Palaeocene depocentre prior to further restructuration during Cenozoic tectonic inversion. Magmatic intrusions documented in this study have wider implications for understanding supra-sill deformations along volcanic margins with well-developed emplaced sills at depth and likewise hydrocarbon prospectivity in the study area.

  20. SAMPLING-BASED APPROACH TO INVESTIGATING VAPOR INTRUSION

    EPA Science Inventory

    Vapor intrusion is defined as the migration of volatile organic compounds (VOCs) into occupied buildings from contaminated soil or ground water. EPA recently developed guidance to facilitate assessment of vapor intrusion at sites regulated by RCRA and CERCLA. The EPA guidance e...

  1. Evidential reasoning research on intrusion detection

    NASA Astrophysics Data System (ADS)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  2. Saltwater intrusion in coastal regions of North America

    USGS Publications Warehouse

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  3. Postemplacement dynamics of basaltic intrusions in the continental crust

    NASA Astrophysics Data System (ADS)

    Roman, A.; Jaupart, C.

    2017-02-01

    Laboratory experiments document the postemplacement behavior of mafic intrusions that spread at a density interface and founder as they become denser than their surroundings due to cooling and crystallization. All else being equal, the larger the intrusion volume, the farther the intrusion can spread and the smaller its aspect ratio is. The final aspect ratio is a function of a single dimensionless number analogous to the Rayleigh number of thermal convection. Once it is denser than its surroundings, the intrusion becomes unstable and may founder in two different regimes. At aspect ratios larger than about 0.4, the "teardrop" regime is such that the intrusion thickens in a central region, developing the shapes of a funnel and a pendant drop. At lower aspect ratios, another regime is observed, with thickening of the intrusion at the leading edge and thinning in a central region. The thick outer ring in turn becomes unstable into a set of teardrops and leads to an irregular horizontal outline. In one variant called the "jellyfish" regime, the thin central region develops a number of downwellings and upwellings in a Rayleigh-Taylor-like pattern. These instabilities may get arrested due to cooling as the intrusion and encasing rocks become too strong to deform. One would then be left with a funnel-shaped residual body or a wide irregular one with thick peripheral lobes and a thinner central region. These different patterns can be recognized in upper crustal mafic intrusions.

  4. Igneous layering in the peralkaline intrusions ,Kola Peninsula :leading role of gravitational differentiation

    NASA Astrophysics Data System (ADS)

    Kogarko, L. N..

    2012-04-01

    In the center of Kola Peninsula there are two large layered intrusions of agpaitic nepheline syenites - Khibina and Lovozero. . The Khibina alkaline massif (Kola Peninsula,Russia) hosts the world's largest and economically most important apatite deposit. The Khibina massif is a complex multiphase body built up from a number of ring-like and conical intrusions. The apatite bearing intrusion is ring-like and is represented by a layered body of ijolitic composition with a thickness of about 1 - 2 km. The upper zone is represented by different types of apatite ores. These rocks consist of 60-90% euhedral very small (tenths of mm)apatite crystals. The lower zone has mostly ijolitic composition. The lower zone grades into underlying massive urtite consisting of 75-90% large (several mm) euhedral nepheline. Our experimental studies of systems with apatite demonstrated the near-eutectic nature of the apatite-bearing intrusion, resulting in practically simultaneous crystallization of nepheline, apatite and pyroxene. The mathematical model of the formation of the layered apatite-bearing intrusion based on the processes of sedimentation under the conditions of steady state convection taking account of crystal sizes is proposed. Under the conditions of steady-state convection large crystals of nepheline continuously had been settling forming massive underlying urtite whereas smaller crystals of pyroxenes, nepheline and apatite had been stirred in the convecting melt. During the cooling the intensity of convection decreased causing a settling of smaller crystals of nepheline and pyroxene and later very small crystalls of apatite in the upper part of alkaline magma chamber. The Lovozero massif, the largest of the Globe layered peralkaline intrusion, comprises super-large rare-metal (Nb, Ta, REE) deposit. The main ore mineral is loparite (Na, Ce, Ca)2 (Ti, Nb)2O6 which was mined during many years. The composition of cumulus loparite changed systematically upward through the

  5. Magmatic ore deposits in layered intrusions - Descriptive model for reef-type PGE and contact-type Cu-Ni-PGE deposits

    USGS Publications Warehouse

    Zientek, Michael L.

    2012-01-01

    of meters thick. The modes and textures of the igneous rocks hosting the mineralization vary irregularly on the scale of centimeters to meters; autoliths and xenoliths are common. Mineralization occurs in the igneous intrusion and in the surrounding country rocks. Mineralization can be preferentially localized along contact with country rocks that are enriched in sulfur-, iron-, or CO2-bearing lithologies. Reef-type and contact-type deposits, in particular those in the Bushveld Complex, South Africa, are the world's primary source of platinum and rhodium (tables 2 and 3; fig. 2). Reef-type PGE deposits are mined only in the Bushveld Complex (Merensky Reef and UG2), the Stillwater Complex (J-M Reef), and the Great Dyke (Main Sulphide Layer). PGE-enriched contact-type deposits are only mined in the Bushveld Complex. The other deposits in tables 2 and 3 are undeveloped; some are still under exploration.

  6. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  7. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  8. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  9. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  10. Vapour Intrusion into Buildings - A Literature Review

    EPA Science Inventory

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  11. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients.

    PubMed

    Bapat, Usha; Kedlya, Prashanth G

    2012-09-01

    To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD) patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients' above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life. Elderly, educated

  12. A New Intrusion Detection Method Based on Antibody Concentration

    NASA Astrophysics Data System (ADS)

    Zeng, Jie; Li, Tao; Li, Guiyang; Li, Haibo

    Antibody is one kind of protein that fights against the harmful antigen in human immune system. In modern medical examination, the health status of a human body can be diagnosed by detecting the intrusion intensity of a specific antigen and the concentration indicator of corresponding antibody from human body’s serum. In this paper, inspired by the principle of antigen-antibody reactions, we present a New Intrusion Detection Method Based on Antibody Concentration (NIDMBAC) to reduce false alarm rate without affecting detection rate. In our proposed method, the basic definitions of self, nonself, antigen and detector in the intrusion detection domain are given. Then, according to the antigen intrusion intensity, the change of antibody number is recorded from the process of clone proliferation for detectors based on the antigen classified recognition. Finally, building upon the above works, a probabilistic calculation method for the intrusion alarm production, which is based on the correlation between the antigen intrusion intensity and the antibody concen-tration, is proposed. Our theoretical analysis and experimental results show that our proposed method has a better performance than traditional methods.

  13. A Survey on Anomaly Based Host Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  14. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.

  15. A new intrusion prevention model using planning knowledge graph

    NASA Astrophysics Data System (ADS)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  16. Vapor Intrusion Assessment and Mitigation 2012

    DTIC Science & Technology

    2012-03-26

    1 Geosyntec 0 consultants Vapor Intrusion Assessment and Mitigation 2012 Robert Ettinger, M.S., P.E., Todd McAiary, M.Sc., P.Eng., P.G...REPORT DATE 26 MAR 2012 2. REPORT TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE Vapor Intrusion Assessment and...Updates • Typical Assessment Approaches and Common Challenges • Methods to Distinguish Background Sources (McHugh) • Significance • Compound

  17. Noble gas systematics of the Skaergaard intrusion

    NASA Astrophysics Data System (ADS)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Ra<1) along the margin of the intrusion indicates that noble gases from the Archean host-rock were incorporated into the cooling magma chamber, probably via magmatic assimilation. Noble gases in olivines from the upper portions of the intrusion have atmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  18. Baddeleyite in PGE paleoproterozoic layered intrusions on Fennoscandian Shield (Arctic region): significance for timing, duration and continental reconstraction

    NASA Astrophysics Data System (ADS)

    Bayanova, Tamara; Korchagin, Aleksey; Chachshin, Viktor; Nerovich, Ludmila; Drogobuzhskaya, Svetlana

    2017-04-01

    Baddeleyite was firstly found and U-Pb dating in PGE layered intrusions of the Fennoscandian Shield in the rock-forming orthopyroxene (Lukkulaisvaara intrusion in Karelia region) and in magmatic zircon from gabbronorite Mt. Generalskaya (Kola region). Real crystals of baddeleyite were separated and U-Pb measured from Fedorovo-Pansky complex in gabbronorites lower part of the Pt-Pd reef intrusion (as first phase 2.50 Ga) and in upper part of Pt-Pd reef in anorthosites (second phase -2.45 Ga) and reflect time interval about 50 Ma of magmatic complex activity. In basite dykes from Cr-Ti-V Imandra lopolith baddeleyite were dating by U-Pb with 2.40 Ga. Therefore total duration time of Kola LIP and magmatic origin of the multimetal deposits are estimated as 100 Ma [1]. New additional isotope Nd-Sr-He data for the WR of the layered PGE intrusions in the Kola-Karelia-Finland big belt more than 500 km reflect EM-1 mantle reservoir. New REE (ELAN- 9000) distributions in the WR and dykes complexes of the Fedorovo-Pansky and Monshegorck Cu-Ni and PGE ore deposits gave OIB, N-MORB and E-MORB primary plume mantle source due to Re-Os data [2]. LA-ICP-MS data of REE investigations in baddeleyite crystals from Monchegorsk ore region yielded 1000 C forming of the grains and high U-Pb closure temperatures compared with zircon. Baddeleyite also primary magmatic minerals in the layered PGE intrusions and dykes complexes from Fennoscandian Shield and U-Pb precise data using artificial 205 Pb spike of the crystals together with time data for different continents gave new important information concerning break up and super continental reconstruction of geological history in paleoproterozoic time [3]. Acknowledgements: Many thanks to G.Wasserburg for 205 Pb artificial spike, J. Ludden, F. Corfu, V. Todt and U. Poller for assistance in the establishing of the U-Pb for single zircon and baddeleyite. All studies are supported by RFBR 16-05-00305. All investigations are devoted to memory of

  19. Intrusive Memories in Perpetrators of Violent Crime: Emotions and Cognitions

    ERIC Educational Resources Information Center

    Evans, Ceri; Ehlers, Anke; Mezey, Gillian; Clark, David M.

    2007-01-01

    The authors investigated factors that may determine whether perpetrators of violent crime develop intrusive memories of their offense. Of 105 young offenders who were convicted of killing or seriously harming others, 46% reported distressing intrusive memories, and 6% had posttraumatic stress disorder. Intrusions were associated with lower…

  20. Seismic signature of active intrusions in mountain chains.

    PubMed

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  1. Seismic signature of active intrusions in mountain chains

    PubMed Central

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains. PMID:29326978

  2. Wind-forced salt intrusion into a tributary estuary

    NASA Astrophysics Data System (ADS)

    Sanford, Lawrence P.; Boicourt, William C.

    1990-08-01

    Moored measurements and hydrographic surveys were carried out during the summers of 1986 and 1987 to examine interaction between the mainstem of the Chesapeake Bay and the Choptank River, an eastern shore tributary estuary. The data show that an important mode of interaction is through wind-forced intrusion of saline, hypoxic water from below the pycnocline of the Bay into the lower river. Intrusions are driven by lateral tilting of the pycnocline in the Bay, when high salinity water is upwelled on the eastern side of the Bay in response to a southward pulse of wind stress. The resulting internal surges propagate up the relict Choptank entrance channel at a speed of about 20 cm/s and spill onto the broad sill inside the mouth of the river. Intrusion-favorable pycnocline tilts in the Bay do not always result in lower layer intrusion into the Choptank, but may be blocked or choked in the entrance channel on occasion. The data suggest that wind-forced intrusion of salt leads to increased gravitational circulation in the Choptank during the summer months, providing a mechanism through which high frequency energy may be directly translated into lower frequency motion.

  3. Heart rate, startle response, and intrusive trauma memories

    PubMed Central

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  4. Intrusion errors in visuospatial working memory performance.

    PubMed

    Cornoldi, Cesare; Mammarella, Nicola

    2006-02-01

    This study tested the hypothesis that failure in active visuospatial working memory tasks involves a difficulty in avoiding intrusions due to information that is already activated. Two experiments are described, in which participants were required to process several series of locations on a 4 x 4 matrix and then to produce only the final location of each series. Results revealed a higher number of errors due to already activated locations (intrusions) compared with errors due to new locations (inventions). Moreover, when participants were required to pay extra attention to some irrelevant (non-final) locations by tapping on the table, intrusion errors increased. Results are discussed in terms of current models of working memory functioning.

  5. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    DTIC Science & Technology

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  6. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    PubMed

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  7. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.

    2013-11-14

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  8. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    PubMed

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Petrography and trace element signatures in silicates and Fe-Ti-oxides from the Lanjiahuoshan deposit, Panzhihua layered intrusion, Southwest China

    NASA Astrophysics Data System (ADS)

    Gao, Wenyuan; Ciobanu, Cristiana L.; Cook, Nigel J.; Huang, Fei; Meng, Lin; Gao, Shang

    2017-12-01

    Permian mafic-ultramafic layered intrusions in the central part of the Emeishan Large Igneous Province (ELIP), Southwestern China, host Fe-Ti-V-oxide ores that have features which distinguish them from other large layered intrusion-hosted deposits. The origin of these ores is highly debated. Careful petrographic examination, whole rock analysis, electron probe microanalysis, and measurement and mapping of trace element concentrations by laser ablation inductively coupled plasma mass spectrometry in all major and minor minerals (clinopyroxene, plagioclase, olivine, amphibole, titanomagnetite, ilmenite, pleonaste and pyrrhotite) has been undertaken on samples from the Lanjiahuoshan deposit, representing the Middle, Lower and Marginal Zone of the Panzhihua intrusion. Features are documented that impact on interpretation of intrusion petrology and with implications for genesis of the Fe-Ti-V-oxide ores. Firstly, there is evidence, as symplectites between clinopyroxene and plagioclase, for introduction of complex secondary melts. Secondly, reaction between a late hydrothermal fluid and clinopyroxene is recognized, which has led to formation of hydrated minerals (pargasite, phlogopite), as well as a potassium metasomatic event, postdating intrusion solidification, which led to formation of K-feldspar. Lastly, partitioning of trace elements between titanomagnetite and silicates needs to consider scavenging of metals by ilmenite (Mn, Sc, Zr, Nb, Sn, Hf and Ta) and sulfides, as well as the marked partitioning of Co, Ni, Zn, Ga, As and Sb into spinels exsolved from titanomagnetite. The role of these less abundant phases may have been understated in previous studies, highlighting the importance of petrographic examination of complex silicate-oxide-sulfide assemblages, as well as the need for a holistic approach to trace element analysis, acknowledging all minerals within the assemblage.

  10. Hydrogeologic conditions and saline-water intrusion, Cape Coral, Florida, 1978-81

    USGS Publications Warehouse

    Fitzpatrick, D.J.

    1986-01-01

    The upper limestone unit of the intermediate aquifer system, locally called the upper Hawthorn aquifer, is the principal source of freshwater for Cape Coral, Florida. The aquifer has been contaminated with saline water by downward intrusion from the surficial aquifer system and by upward intrusion from the Floridan aquifer system. Much of the intrusion has occurred through open wellbores where steel casings are short or where casings have collapsed because of corrosion. Saline-water contamination of the upper limestone unit due to downward intrusion from the surficial aquifer is most severe in the southern and eastern parts of Cape Coral; contamination due to upward intrusion has occurred in many areas throughout Cape Coral. Intrusion is amplified in areas of heavy water withdrawals and large water-level declines. (USGS)

  11. Stuck in the spin cycle: Avoidance and intrusions following breast cancer diagnosis.

    PubMed

    Bauer, Margaret R; Wiley, Joshua F; Weihs, Karen L; Stanton, Annette L

    2017-09-01

    Theories and research regarding cognitive and emotional processing during the experience of profound stressors suggest that the presence of intrusive thoughts and feelings predicts greater use of avoidance and that the use of avoidance paradoxically predicts more intrusions. However, empirical investigations of their purported bidirectional relationship are limited. This study presents a longitudinal investigation of the reciprocal relationship between intrusions and avoidance coping over a 6-month period in the year following breast cancer diagnosis. Breast cancer patients (N = 460) completed measures of cancer-related intrusions and avoidance at study entry, 3 months, and 6 months later (i.e., an average of 2, 5, and 8 months after diagnosis, respectively). Cross-lagged panel analyses revealed that intrusive thoughts, feelings, and images at study entry predicted greater avoidance 3 months later, and avoidance coping at study entry predicted intrusions 3 months later, controlling for the stability of intrusions and avoidance as well as time since diagnosis. Findings were not statistically significant for avoidance predicting intrusions, or vice versa, between the 3-month and the 6-month assessment period, during which they declined. These findings provide empirical support for the theoretical contention that avoidance and intrusive thoughts and emotions reciprocally influence one another following stressful events. Additionally, in the months shortly after breast cancer diagnosis, intrusions and avoidance are positively related. However, the relationships attenuate over time, which could indicate resolved cognitive and emotional processing of the cancer experience. Statement of contribution What is already known on this subject? Following stressful life events, individuals often experience intrusive thoughts and feelings related to the event and they report avoidance of such reminders. Many studies demonstrate that greater intrusions predict more

  12. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  13. Opportunities and Barriers to Address Seawater Intrusion Along California's Coast

    NASA Astrophysics Data System (ADS)

    Langridge, R.

    2016-12-01

    In many California coastal areas reliant on groundwater seawater intrusion is a serious problem. This presentation will discuss how particular groundwater management institutions in the state are addressing seawater intrusion issues, how stakeholders are participating in this process, and how scientific information can contribute to policies that support reducing or halting ongoing intrusion. In 2014, the California Legislature passed the Sustainable Groundwater Management Act (SGMA). The Act established requirements for 127 high and medium priority groundwater basins to form groundwater sustainability agencies (GSAs) and develop plans to sustainably manage their basin. Sustainable is defined in SGMA as avoiding specific unacceptable impacts, including significant and unreasonable seawater intrusion. Special Act Districts, created by an act of the legislature, have the option to be the sole GSA in their service area, and they can provide a window into current and potentially future strategies to address seawater intrusion. Additionally, adjudicated basins are often considered one of the best approaches to achieve efficient groundwater management, and these basins are exempt from SGMA and managed pursuant to a court judgment. The strategies utilized to manage seawater intrusion by three special act districts and five adjudicated basins will be discussed. These basins cover significant areas of central and southern California and all have experienced seawater intrusion. Our research team just completed reports for the State Water Resources Control Board on all the adjudicated and special act districts in the state, and this presentation will draw on our findings to better understand the barriers and opportunities to alleviate seawater intrusion and the information required to develop solutions.

  14. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    NASA Astrophysics Data System (ADS)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  15. How significant is the slope of the sea-side boundary for modelling seawater intrusion in coastal aquifers?

    NASA Astrophysics Data System (ADS)

    Walther, Marc; Graf, Thomas; Kolditz, Olaf; Liedl, Rudolf; Post, Vincent

    2017-08-01

    Application of numerical models is a common method to assess groundwater resources. The versatility of these models allows consideration of different levels of complexity, but the accuracy of the outcomes hinges upon a proper description of the system behaviour. In seawater intrusion assessment, the implementation of the sea-side boundary condition is of particular importance. We evaluate the influence of the slope of the sea-side boundary on the simulation results of seawater intrusion in a freshwater aquifer by employing a series of slope variations together with a sensitivity analysis by varying additional sensitive parameters (freshwater inflow and longitudinal and transverse dispersivities). Model results reveal a multi-dimensional dependence of the investigated variables with an increasing relevance of the sea-side boundary slope for seawater intrusion (decrease of up to 32%), submarine groundwater discharge zone (reduction of up to 55%), and turnover times (increase of up to 730%) with increasing freshwater inflow or dispersivity values.

  16. Body, mother, mind: anorexia, femininity and the intrusive object.

    PubMed

    Lawrence, Marilyn

    2002-08-01

    This paper takes as its starting point the preponderance of female to male patients who suffer from anorexia. The author suggests that there may be something specific about certain experiences of femaleness which predispose towards anxieties of intrusion. Two contemporary theories of the aetiology of anorexia are outlined. Both of these suggest that the problem has its origins in intrusion or invasion of different sorts. The author suggests that many women who suffer from anorexia have an intrusive object instated in their minds, which may not necessarily be the result of actual intrusions in external reality. In the final part of the paper, the author examines the intrusiveness of anorexic patients in the transference and suggests that such patients very often harbour profound phantasies of intruding between the parents, with a wish to regain their special place with mother, untroubled by the presence of father. It is further suggested that the psychopathology underlying certain cases of anorexia leads to a failure in symbolisation. This failure in turn complicates the clinical picture, making such patients particularly difficult to think with about their difficulties.

  17. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  18. The architecture of a network level intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.; Maccabe, A.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  19. Impact of exogenous cortisol on the formation of intrusive memories in healthy women.

    PubMed

    Rombold, Felicitas; Wingenfeld, Katja; Renneberg, Babette; Schwarzkopf, Friederike; Hellmann-Regen, Julian; Otte, Christian; Roepke, Stefan

    2016-12-01

    Stress hormones such as cortisol are involved in modulating emotional memory. However, little is known about the influence of cortisol on the formation of intrusive memories after a traumatic event. The aim of this study was to examine whether cortisol levels during encoding and consolidation of an intrusion-inducing trauma film paradigm would influence subsequent intrusion formation. In an experimental, double-blind, placebo-controlled study a trauma film paradigm was used to induce intrusions in 60 healthy women. Participants received a single dose of either 20 mg hydrocortisone or placebo before watching a trauma film. Salivary cortisol and alpha-amylase as well as blood pressure were measured during the experiment. The consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions resulting from the trauma film were assessed throughout the following seven days. Hydrocortisone administration before the trauma film resulted in increased salivary cortisol levels but did not affect the consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions throughout the following week. These results indicate that pharmacologically increased cortisol levels during an experimental trauma film paradigm do not influence consecutive intrusive memories. Current data do not support a prominent role of exogenous cortisol on intrusive memories, at least in healthy young women after a relatively mild trauma equivalent. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Three Hawaiian calderas: An origin through loading by shallow intrusions?

    NASA Astrophysics Data System (ADS)

    Walker, George P. L.

    1988-12-01

    The calderas of Kilauea and Mauna Loa are highly dynamic structures, and in the <200-year historic period have varied in volume by a factor of 2, and gained or lost 1 km3 per century. The deeply eroded caldera of the extinct Koolau Volcano in Oahu is wider than active Hawaiian calderas, and its lavas have a strong centripetal dip and funnel structure not evident at Kilauea or Mauna Loa. The differences can be attributed to the different erosion depths, and the time integrated subsidence profile of Kilauea is also a stepped funnel (having its apex at Halemaumau). Koolau caldera is the focus of an extraordinarily intense dike complex, and an intriguing feature is the great diminution in dike concentration into the caldera. It is thought that dike injection in any part of the complex generally continued until it reached 50% to 65%. In outer parts of the caldera, the complex was maintained at or rebuilt to this value despite subsidence. In the center of the caldera (where the positive Bouguer anomaly is centered), subsidence evidently greatly outpaced the capacity of dike injections to rebuild the complex. Assuming the same dike injection rate as Kilauea and Mauna Loa yields a volumetric subsidence rate in Koolau caldera exceeding 1 km3 per century. Hawaiian calderas are much more dynamic than calderas of silicic volcanoes, shaped by frequent small events instead of a few great ones. The temporal and volumetric correspondence of historical subsidence events with eruptions is poor, and this and the high subsidence rates argue for a caldera-forming mechanism that consumes the subsided rocks. It is suggested that subsidence is caused by the great localized excess load of intrusive rocks, carrying the center of the volcano into the thermally weakened lithosphere above the Hawaiian hot spot. It is envisaged that under steady state conditions the magma chamber rises, as the injection of intrusions causes the level of neutral buoyancy (at which the chamber is located) to

  1. Toddler Inhibited Temperament, Maternal Cortisol Reactivity and Embarrassment, and Intrusive Parenting

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2013-01-01

    The relevance of parenting behavior to toddlers’ development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers’ inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multi-method approach would acknowledge that several levels of processes determine mothers’ experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers’ inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-olds toddlers and their mothers. Toddlers’ inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PMID:23750532

  2. Performance Assessment of Network Intrusion-Alert Prediction

    DTIC Science & Technology

    2012-09-01

    the threats. In this thesis, we use Snort to generate the intrusion detection alerts. 2. SNORT Snort is an open source network intrusion...standard for IPS. (Snort, 2012) We choose Snort because it is an open source product that is free to download and can be deployed cross-platform...Learning & prediction in relational time series: A survey. 21st Behavior Representation in Modeling & Simulation ( BRIMS ) Conference 2012, 93–100. Tan

  3. Aeromagnetic and radio echo ice-sounding measurements show much greater area of the Dufek intrusion, Antarctica

    USGS Publications Warehouse

    Behrendt, John C.; Drewry, D.J.; Jankowski, E.; Grim, M.S.

    1980-01-01

    A combined aeromagnetic and radio echo ice-sounding survey made in 1978 in Antarctica over the Dufek layered mafic intrusion suggests a minimum area of the intrusion of about 50,000 square kilometers, making it comparable in size with the Bushveld Complex of Africa. Comparisons of the magnetic and subglacial topographic profiles illustrate the usefulness of this combination of methods in studying bedrock geology beneath ice-covered areas. Magnetic anomalies range in peak-to-trough amplitude from about 50 nanoteslas over the lowermost exposed portion of the section in the Dufek Massif to about 3600 nanoteslas over the uppermost part of the section in the Forrestal Range. Theoretical magnetic anomalies, computed from a model based on the subice topography fitted to the highest amplitude observed magnetic anomalies, required normal and reversed magnetizations ranging from 10-3 to 10-2 electromagnetic units per cubic centimeter. This result is interpreted as indicating that the Dufek intrusion cooled through the Curie isotherm during one or more reversals of the earth's magnetic field. Copyright ?? 1980 AAAS.

  4. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  5. Railway clearance intrusion detection method with binocular stereo vision

    NASA Astrophysics Data System (ADS)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  6. BTSC VAPOR INSTRUSION PRIMER "VAPOR INTRUSION CONSIDERATION FOR REDEVELOPMENT"

    EPA Science Inventory

    This primer is designed for brownfields stakeholders concerned about vapor intrusion, including property owners, real estate developers, and contractors performing environmental site investigations. It provides an overview of the vapor intrusion issue and how it can impact the ap...

  7. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    PubMed

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  8. A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems

    DTIC Science & Technology

    2002-04-01

    Based Approach to Intrusion Detection System Evaluation for Distributed Real - Time Systems Authors: G. A. Fink, B. L. Chappell, T. G. Turner, and...Distributed, Security. 1 Introduction Processing and cost requirements are driving future naval combat platforms to use distributed, real - time systems of...distributed, real - time systems . As these systems grow more complex, the timing requirements do not diminish; indeed, they may become more constrained

  9. Hydrothermal alteration and Cu–Ni–PGE mobilization in the charnockitic rocks of the footwall of the South Kawishiwi intrusion, Duluth Complex, USA

    PubMed Central

    Benkó, Zsolt; Mogessie, Aberra; Molnár, Ferenc; Krenn, Kurt; Poulson, Simon R.; Hauck, Steven; Severson, Mark; Arehart, Greg B.

    2015-01-01

    In the Neoarchean (~ 2.7 Ga) contact metamorphosed charnockitic footwall of the Mesoproterosoic (1.1 Ga) South Kawishiwi intrusion of the Duluth Complex, the primary metamorphic mineral assemblage and Cu–Ni–PGE sulfide mineralization is overprinted by an actinolite + chlorite + cummingtonite + prehnite + pumpellyite + quartz + calcite hydrothermal mineral assemblage along 2–3 cm thick veins. In calcite, hosted by the hydrothermal alteration zones and in a single recrystallized quartz porphyroblast, four different fluid inclusion assemblages are documented; the composition of these fluid inclusions provide p–T conditions of the fluid flow, and helps to define the origin of the fluids and evaluate their role in the remobilization and reprecipitation of the primary metamorphic sulfide assemblage. Pure CO2 fluid inclusions were found as early inclusions in recrystallized quartz porphyroblast. These inclusions may have been trapped during the recrystallization of the quartz during the contact metamorphism of the footwall charnockite in the footwall of the SKI. The estimated trapping pressure (1.6–2.0 kbar) and temperature (810–920 °C) conditions correspond to estimates based on felsic veins in the basal zones of the South Kawishiwi intrusion. Fluid inclusion assemblages with CO2–H2O–NaCl and CH4–N2–H2O–NaCl compositions found in this study along healed microfractures in the recrystallized quartz porphyroblast establish the heterogeneous state of the fluids during entrapment. The estimated trapping pressure and temperature conditions (240–650 bar and 120–150 °C for CO2–H2O–NaCl inclusions and 315–360 bar and 145–165 °C for CH4–N2–H2O–NaCl inclusions) are significantly lower than the p–T conditions (> 700 °C and 1.6–2 kbar) during the contact metamorphism, indicating that this fluid flow might not be related to the cooling of the Duluth Complex and its contact aureole. The presence of chalcopyrite

  10. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    PubMed

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  11. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    NASA Astrophysics Data System (ADS)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  12. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  13. Father's Day dike intrusion and eruption reveals interaction between magmatic and tectonic processes at Kilauea Volcano, Hawaii

    NASA Astrophysics Data System (ADS)

    Foster, J. H.; Brooks, B. A.; Sandwell, D. T.; Poland, M.; Miklius, A.; Myer, D.; Okubo, P. G.; Patrick, M.; Wolfe, C.

    2007-12-01

    The June 17-19, 2007, Father's Day dike intrusion and eruption at Kilauea volcano brought to an end a seven- year period of steady state lava effusion at the Pu'u 'O'o vent. The event was observed by an unprecedented number of geophysical instruments, with temporary arrays of GPS and tiltmeters augmenting the continuous monitoring network. Envisat and ALOS SAR scenes were also acquired during this event and provide further information on the surface deformation as the event progressed. Fortuitously, the Envisat acquisition was during a pause in the middle of the sequence, while the ALOS PALSAR scene was acquired at the end of the sequence, allowing us to model each phase separately. Analysis of these data sets indicates that, in addition to three phases of the dike intrusion, a slow earthquake also occurred on the south flank of Kilauea. The slow earthquake apparently began near the end of the second phase of the dike intrusion. It was still underway the following day, when the third phase of the intrusion began and culminated in a small eruption. This suggests the possibility that the slow earthquake was triggered by the initial diking, and then in turn influenced the progression of the intrusion. Two of the largest previous slow earthquakes also hint at a connection between slow earthquakes and eruptive activity on Kilauea. The range of observations of the Father's Day events provides us with a unique opportunity to investigate the complex interactions between the tectonic processes of the south flank and magmatic processes within the summit and rift zones.

  14. Interfacial Granular Intrusions

    NASA Astrophysics Data System (ADS)

    Linden, Paul; Zheng, Zhong; Huppert, Herbert; Vriend, Nathalie; Neufeld, Jerome

    2017-11-01

    We study experimentally the intrusion of light granular material into an inviscid fluid of greater density. Despite a rich set of related geophysical and environmental phenomena, such as the spreading of calved ice and volcanic ash and debris flows, there are few previous studies on this topic. We conduct a series of lock-release experiments of light spherical beads into a rectangular tank initially filled with either fresh water or salt water, and record the time evolution of the interface shape and the front location of the current of beads. In particular, we find that the front location obeys a power-law behaviour during an intermediate time period following the release of the lock before the nose of beads reaches a maximum runout distance within a finite time. We investigate the dependence of the scaling exponent and runout distance on the total amount of beads, the initial lock length, and the properties of the liquid that fills the tank in the experiments. Appropriate scaling arguments are provided to collapse the raw experimental data into universal curves, which can be used to describe the front dynamics of light granular intrusions with different size and buoyancy effects and initial aspect ratios.

  15. Duration of a large Mafic intrusion and heat transfer in the lower crust: A SHRIMP U-Pb zircon Study in the Ivrea-Verbano Zone (Western Alps, Italy)

    USGS Publications Warehouse

    Peressini, G.; Quick, J.E.; Sinigoi, S.; Hofmann, A.W.; Fanning, M.

    2007-01-01

    The Ivrea-Verbano Zone in the western Italian Alps contains one of the world's classic examples of ponding of mantle-derived, mafic magma in the deep crust. Within it, a voluminous, composite mafic pluton, the Mafic Complex, intruded lower-crustal, high-grade paragneiss of the Kinzigite Formation during Permian-Carboniferous time, and is now exposed in cross-section as a result of Alpine uplift. The age of the intrusion is still debated because the results of geochronological studies in the last three decades on different rock types and with various dating techniques range from 250 to about 300 Ma. Sensitive high-resolution ion microprobe (SHRIMP) U-Pb zircon age determinations on 12 samples from several locations within the Mafic Complex were performed to better constrain the age of the igneous event. The results indicate a long history of magma emplacement and cooling, which reconciles the spread in previously published ages. The main intrusive phase took place at 288 ?? 4 Ma, causing a perturbation of the deep-crustal geotherm, which relaxed to the Sm-Nd closure temperature in garnet-free mafic rocks after about 15-20 Myr of sub-solidus cooling at c. 270 Ma. These results suggest that large, deep crustal plutons, such as those identified geophysically at depths of 10-20 km within extended continental crust (e.g. Yellowstone, Rio Grande Rift, Basin and Range) may have formed rapidly but induced a prolonged thermal perturbation. In addition, the data indicate that a significant thermal event affected the country rock of the Mafic Complex at about 310 Ma. The occurrence of an upper amphibolite- to granulite-facies thermal event in the Kinzigite Formation prior to the main intrusive phase of the Mafic Complex has been postulated by several workers, and is corroborated by other geochronological investigations. However, it remains uncertain whether this event (1) was part of a prolonged perturbation of the deep-crustal geotherm, which started long before the onset of

  16. Zone of intrusion study.

    DOT National Transportation Integrated Search

    2010-10-15

    The Midwest Roadside Safety Facility (MwRSF) performed an analysis using LS-DYNA simulation to investigate the zone of intrusion (ZOI) of an NCHRP Report No. 350 2000p pickup truck when impacting a 40-in. high F-shape parapet. : The ZOI for the 40-in...

  17. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    ERIC Educational Resources Information Center

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  18. Intrusion Detection: Generics and State-of-the-Art (la Detection de l’intrusion: Modeles generiques et etat de l’art)

    DTIC Science & Technology

    2002-01-01

    by the user for a number of possible pre-defined intrusions. One of these pre-defined intrusions is the command “get /etc/ passwd ”. If this command is...Application-level firewalls: which check communication at the application level. An example is the string get /etc/ passwd in the ftp protocol

  19. Percolation of isotopically heterogeneous interstitial melts in the crystal mush of the Rum layered intrusion, NW Scotland

    NASA Astrophysics Data System (ADS)

    O'Driscoll, B.; Hepworth, L. N.; Daly, J. S.; Gertisser, R.; Emeleus, C. H.

    2017-12-01

    The cumulate stratigraphy of layered intrusions offers a means of interrogating the replenishment and solidification histories of mafic magma chambers. Cumulates comprise cumulus minerals, which accumulate to form a silicate framework, and intercumulus minerals, which represent melt crystallised within the crystal mush. This fundamental textural distinction lies at the heart of cumulus theory and underpins some of the classic models of crystal-liquid differentiation that are based on layered intrusions. In order to shed further light on the importance of postcumulus processes in layered intrusions, and to demonstrate that crystal mushes may behave as open-systems during the crystallisation of cumulates, we investigated mineral-scale textural and geochemical heterogeneity in Unit 10 of the 60 Ma Rum layered intrusion. Numerous ( 1 mm thick) Cr-spinel seams occur throughout the 65 m Unit 10 peridotite stratigraphy. Unusually, intercumulus plagioclase and clinopyroxene crystals in the peridotite several centimetres above and below these seams exhibit complex optical and major element zoning. Sampling of individual intra-crystal zones in these phases was carried out using a New Wave Micromill, for analysis of their 87Sr/86Sr compositions to be measured on unspiked samples by TIMS. Both minerals reveal intra-crystalline isotopic heterogeneity. The maximum range (with 2σ uncertainties) of 87Sr/86Sr in the Unit 10 plagioclase is 0.704026±17-0.704591±8 and in clinopyroxene is 0.703533±23-0.704517±17. Within a single, oscillatory-zoned plagioclase, three discrete zones yield 87Sr/86Sr values of 0.704337±20, 0.704095±20 and 0.704052±11. A complex patchily-zoned clinopyroxene yields a 87Sr/86Sr range of 0.703533±23-0.703894±23. The new data demonstrate that multiple generations of isotopically distinct melts percolated through the Unit 10 crystal mush, suggesting solidification from cumulates that underwent repeated cycles of resorption and recrystallisation at the

  20. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    PubMed Central

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  1. Cognitive avoidance of intrusive memories: recall vantage perspective and associations with depression.

    PubMed

    Williams, Alishia D; Moulds, Michelle L

    2007-06-01

    Although recent research demonstrates that intrusive memories represent an overlapping cognitive feature of depression and post-traumatic stress disorder (PTSD), there is still a general paucity of research investigating the prevalence and maintenance of intrusive memories in depression. The current study investigated the association between a range of cognitive avoidant mechanisms that characterize PTSD samples (i.e., suppression, rumination, emotional detachment, and an observer vantage perspective) and intrusive memories of negative autobiographical events in relation to dysphoria. Hypotheses were based on the proposition that employment of these cognitive mechanisms would hinder the emotional processing of the negative event, thus contributing to the maintenance of intrusions. Results supported an association between negative intrusive memories, dysphoria, and avoidant mechanisms. Significant differences were also found between field and observer memories and measures of emotional detachment and rumination. Implications relating to intrusive memory maintenance and treatment approaches are discussed.

  2. Scanning Seismic Intrusion Detector

    NASA Technical Reports Server (NTRS)

    Lee, R. D.

    1982-01-01

    Scanning seismic intrusion detector employs array of automatically or manually scanned sensors to determine approximate location of intruder. Automatic-scanning feature enables one operator to tend system of many sensors. Typical sensors used with new system are moving-coil seismic pickups. Detector finds uses in industrial security systems.

  3. 40 CFR 197.26 - What are the circumstances of the human intrusion?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... human intrusion? 197.26 Section 197.26 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... YUCCA MOUNTAIN, NEVADA Public Health and Environmental Standards for Disposal Human-Intrusion Standard § 197.26 What are the circumstances of the human intrusion? For the purposes of the analysis of human...

  4. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  5. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  6. Observed assertive and intrusive maternal feeding behaviors increase child adiposity123

    PubMed Central

    Ozbeki, Tina N; Appugliese, Danielle P; Kaciroti, Niko; Corwyn, Robert F; Bradley, Robert H

    2012-01-01

    Background: Few studies have examined observed maternal feeding behaviors and their potential association with child adiposity. The association between maternal prompting to eat and child adiposity has been inconsistent. Objectives: This study sought to identify factors associated with maternal feeding behaviors and to test the hypothesis that more maternal prompts to eat, more assertive prompts, and more intrusiveness are associated with greater child adiposity. Design: Children (n = 1218) and their mothers were videotaped eating a standardized snack at ages 15, 24, and 36 mo. Maternal prompts to eat, the percentage of prompts that were assertive, and intrusiveness were coded. Adjusted regression analyses evaluated predictors of prompts, the percentage of assertive prompts, and intrusiveness and the relation of each of these factors with child adiposity (weight-for-length z score at 15 mo and BMI z score at 24 and 36 mo) after control for the child's race-ethnicity and sex, family income-to-needs ratio, and maternal education, weight status, and depressive symptoms. Results: At 36 mo, mothers gave an average of 9.3 prompts; 61% of prompts were assertive, and 48% of mothers were intrusive. Lower maternal education and minority race-ethnicity were associated with a greater percentage of assertive prompts and intrusiveness. A greater percentage of assertive prompts and intrusiveness, but not total prompts, was associated with higher child adiposity. Conclusions: Assertive prompting and an intrusive style had small but significant associations with greater child adiposity. Future work should focus on maternal motivations for assertive and intrusive feeding styles and mechanisms through which these feeding styles might increase child adiposity. PMID:22277552

  7. Simulating the influence of groundwater table fluctuation on vapor intrusion

    NASA Astrophysics Data System (ADS)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  8. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  9. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  10. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  11. Associations between intrusive thoughts, reality discrimination and hallucination-proneness in healthy young adults.

    PubMed

    Smailes, David; Meins, Elizabeth; Fernyhough, Charles

    2015-01-01

    People who experience intrusive thoughts are at increased risk of developing hallucinatory experiences, as are people who have weak reality discrimination skills. No study has yet examined whether these two factors interact to make a person especially prone to hallucinatory experiences. The present study examined this question in a non-clinical sample. Participants were 160 students, who completed a reality discrimination task, as well as self-report measures of cannabis use, negative affect, intrusive thoughts and auditory hallucination-proneness. The possibility of an interaction between reality discrimination performance and level of intrusive thoughts was assessed using multiple regression. The number of reality discrimination errors and level of intrusive thoughts were independent predictors of hallucination-proneness. The reality discrimination errors × intrusive thoughts interaction term was significant, with participants who made many reality discrimination errors and reported high levels of intrusive thoughts being especially prone to hallucinatory experiences. Hallucinatory experiences are more likely to occur in people who report high levels of intrusive thoughts and have weak reality discrimination skills. If applicable to clinical samples, these findings suggest that improving patients' reality discrimination skills and reducing the number of intrusive thoughts they experience may reduce the frequency of hallucinatory experiences.

  12. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  13. The importance of context: evidence that contextual representations increase intrusive memories.

    PubMed

    Pearson, David G; Ross, Fiona D C; Webster, Victoria L

    2012-03-01

    Intrusive memories appear to enter consciousness via involuntary rather than deliberate recollection. Some clinical accounts of PTSD seek to explain this phenomenon by making a clear distinction between the encoding of sensory-based and contextual representations. Contextual representations have been claimed to actively reduce intrusions by anchoring encoded perceptual data for an event in memory. The current analogue trauma study examined this hypothesis by manipulating contextual information independently from encoded sensory-perceptual information. Participants' viewed images selected from the International Affective Picture System that depicted scenes of violence and bodily injury. Images were viewed either under neutral conditions or paired with contextual information. Two experiments revealed a significant increase in memory intrusions for images paired with contextual information in comparison to the same images viewed under neutral conditions. In contrast to the observed increase in intrusion frequency there was no effect of contextual representations on voluntary memory for the images. The vividness and emotionality of memory intrusions were also unaffected. The analogue trauma paradigm may fail to replicate the effect of extreme stress on encoding postulated to occur during PTSD. These findings question the assertion that intrusive memories develop from a lack of integration between sensory-based and contextual representations in memory. Instead it is argued contextual representations play a causal role in increasing the frequency of intrusions by increasing the sensitivity of memory to involuntary retrieval by associated internal and external cues. Copyright © 2011 Elsevier Ltd. All rights reserved.

  14. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    NASA Astrophysics Data System (ADS)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  15. Bushveld Igneous Complex, South Africa

    NASA Image and Video Library

    2013-02-08

    The Bushveld Igneous Complex BIC is a large layered igneous intrusion within the earth crust, exposed at the edge of the Transvaal Basin in South Africa. Numerous mines, tailings piles, and leach ponds are shown in blue.

  16. Work zone intrusion alarm effectiveness.

    DOT National Transportation Integrated Search

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  17. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes.

    PubMed

    Passarelli, L; Rivalta, E; Shuler, A

    2014-01-28

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process.

  18. Tell me more: Can a memory test reduce analogue traumatic intrusions?

    PubMed

    Krans, Julie; Näring, Gérard; Holmes, Emily A; Becker, Eni S

    2009-05-01

    Information processing theories of post-traumatic stress disorder (PTSD) state that intrusive images emerge due to a lack of integration of perceptual trauma representations in autobiographical memory. To test this hypothesis experimentally, participants were shown an aversive film to elicit intrusive images. After viewing, they received a recognition test for just one part of the film. The test contained neutrally formulated items to rehearse information from the film. Participants reported intrusive images for the film in an intrusion diary during one week after viewing. In line with expectations, the number of intrusive images decreased only for the part of the film for which the recognition test was given. Furthermore, deliberate cued-recall memory after one week was selectively enhanced for the film part that was in the recognition test a week before. The findings provide new evidence supporting information processing models of PTSD and have potential implications for early interventions after trauma.

  19. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    PubMed Central

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  20. Contrasting catastrophic eruptions predicted by different intrusion and collapse scenarios.

    PubMed

    Rincón, M; Márquez, A; Herrera, R; Alonso-Torres, A; Granja-Bruña, J L; van Wyk de Vries, B

    2018-04-18

    Catastrophic volcanic eruptions triggered by landslide collapses can jet upwards or blast sideways. Magma intrusion is related to both landslide-triggered eruptive scenarios (lateral or vertical), but it is not clear how such different responses are produced, nor if any precursor can be used for forecasting them. We approach this problem with physical analogue modelling enhanced with X-ray Multiple Detector Computed Tomography scanning, used to track evolution of internal intrusion, and its related faulting and surface deformation. We find that intrusions produce three different volcano deformation patterns, one of them involving asymmetric intrusion and deformation, with the early development of a listric slump fault producing pronounced slippage of one sector. This previously undescribed early deep potential slip surface provides a unified explanation for the two different eruptive scenarios (lateral vs. vertical). Lateral blast only occurs in flank collapse when the intrusion has risen into the sliding block. Otherwise, vertical rather than lateral expansion of magma is promoted by summit dilatation and flank buttressing. The distinctive surface deformation evolution detected opens the possibility to forecast the possible eruptive scenarios: laterally directed blast should only be expected when surface deformation begins to develop oblique to the first major fault.

  1. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    NASA Astrophysics Data System (ADS)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  2. Emplacement of the early Miocene Pinto Peak intrusion, Southwest Utah, USA

    NASA Astrophysics Data System (ADS)

    Petronis, Michael S.; O'Driscoll, Brian

    2013-12-01

    In this contribution, we report rock magnetic, petrographic, and anisotropy of magnetic susceptibility (AMS) data from the Pinto Peak intrusion, all of which bear on volcanic construction. Rock magnetic data indicate that the dominant magnetic mineral phase is low-Ti titanomagnetite of multidomain grain size, the composition of which varies spatially across the intrusion. The intrusion is a porphyritic andesite dominated by Ca-rich plagioclase (>60%) as well as biotite, amphibole, olivine, and opaque minerals. Reflected light petrography reveals mostly euhedral-subhedral (titano)magnetite crystals that often form clustered glomerocrysts and stringers of equant crystals, without exhibiting a consistent mineral alignment fabric. Moderate-to-shallow plunging prolate magnetic susceptibility ellipsoids dominate the northern part of the intrusion while steeply dipping/plunging magnetic susceptibility ellipsoids are generally restricted to the southern part of the intrusion. The vent facies rocks yield moderate-to-steep oblate susceptibility ellipsoids. We interpret the flow pattern in the north to reflect subhorizontal flow of magma, filling a tabular sheet-like body associated with propagation of the intrusion to the north. We argue that the southern part of the intrusion represents the ascent site of the magma rising to shallow crustal levels along a steep feeder system. The oblate magnetic fabrics in the vent area plausibly represent flattening against the conduit walls as evidenced by a weak planar flow foliation observed in the vent conduit rocks. On reaching shallow crustal levels, the magma deformed and uplifted the roof rocks leading to gravitational instability. As the slide mass released from the roof, an explosive eruption ensued resulting in the emplacement of the Rocks of Paradise tuff and associated effusive lava flows. Following eruption, magma pressure decreased and the magma drained northward forming the northern intrusive phase.

  3. Efficient cooling of rocky planets by intrusive magmatism

    NASA Astrophysics Data System (ADS)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  4. Sulfide intrusion in the tropical seagrasses Thalassia testudinum and Syringodium filiforme

    NASA Astrophysics Data System (ADS)

    Holmer, Marianne; Pedersen, Ole; Krause-Jensen, Dorte; Olesen, Birgit; Hedegård Petersen, Malene; Schopmeyer, Stephanie; Koch, Marguerite; Lomstein, Bente Aa.; Jensen, Henning S.

    2009-11-01

    Sulfur and oxygen dynamics in the seagrasses Thalassia testudinum and Syringodium filiforme and their sediments were studied in the US Virgin Islands (USVI) in order to explore sulfide intrusion into tropical seagrasses. Four study sites were selected based on the iron concentration in sediments and on proximity to anthropogenic nutrient sources. Meadow characteristics (shoot density, above- and below-ground biomass, nutrient content) were sampled along with sediment biogeochemistry. Sulfide intrusion was high in T. testudinum, as up to 96% of total sulfur in the plant was derived from sediment-derived sulfides. The sulfide intrusion was negatively correlated to the turnover of sulfides in the sediments regulated by both plant parameters and sediment sulfur pools. Sediment iron content played an indirect role by affecting sulfide turnover rates. Leaf production was negatively correlated with sulfide intrusion suggesting that active growth reduced sulfide intrusion. Sulfide intrusion was lower in S. filiforme (up to 44%) compared to T. testudinum consistent with a higher internal nighttime oxygen concentrations found for S. filiforme. When S. filiforme can take advantage of its ability to maintain high internal oxygen concentrations, as was the case on the USVI, it could increase its success in colonizing unvegetated disturbed sediments with potentially high sulfide concentrations.

  5. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    PubMed Central

    Chapman, Helen R.; Kirby-Turner, Nick

    2018-01-01

    Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised) evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists. PMID:29719519

  6. Inducing and modulating intrusive emotional memories: a review of the trauma film paradigm.

    PubMed

    Holmes, Emily A; Bourne, Corin

    2008-03-01

    Highly affect-laden memory intrusions are a feature of several psychological disorders with intrusive images of trauma especially associated with post-traumatic stress disorder (PTSD). The trauma film paradigm provides a prospective experimental tool for investigating analogue peri-traumatic cognitive mechanisms underlying intrusion development. We review several historical papers and some more recent key studies that have used the trauma film paradigm. A heuristic diagram is presented, designed to simplify predictions about analogue peri-traumatic processing and intrusion development, which can also be related to the processing elements of recent cognitive models of PTSD. Results show intrusions can be induced in the laboratory and their frequency amplified/attenuated in line with predictions. Successful manipulations include competing task type (visuospatial vs. verbal) and use of a cognitive coping strategy. Studies show that spontaneous peri-traumatic dissociation also affects intrusion frequency although attempts to manipulate dissociation have failed. It is hoped that further use of this paradigm may lead to prophylactic training for at risk groups and an improved understanding of intrusions across psychopathologies.

  7. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  8. A Simulation-Optimization Model for the Management of Seawater Intrusion

    NASA Astrophysics Data System (ADS)

    Stanko, Z.; Nishikawa, T.

    2012-12-01

    Seawater intrusion is a common problem in coastal aquifers where excessive groundwater pumping can lead to chloride contamination of a freshwater resource. Simulation-optimization techniques have been developed to determine optimal management strategies while mitigating seawater intrusion. The simulation models are often density-independent groundwater-flow models that may assume a sharp interface and/or use equivalent freshwater heads. The optimization methods are often linear-programming (LP) based techniques that that require simplifications of the real-world system. However, seawater intrusion is a highly nonlinear, density-dependent flow and transport problem, which requires the use of nonlinear-programming (NLP) or global-optimization (GO) techniques. NLP approaches are difficult because of the need for gradient information; therefore, we have chosen a GO technique for this study. Specifically, we have coupled a multi-objective genetic algorithm (GA) with a density-dependent groundwater-flow and transport model to simulate and identify strategies that optimally manage seawater intrusion. GA is a heuristic approach, often chosen when seeking optimal solutions to highly complex and nonlinear problems where LP or NLP methods cannot be applied. The GA utilized in this study is the Epsilon-Nondominated Sorted Genetic Algorithm II (ɛ-NSGAII), which can approximate a pareto-optimal front between competing objectives. This algorithm has several key features: real and/or binary variable capabilities; an efficient sorting scheme; preservation and diversity of good solutions; dynamic population sizing; constraint handling; parallelizable implementation; and user controlled precision for each objective. The simulation model is SEAWAT, the USGS model that couples MODFLOW with MT3DMS for variable-density flow and transport. ɛ-NSGAII and SEAWAT were efficiently linked together through a C-Fortran interface. The simulation-optimization model was first tested by using a

  9. State of the Practice of Intrusion Detection Technologies

    DTIC Science & Technology

    2000-01-01

    security incident response teams ) - the role of IDS in threat management, such as defining alarm severity, monitoring, alerting, and policy-based...attacks in an effort to sneak under the radar of security specialists and intrusion detection software, a U.S. Navy network security team said today...to get the smoking gun," said Stephen Northcutt, head of the Shadow intrusion detection team at the Naval Surface Warfare Center. "To know what’s

  10. Replacing intrusive thoughts: investigating thought control in relation to OCD symptoms.

    PubMed

    Ólafsson, Ragnar P; Snorrason, Ívar; Bjarnason, Reynar K; Emmelkamp, Paul M G; Ólason, Daníel Þ; Kristjánsson, Árni

    2014-12-01

    Control of obsessive thoughts in Obsessive Compulsive Disorder (OCD) involves both avoidance and removal of undesirable intrusive thoughts. Thought suppression tasks tap both of these processes but experimental results have been inconsistent. Experimental tasks allowing more focused study of the processes involved in controlling intrusive thoughts may be needed. In two experiments, control over neutral, standardized intrusive and personal intrusive thoughts was investigated as participants attempted to replace them with neutral thoughts. Non-selected university students (Experiment 1: N = 61) and university students scoring high and low on self-report measure of OC symptoms (Experiment 2: N = 40) performed a computerized thought replacement task. In experiment 1 replacing personal intrusive thoughts took longer than replacing neutral thoughts. Self-reports showed that intrusive thoughts were rated more difficult to replace and were associated with greater thought reoccurrence during replacement, larger emotional reaction and more discomfort. These results were largely replicated in experiment 2. Furthermore, the high OC symptom group experienced greater overall difficulty controlling thoughts on the replacement task, experienced more reoccurrences of personal intrusive thoughts, larger emotional reactions and discomfort associated with them, and felt a greater urge to remove them. All participants were non-clinical university students, and older adults with OCD should be tested. The findings are in line with cognitive behavioural theories of OCD. They support the usefulness of thought replacement as a research paradigm to study thought control in OCD and possibly other psychological conditions characterized by repetitive thoughts. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. Stratospheric Intrusion-Influenced Ozone Air Quality Exceedences Investigated in MERRA-2

    NASA Technical Reports Server (NTRS)

    Knowland, K. Emma; Ott, Lesley; Duncan, Bryan; Wargan, Krzysztof

    2017-01-01

    Ozone near the surface is harmful to human health and is a result of the photochemical reaction with both man-made and natural precursor pollutant sources. Therefore, in order to reduce near surface ozone concentrations, communities must reduce anthropogenic pollution sources. However, the injection of stratospheric ozone into the troposphere, known as a stratospheric intrusion, can also lead to concentrations of ground-level ozone exceeding air quality standards. Stratospheric intrusions are dynamical atmospheric features, however, these intrusions have been misrepresented in models and reanalyses until recently, as the features of a stratospheric intrusion are best identified in horizontal resolutions of approximately 50 km or smaller. NASA's Modern-Era Retrospective Analysis for Research and Applications Version-2 (MERRA-2) reanalysis is a publicly-available high-resolution dataset (50 km) with assimilated ozone that characterizes stratospheric ozone on the same spatiotemporal resolution as the meteorology. We show that stratospheric intrusions that impact surface air quality are well represented in the MERRA-2 reanalysis. This is demonstrated through a case study analysis of stratospheric intrusion events which were identified by the United States Environmental Protection Agency (EPA) to impact surface ozone air quality in spring 2012 in Colorado. The stratospheric intrusions are identified in MERRA-2 by the folding of the dynamical tropopause under the jet stream and subsequent isentropic descent of dry, O3-rich stratospheric air towards the surface where ozone air quality exceedences were observed. The MERRA-2 reanalysis can support air quality agencies for more rapid identification of the impact of stratospheric air on ground-level ozone.

  12. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    USGS Publications Warehouse

    duBray, E.A.

    2007-01-01

    Importantly, modal composition, age, and geochemical characteristics of intrusions associated with large mineral deposits along the trends, are indistinguishable from non-mineralized intrusions in northern Nevada and thus do not identify intrusions associated with significant deposits. Moreover, intrusion age and composition show little correlation with mineral-deposit type, abundance, and size. Given the lack of diagnostic characteristics for intrusions associated with deposits, it is uncertain whether age, modal composition, and geochemical data can identify intrusions associated with mineral deposits. These findings suggest that associations between northern Nevada intrusions and mineral deposits reflect superimposition of many geologic factors, none of which was solely responsible for mineral-deposit formation. These factors might include intrusion size, efficiency of fluid and metal extraction from magma, prevailing redox and sulfidation conditions, or derivation of metals and ligands from host rocks and groundwater. The abundance and diversity of mineral deposits in northern Nevada may partly reflect geochemical inheritance, for example, along the mineral trends rather than the influence of petrologically unique magma or associated fluids.

  13. Magnetic fabric constraints of the emplacement of igneous intrusions

    NASA Astrophysics Data System (ADS)

    Maes, Stephanie M.

    Fabric analysis is critical to evaluating the history, kinematics, and dynamics of geological deformation. This is particularly true of igneous intrusions, where the development of fabric is used to constrain magmatic flow and emplacement mechanisms. Fabric analysis was applied to three mafic intrusions, with different tectonic and petrogenetic histories, to study emplacement and magma flow: the Insizwa sill (Mesozoic Karoo Large Igneous Province, South Africa), Sonju Lake intrusion (Proterozoic Midcontinent Rift, Minnesota, USA), and Palisades sill (Mesozoic rift basin, New Jersey, USA). Multiple fabric analysis techniques were used to define the fabric in each intrusive body. Using digital image analysis techniques on multiple thin sections, the three-dimensional shape-preferred orientation (SPO) of populations of mineral phases were calculated. Low-field anisotropy of magnetic susceptibility (AMS) measurements were used as a proxy for the mineral fabric of the ferromagnetic phases (e.g., magnetite). In addition, a new technique---high-field AMS---was used to isolate the paramagnetic component of the fabric (e.g., silicate fabric). Each fabric analysis technique was then compared to observable field fabrics as a framework for interpretation. In the Insizwa sill, magnetic properties were used to corroborate vertical petrologic zonation and distinguish sub-units within lithologically defined units. Abrupt variation in magnetic properties provides evidence supporting the formation of the Insizwa sill by separate magma intrusions. Low-field AMS fabrics in the Sonju Lake intrusion exhibit consistent SW-plunging lineations and SW-dipping foliations. These fabric orientations provide evidence that the cumulate layers in the intrusion were deposited in a dynamic environment, and indicate magma flowed from southwest to northeast, parallel to the pre-existing rift structures. In the Palisades sill, the magnetite SPO and low-field AMS lineation have developed orthogonal to

  14. Kontay intrusion (Polar Siberia)- an example of strong magmatic differentiation in the single magmatic body

    NASA Astrophysics Data System (ADS)

    Zaitsev, Victor

    2016-04-01

    Kontay intrusion is located in the north-west part of Maimecha-Kotuy province, (part of Siberian Large Igneous Province) in the northern part of the Siberian Platform. Intrusion is fully overlaid and practically not studied before. Geophysical data evident that intrusion has form of laccolite with diameter ˜7.5 km and thickness ˜ 2.5 km [1]. Initially lower part of intrusion was described as "gabbro-anortozite and anortositic gabbro" and higher part - as "leucocratic granophyric anortosites" [2]. Complex mineralo-petrological-geochemical study allow to divide intrusion section on three zones: Lower zone (below 1100 m) - layered sequence of leucocratic and melanocratic of biotite- and ortopyroxene-bearing gabbro, with minor alkaline feldspar, Middle zone (1100-700m) - biotite- and K-feldspar bearing gabbro and monzonotes, interstitial space often contain micrographical structures. Biotite corroded clinopyroxene and form interstitial crystals and Upper zone (700-214 m) - petrographically monotone porthyric quartz-monzonites and granosyenites with rare phenocrysts of plagioclase, magnetite, clinopyroxene and biotite. The main secondary minerals are albite, amphibole (edenite-feroedenite), secondary biotite, chlorite, and F,Al-bearing titanite. Rocks of the all parts fall in the same trends on the binary petrochemical diagrams, they belong to the High-K calc-alkaline seria. They are clearly more alkaline then intrusions of Norilsk district and less alkaline then alkaline-ultramafic intrusions of Maymecha-Kotuy province. Volcanic rocks of Norilsk and Maymecha-Kotuy area was subdivided for four geochemical types, mainly by the Ti-content, Th/U, Gd/Yb and Sm/Yb ratio: Low-Ti-1 (predominated), Low-Ti-2 (well -developed in Norilsk region), Moderate-Ti (developed only in the lower part of volcanic formation in Norilsk region), High-Ti (rare in Norilsk region, but widely spread in Mailecha-Kotuy area) [3]. Kontay intrusion rocks belong to Moderate-Ti group. The closest

  15. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  16. Disequilibrium dihedral angles in layered intrusions: the microstructural record of fractionation

    NASA Astrophysics Data System (ADS)

    Holness, Marian; Namur, Olivier; Cawthorn, Grant

    2013-04-01

    The dihedral angle formed at junctions between two plagioclase grains and a grain of augite is only rarely in textural equilibrium in gabbros from km-scale crustal layered intrusions. The median of a population of these disequilibrium angles, Θcpp, varies systematically within individual layered intrusions, remaining constant over large stretches of stratigraphy with significant increases or decreases associated with the addition or reduction respectively of the number of phases on the liquidus of the bulk magma. The step-wise changes in Θcpp are present in Upper Zone of the Bushveld Complex, the Megacyclic Unit I of the Sept Iles Intrusion, and the Layered Series of the Skaergaard Intrusion. The plagioclase-bearing cumulates of Rum have a bimodal distribution of Θcpp, dependent on whether the cumulus assemblage includes clinopyroxene. The presence of the step-wise changes is independent of the order of arrival of cumulus phases and of the composition of either the cumulus phases or the interstitial liquid inferred to be present in the crystal mush. Step-wise changes in the rate of change in enthalpy with temperature (ΔH) of the cooling and crystallizing magma correspond to the observed variation of Θcpp, with increases of both ΔH and Θcpp associated with the addition of another liquidus phase, and decreases of both associated with the removal of a liquidus phase. The replacement of one phase by another (e.g. olivine ⇔ orthpyroxene) has little effect on ΔH and no discernible effect on Θcpp. An increase of ΔH is manifest by an increase in the fraction of the total enthalpy budget that is the latent heat of crystallization (the fractional latent heat). It also results in an increase in the amount crystallized in each incremental temperature drop (the crystal productivity). An increased fractional latent heat and crystal productivity result in an increased rate of plagioclase growth compared to that of augite during the final stages of solidification

  17. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    PubMed Central

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  18. Final OSWER Vapor Intrusion Guidance

    EPA Science Inventory

    EPA is preparing to finalize its guidance on assessing and addressing vapor intrusion, which is defined as migration of volatile constituents from contaminated media in the subsurface (soil or groundwater) into the indoor environment. In November 2002, EPA issued draft guidance o...

  19. Implementing and testing a fiber-optic polarization-based intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hajj, Rasha El; MacDonald, Gregory; Verma, Pramode; Huck, Robert

    2015-09-01

    We describe a layer-1-based intrusion detection system for fiber-optic-based networks. Layer-1-based intrusion detection represents a significant elevation in security as it prohibits an adversary from obtaining information in the first place (no cryptanalysis is possible). We describe the experimental setup of the intrusion detection system, which is based on monitoring the behavior of certain attributes of light both in unperturbed and perturbed optical fiber links. The system was tested with optical fiber links of various lengths and types, under different environmental conditions, and under changes in fiber geometry similar to what is experienced during tapping activity. Comparison of the results for perturbed and unperturbed links has shown that the state of polarization is more sensitive to intrusion activity than the degree of polarization or power of the received light. The testing was conducted in a simulated telecommunication network environment that included both underground and aerial links. The links were monitored for intrusion activity. Attempts to tap the link were easily detected with no apparent degradation in the visual quality of the real-time surveillance video.

  20. Maxillary molar intrusion with micro-implant anchorage (MIA).

    PubMed

    Park, Hyo-Sang; Jang, Bong-Kyu; Kyung, Hee-Moon

    2005-11-01

    Intrusion of the maxillary molars is difficult to accomplish using traditional methods of anchorage. To describe methods of maxillary molar intrusion with the aid of micro-implants. Micro-implants provide stable intra-oral anchorage and enable the maxillary molars to be intruded without the usual side effects. Three adult patients are presented showing how micro-implants can be used to intrude the maxillary molars. In the first patient micro-implants were placed in the alveolar process between the second premolar and first molar, in the second patient micro-implants were placed in the palatal alveolar process between the first and second molars, and in the third patient a micro-implant was placed in the palate paramedially. A transpalatal bar was used to prevent bucco- or linguoversion of the molars during intrusion. The maxillary molars can be intruded with intra-oral anchorage derived from microscrew implants.

  1. Design of an Evolutionary Approach for Intrusion Detection

    PubMed Central

    2013-01-01

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The proposed approach can generate a pool of noninferior solutions and ensembles thereof having optimized trade-offs values of multiple conflicting objectives. In this paper, a three-phase, approach is proposed to generate solutions to a simple chromosome design in the first phase. In the first phase, a Pareto front of noninferior individual solutions is approximated. In the second phase of the proposed approach, the entire solution set is further refined to determine effective ensemble solutions considering solution interaction. In this phase, another improved Pareto front of ensemble solutions over that of individual solutions is approximated. The ensemble solutions in improved Pareto front reported improved detection results based on benchmark datasets for intrusion detection. In the third phase, a combination method like majority voting method is used to fuse the predictions of individual solutions for determining prediction of ensemble solution. Benchmark datasets, namely, KDD cup 1999 and ISCX 2012 dataset, are used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover individual solutions and ensemble solutions thereof with a good support and a detection rate from benchmark datasets (in comparison with well-known ensemble methods like bagging and boosting). In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting

  2. The Dovyren Intrusive Complex (Southern Siberia, Russia): Insights into dynamics of an open magma chamber with implications for parental magma origin, composition, and Cu-Ni-PGE fertility

    NASA Astrophysics Data System (ADS)

    Ariskin, Alexey; Danyushevsky, Leonid; Nikolaev, Georgy; Kislov, Evgeny; Fiorentini, Marco; McNeill, Andrew; Kostitsyn, Yuri; Goemann, Karsten; Feig, Sandrin T.; Malyshev, Alexey

    2018-03-01

    The Dovyren Intrusive Complex (DIC, Northern Baikal region, 728 Ma) includes the layered dunite-troctolite-gabbronorite Yoko-Dovyren massif (YDM), associated mafic-ultramafic sills, and dykes of olivine-rich to olivine-free gabbronorite. Major rock types of the DIC are presented, including a diversity of olivine orthocumulates to olivine-plagioclase and gabbroic adcumulates, carbonate-contaminated ultramafics and Cu-Ni-PGE mineralisation. Detailed comparisons of complete cross-sections of the YDM in its centre and at the NE and SW margins demonstrate differences in the cumulate succession, mineral chemistry, and geochemical structure that likely reflect variations in parental magma compositions. Combining petrochemical reconstructions for most primitive rocks and calculations using the COMAGMAT-5 model, it is shown that the central and peripheral parts of the intrusion formed by olivine-laden parental magmas ranged in their temperatures by 100 °C, approximately from 1290 °C ( 11 wt% MgO, olivine Fo88) to 1190 °C ( 8 wt% MgO, olivine Fo86). Thermodynamic modelling suggests that the most primitive high-Mg magma was S-undersaturated, whereas its derivatives became S-saturated at T < 1240-1200 °C. These estimates are consistent with geological observations that mostly sulphide-poor mineralisation occurs in the centre of the intrusion, whereas Cu-Ni sulphide ores (locally net-textured) occur in its NE and SW parts, as well as in the underlying peridotite sills. The primitive S-undersaturated olivine cumulates became sulphide-saturated at a post-cumulus stage. As a result, Ni-rich immiscible sulphides formed within and migrated through the early olivine-rich cumulate piles to generate poorly-mineralised plagiodunite. In the troctolite and gabbroic parts of the Dovyren chamber, sulphide immiscibility likely occurred at lower temperatures, producing Cu-rich sulphide precursors, which gave rise to the 'platinum group mineral' (PGM-containing) troctolite and low

  3. Pre-stressor cognitive control is related to intrusive cognition of a stressful film.

    PubMed

    Wessel, Ineke; Overwijk, Sippie; Verwoerd, Johan; de Vrieze, Nienke

    2008-04-01

    It has been suggested that relatively weak cognitive control existing prior to a stressful event may be associated with intrusive memories of that stressor afterwards. We explored this in two analog studies employing unselected participants who saw an emotional film fragment and completed behavioral (i.e., color-naming interference [CNI]) and self-report indices of intrusions. Prior to film presentation, several cognitive control tests were administered. Study 1 showed that better updating/monitoring was linked to less CNI from negative film-related words. However, better updating/monitoring was associated with more diary reports of intrusive memories. Study 2 showed that a better resistance to pro-active interference (PI) predicted less self-reported film-related intrusive cognition after 24h. However, after this delay, both self-reported intrusions and CNI were not related to updating/monitoring. Taken together, the results suggest that a specific pre-existing cognitive control function (i.e., resistance to PI) may be involved in the regulation of post-stressor intrusive memory phenomena.

  4. In-situ trainable intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such thatmore » the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.« less

  5. Predicting The Intrusion Layer From Deep Ocean Oil Spills

    NASA Astrophysics Data System (ADS)

    Wang, Dayang; Chow, Aaron; Adams, E. Eric

    2015-11-01

    Oil spills from deep ocean blowout events motivate our study of multiphase plumes in a water column. Key to understanding the long-term fate of these plumes is the ability to predict the depth and persistence of intrusion layers. While intrusion layers from multiphase plumes have been studied under stagnant conditions, their behavior in the presence of crossflow, especially in mild crossflow, remains poorly understood. The classical classification of plume behavior identifies two regimes: crossflow-dominant and stratification-dominant--but it does not account for the interplay between the two effects, leaving the transition region unexplored. We conduct laboratory tank experiments to investigate the behavior of intrusion layers under the simultaneous action of crossflow and stratification. Our experiments use an inverted frame of reference, using glass beads with a range of sizes to simulate oil droplets. We find that crossflow creates enhanced mixing, which in turn leads to a shallower intrusion layer of the released fluid (correspondingly, a deeper layer in the case of a deep ocean blowout). We develop a mathematical formulation that extends previous models to account for crossflow effects, and use field observations to validate the analytical and experimental findings.

  6. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  7. Indoor Air Vapor Intrusion Mitigation Approaches

    EPA Pesticide Factsheets

    The National Risk Management Research Laboratory has developed a technology transfer document regarding management and treatment of vapor intrusion into building structures. This document describes the range of mitigation technologies available.

  8. A new physical barrier system for seawater intrusion control

    NASA Astrophysics Data System (ADS)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  9. Late Vendian Complexes in the Structure of Metamorphic Basement of the Fore Range Zone, Greater Caucasus

    NASA Astrophysics Data System (ADS)

    Kamzolkin, V. A.; Latyshev, A. V.; Vidyapin, Yu. P.; Somin, M. L.; Smul'skaya, A. I.; Ivanov, S. D.

    2018-05-01

    The paper presents new data on the composition, age, and relationships (with host and overlying deposits) of intrusive rocks in the basement of the Fore Range zone (Greater Caucasus), in the Malaya Laba River Basin. The evolutionary features of intrusive units located within the Blyb metamorphic complex are described. It is shown for the first time that the lower levels of this complex are, in a structural sense, outcrops of the Late Vendian basement. The basement is composed of the Balkan Formation and a massif of quartz metadiorites that intrudes it; for the rocks of this massif, ages ranging from 549 ± 7.4 to 574.1 ± 6.7 Ma are obtained for three U-Pb datings by the SHRIMP-II method. The Herzyinan magmatic event is represented by a group of granodiorite intrusions penetrating the Blyb complex on a series of faults extending along its boundary with the Main Range zone. The obtained estimate for the U-Pb age of one of the intrusions (319 ± 3.8 Ma) corresponds to the end of the Serpukhovian stage of the Early Carboniferous.

  10. Geologic Mapping in Nogal Peak Quadrangle: Geochemistry, Intrusive Relations and Mineralization in the Sierra Blanca Igneous Complex, New Mexico

    NASA Astrophysics Data System (ADS)

    Goff, F.; Kelley, S. A.; Lawrence, J. R.; Cikowski, C. T.; Krier, D. J.; Goff, C. J.; McLemore, V. T.

    2011-12-01

    Nogal Peak quadrangle is located in the northern Sierra Blanca Igneous Complex (SBIC) and contains most of the White Mountain Wilderness (geologic map is available at http://geoinfo.nmt.edu/publications/maps/geologic/ofgm/details.cfml?Volume=134). The geology of the quad consists of a late Eocene to Oligocene volcanic pile (Sierra Blanca Volcanics, mostly alkali basalt to trachyte) intruded by a multitude of dikes, plugs and three stocks: Rialto, 31.4 Ma (mostly syenite), Three Rivers, ca. 29 to 27 Ma (quartz syenite intruded by subordinate alkali granite), and Bonito Lake, 26.6 Ma (mostly monzonite). Three Rivers stock is partially surrounded by alkali rhyolites that geochemically resemble the alkali granites. The circular shape of the stock and surrounding rhyolites suggests they form the root of a probable caldera. SBIC rocks have compositions typical of those found within the Rocky Mountain alkaline belt and those associated with continental rift zone magmatism. Because the volcanic host rocks are deeply eroded, intrusive relations with the stocks are well exposed. Most contacts at stock margins are near vertical. Roof pendants are common near some contacts and stoped blocks up to 700 m long are found within the Three Rivers stock. Contacts, pendants and stoped blocks generally display some combination of hornfelsing, brecciation, fracturing, faulting and mineralization. Sierra Blanca Volcanics display hydrothermal alteration increasing from argillic in the NW sector of the quad to high-temperature porpylitic near stock margins. Retrograde phyllic alteration occurs within breccia pipes and portions of the stocks. Mineral deposits consist of four types: Placer Au, fissure veins (mostly Ag-Pb-Zn±Au), breccia pipes (Au-Mo-Cu), and porphyry Mo-Cu. A singular pipe on the SW margin of Bonito Lake stock contains sapphire-lazulite-alunite. Although Au has been intermittently mined in the quad since 1865, best production of Au originated around the turn of the last

  11. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    NASA Astrophysics Data System (ADS)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  12. Geochemistry and petrogenesis of the Laramie anorthosite complex, Wyoming

    USGS Publications Warehouse

    Fountain, J.C.; Hodge, D.S.; Allan, Hills F.

    1981-01-01

    A geochemical investigation of the Laramie anorthosite complex determined that monsonite associated with the complex are characterized by positive Eu anomalies and display a regular variation in composition with distance from the monzonite/county rock contact. Anorthositic rocks have major and trace element abundance typical of similar complexes. The internal variations in the monzonite were produced by in situ fractionation and contamination. The data indicate that anorthosite and monzonite cannot be comagmatic. It is proposed that the anorthosite and monzonite of the complex evolved from two distinct magmas, and that two stages of anatectic melting contributed to the evolution of the monzonite. An initial stage of partial melting was induced by intrusion of a gabbroic anorthosite magma into the lower crust; a second partial melting event occurred after emplacement where heat from the intrusions melted country rocks resulting in extensive contamination ofthe monzonite. ?? 1981.

  13. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  14. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    PubMed

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  15. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  16. Effects of shallow basaltic intrusion into pyroclastic deposits, Grants Ridge, New Mexico, USA

    NASA Astrophysics Data System (ADS)

    WoldeGabriel, Giday; Keating, Gordon N.; Valentine, Greg A.

    1999-10-01

    A localized aureole up to 10 m wide developed around a 150-m-wide, 2.6 Ma basaltic plug at Grants Ridge, New Mexico. The plug intruded into nonwelded, pumice-rich compositionally homogenous tuff and volcaniclastic sediments of similar age (3.3 Ma). Color variation (pinkish to orange), strong local contact welding, brecciation, partial melting, and stoping characterize the host rock within the contact zone. Despite the high-temperature basaltic intrusion, there is no indication of extensive fluid-driven convective heat transfer and pervasive hydrothermal circulation and alteration of the country rock. The proportion of volcanic glass, loss on ignition (LOI), fluorine, iron, and some trace and rare earth element contents in the host rocks are somewhat depleted at the contact of the intrusion. Conversely, the degree of devitrification and the potassium content are higher along the contact. Vapor-phase expulsion of elemental species as complexes of fluoride, chloride, hydroxide, sulfide, and carbon dioxide may have been responsible for the minor depletion of the elements during the devitrification of silicic glass at near-solidus temperature related to the basaltic intrusion. The results of finite-difference numerical modeling of the intrusion as a dry, conduction-dominated system agree well with geochemical and mineralogical data. Contact welding of the host rocks apparently occurred at temperatures >700°C under a density-driven lateral load of approximately 1 MPa, corresponding to the observed depth below the former ground surface of ˜100 m. Other physical changes in the first 10 m of host rock, represented by partial devitrification and color changes, apparently occurred at temperatures of 500-600°C, which probably persisted for up to 55 years after the emplacement of the basaltic plug. Devitrification is generally enhanced by the presence of aqueous fluids; however, the abundance of volcanic glass within a short distance (˜10 m) from the plug is consistent with

  17. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probabilitymore » function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.« less

  18. Petrography, geochemistry, and U-Pb geochronology of pegmatites and aplites associated with the Alvand intrusive complex in the Hamedan region, Sanandaj-Sirjan zone, Zagros orogen (Iran)

    NASA Astrophysics Data System (ADS)

    Sepahi, Ali Asghar; Salami, Sedigheh; Lentz, David; McFarlane, Christopher; Maanijou, Mohammad

    2018-04-01

    The Alvand intrusive complex in the Hamedan area in Iran is in the Sanandaj-Sirjan zone of the Zagros orogen. It consists of a wide range of plutonic rocks, mainly gabbro, diorite, granodiorite, granite, and leucogranites that were intruded by aplitic and pegmatitic dykes. At least three successive magmatic episodes generated an older gabbro-diorite-tonalite assemblage, followed by a voluminous granodiorite-granite association, which was then followed by minor leucocratic granitoids. Aplitic and pegmatitic dykes and bodies have truncated both plutonic rocks of the Alvand intrusive complex and its metamorphic aureole. Chemically they belong to peraluminous LCT (Li-, Cs-, and Ta-bearing) family of pegmatites. Mineralogically, they resemble Muscovite (MS) and Muscovite Rare Element (MSREL) classes of pegmatites. High amounts of some elements, such as Sn (up to 10,000 ppm), Rb (up to 936 ppm), Ba (up to 706 ppm), and LREE (up to 404 ppm) indicate the highly fractionated nature of some of these aplites and pegmatites. U-Pb dating of monazite, zircon, and allanite by LA-ICPMS indicate the following ages: monazite-bearing aplites of Heydareh-e-Poshteshahr and Barfejin areas, southwest of Hamedan, give an age range of 162-172 Ma; zircon in Heydareh-e-Poshteshar gives an average age of 165 Ma and for allanite-bearing pegmatites of Artiman area, north of Tuyserkan, an age of 154.1 ± 3.7 Ma was determined. These overlap with previously reported ages (ca. 167-153 Ma) for the plutonic rocks of the Alvand complex. Therefore, these data reveal that the Jurassic was a period of magmatism in the Hamedan region and adjacent areas in the Sanandaj-Sirjan zone, which was situated at the southern edge of the central Iranian micro-plate (southern Eurasian plate) at this time. Our results also suggest that advective heating in a continental arc setting has caused melting of fertile supracrustal lithologies, such as meta-pelites. These partial melts were then emplaced at much higher

  19. Paleomagnetism of the Permian-Triassic intrusions from the Tunguska syncline and the Angara-Taseeva depression, Siberian Traps Large Igneous Province: Evidence of contrasting styles of magmatism

    NASA Astrophysics Data System (ADS)

    Latyshev, A. V.; Veselovskiy, R. V.; Ivanov, A. V.

    2018-01-01

    Based on the detailed paleomagnetic investigation, we distinguished different styles of intrusive magmatic activity in two regions of the Siberian Traps Large Igneous Province (LIP). The emplacement of intrusions in the Angara-Taseeva depression (the southern periphery of the Siberian Traps LIP) occurred as brief but intense bursts of magmatic activity that led to the emplacement of large and extensive sills. We argue that this pulsating style of intrusive magmatic activity is common for the margins of the Siberian Traps LIP. We also estimated the duration of the main magmatic events as < 104-105 years for the large sills and their area of manifestation (> 200-250 km in diameter and dozens of thousands km2 in square). On the contrary, in the central part of the Siberian Traps LIP (the Tunguska syncline) the intrusive magmatism was more or less continuous without intense peaks of magmatic activity. Furthermore, we obtained the first reliable magnetostratigraphic data from the volcanic section of the Tunguska syncline. Finally, we analyzed the available paleomagnetic and geochronological data from the Siberian platform and suggested the correlation scheme of the studied intrusive complexes with the volcanic sequences of the Siberian Traps LIP.

  20. Effect of winds and waves on salt intrusion in the Pearl River estuary

    NASA Astrophysics Data System (ADS)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  1. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    PubMed

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  2. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    PubMed Central

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  3. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    PubMed

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  4. Linking magnetic fabric and cumulate texture in layered mafic-ultramafic intrusions (Invited)

    NASA Astrophysics Data System (ADS)

    O Driscoll, B.; Stevenson, C.; Magee, C.

    2013-12-01

    Research on the magnetic fabrics of igneous rocks, pioneered by Balsley and Buddington[1] and Khan[2], has greatly contributed to our understanding of magma dynamics in lava flows, sheet intrusions and plutons over the past five decades. However, considerably few magnetic fabric studies have focused on layered mafic-ultramafic intrusions, particularly ';lopolithic' intrusions, despite the fact that such rocks may preserve a large range of small-scale kinematic structures potentially related to important magma chamber processes. This may be partly due to the fact that mafic-ultramafic cumulates commonly exhibit visible planar fabrics (mineral lamination), as well as compositional layering, in contrast to the frequent absence of such features in granite bodies or fine-grained mafic lava flows. Indeed, debates in the 1970s and 1980s on the development of layering and mineral fabrics in mafic-ultramafic intrusions, focused around the crystal settling versus in situ crystallisation paradigms, are classic in the subject of igneous petrology. Central to these debates is the notion that a wide range of magma chamber processes occur in layered mafic-ultramafic intrusions that are not frequently considered to occur in their relatively viscous granitic counterparts; in essence, the latter have historically been viewed as much more likely to ';freeze-in' a primary magma flow fabric whilst mafic-ultramafic intrusions are subjected to a more protracted solidification history. This wide array of potential initial sources for layering and mineral fabrics in layered mafic-ultramafic intrusions, together with the possible modification of textures at the postcumulus stage, demands a cautious application of any fabric analysis and presents a problem well-suited to interrogation by the AMS technique. The purpose of this contribution is to provide specific context on the application of AMS to elucidating the formation of cumulates in layered mafic-ultramafic intrusions. Examples of AMS

  5. A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Youssef, Tarek; El Hariri, Mohammad; Habib, Hani

    Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware tomore » trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.« less

  6. Intrusions and provoked and spontaneous confabulations on memory tests in Korsakoff's syndrome.

    PubMed

    Rensen, Yvonne C M; Oosterman, Joukje M; Walvoort, Serge J W; Eling, Paul A T M; Kessels, Roy P C

    2017-03-01

    Intrusions on verbal memory tests have been used as an index for clinical confabulation. Severe memory impairments in combination with executive dysfunction have been suggested to be the underlying mechanism of confabulation, but to date, this relation is unclear. The aim of this study was (a) to examine the relation between (different types of) intrusions and confabulations in a large sample of confabulating patients with Korsakoff's syndrome (KS) and (b) to investigate whether different measures of executive functioning and memory performance are related to provoked and spontaneous confabulation. The Dutch version of the California Verbal Learning Test (CVLT) and various executive function and memory tests were administered to a group of 51 confabulating patients with KS. Professional caregivers rated the severity of provoked and spontaneous confabulation behavior of the patients using the Nijmegen-Venray Confabulation List-20 (NVCL-20). The total number of intrusions on the CVLT was not related to either provoked or spontaneous confabulation scores. None of the CVLT intrusion scores correlated significantly with any of the confabulation scores, but we did find small-to-medium, positive correlations between unrelated intrusions and both provoked confabulations and spontaneous confabulation. Provoked confabulation behavior was associated with executive dysfunction and poorer memory performances. Spontaneous confabulation was not related to performance on measures of executive function and memory. The total number of intrusions on verbal memory tests and clinical confabulations appear to be different phenomena. Only unrelated intrusions produced on the CVLT might possibly be related to confabulations. The production of provoked, but not spontaneous, confabulation is associated with executive dysfunction and memory deficits.

  7. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    PubMed

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  8. The Uitkomst intrusion and Nkomati Ni-Cu-Cr-PGE deposit, South Africa: trace element geochemistry, Nd isotopes and high-precision geochronology

    NASA Astrophysics Data System (ADS)

    Maier, W. D.; Prevec, S. A.; Scoates, J. S.; Wall, C. J.; Barnes, S.-J.; Gomwe, T.

    2018-01-01

    The Uitkomst intrusion is a tubular mafic-ultramafic layered body that hosts one of South Africa's largest Ni-Cu-Cr-PGE deposits, Nkomati. The sulphide ore occurs in the form of massive lenses in the immediate quartzitic footwall and as disseminations within peridotite. The chromite ore forms an up to ˜10-m-thick layer in the lower portion of the intrusion. Uitkomst has generally been interpreted as a magma conduit, possibly related to the Bushveld event. Here, we present a new high-precision U-Pb zircon date of 2057.64 ± 0.69 Ma that overlaps with the age of the Merensky Reef of the Bushveld Complex and thus demonstrates a coeval relationship between the intrusions. Based on incompatible trace elements as well as O- and Nd isotope data (ɛNd -4.5 to -6.2), we show that the Uitkomst parent magmas were contaminated with up to 20% Archean upper crust prior to emplacement, and with up to 15% dolomitic country rock during emplacement. Ore formation at Nkomati was critically aided by substantial devolatisation and removal of dolomitic floor rocks leading to hydrodynamic concentration of sulphide and chromite during slumping of crystal mushes into the trough-like centre of the subsiding intrusion and its footwall.

  9. Geology of the ultrabasic to basic Uitkomst complex, eastern Transvaal, South Africa: an overview

    NASA Astrophysics Data System (ADS)

    Gauert, C. D. K.; De Waal, S. A.; Wallmach, T.

    1995-11-01

    The Uitkomst complex in eastern Transvaal, South Africa, is a mineralized, layered ultrabasic to basic intrusion of Bushveld complex age (2.05-2.06 Ga) that intruded into the sedimentary rocks of the Lower Transvaal Supergroup. The complex is situated 20 km north of Badplaas. It is elongated in a northwesterly direction and is exposed over a total distance of 9 km. The intrusion is interpreted to have an anvil-shaped cross-section with a true thickness of approximately 800 m and is enveloped by metamorphosed and, in places, brecciated country rocks. Post-Bushveld diabase intrusions caused considerable vertical dilation of teh complex. The complex consists of six lithological units (from bottom to top): Basal Gabbro, Lower Harzburgite, Chromitiferous Harzburgite, Main Harzburgite, Pyroxenite and Gabbronorite. The Basal Gabbro Unit, developed at the base of the intrusion and showing a narrow chilled margin of 0.2 to 1.5 m against the floor rocks, has an average thickness of 6 m and grades upwards into the sulphide-rich and xenolith-bearing sequence of the Lower Harzburgite Unit. The latter unit averages 50 m in thickness and is gradationally overlain by the chromite-rich harzburgite of the Chromitiferous Harzburgite Unit (average thickness 60 m). Following on from the Chromitiferous Harzburgite Unit is the 330 m thick Main Harzburgite Unit. The Pyroxenite and Gabbronorite Units (total combined thickness of 310 m) form the uppermost formations of the intrusion. The three lower lithological units, Basal Gabbro to Chromitiferous Harzburgite, are highly altered by late magmatic, hydrothermal processes causing widespread serpentinization, steatitization, saussuritization and uralitization. Field relations, petrography and mineral and whole rock chemistry suggest the following sequence of events, The original emplacement of magma took place from northwest to southeast. The intrusion was bounded between two major fracture zones that gave rise to an elongated body, which

  10. Perimeter intrusion detection and assessment system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  11. JOHNSON AND ETTINGER (1991) VAPOR INTRUSION MODEL WITH SUB-SLAB CONCENTRATION

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is known as vapor intrusion (VI). Under certain circumstances, people living in homes above contaminated soil or ground water may be exposed to harmful levels of these vapors. Vapor intrusion is a part...

  12. Reducing depressive intrusions via a computerized cognitive bias modification of appraisals task: developing a cognitive vaccine.

    PubMed

    Lang, Tamara J; Moulds, Michelle L; Holmes, Emily A

    2009-02-01

    A feature of depression is the distressing experience of intrusive, negative memories. The maladaptive appraisals of such intrusions have been associated with symptom persistence. This study aimed to experimentally manipulate appraisals about depressive intrusions via a novel computerized cognitive bias modification (CBM) of appraisals paradigm, and to test the impact on depressive intrusion frequency for a standardized event (a depressive film). Forty-eight participants were randomly assigned to either a session of positive or negative CBM. Participants then watched a depressing film (including scenes of bereavement and bullying) and subsequently monitored the occurrence of depressive intrusions related to the film in a diary for one week. At one-week follow-up, participants completed additional measures of intrusions--the Impact of Event Scale (IES) and an intrusion provocation task. As predicted, compared to the negative condition, participants who underwent positive CBM showed a more positive appraisal bias. Further, one week later, positive CBM participants reported fewer intrusions of the film and had lower IES scores. Our findings demonstrate that it is possible to manipulate maladaptive appraisals about depressive intrusions via a computerized CBM task. Further, this effect transfers to reducing intrusive symptomatology related to a standardized event (a depressive film) over one week, suggesting novel clinical implications.

  13. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    PubMed

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  14. Development of a complex groundwater model to assess the relation among groundwater resource exploitation, seawater intrusion and land subsidence

    NASA Astrophysics Data System (ADS)

    Hsi Ting, Fang; Yih Chi, Tan; Chen, Jhong Bing

    2016-04-01

    The land subsidence, which is usually irreversible, in Taiwan Pintung Plain occurred due to groundwater overexploitation. Many of the land subsidence areas in Taiwan are located in coastal area. It could not only result in homeland loss, but also vulnerability to flooding because the function of drainage system and sea wall are weakened for the lowered ground surface. Groundwater salinization and seawater intrusion could happen more easily as well. This research focuses on grasping the trend of environmental change due to the damage and impact from inappropriate development of aquaculture in the last decades. The main task is developing the artificial neural networks (ANNs) and complex numerical model for conjunctive use of surface and groundwater which is composed of a few modules such as land use, land subsidence, contamination transportation and etc. An approach based on self-organizing map (SOM) is proposed to delineate groundwater recharge zones. Several topics will be studied such as coupling of surface water and groundwater modeling, assessing the benefit of improving groundwater resources by recharge, identifying the improper usage of groundwater resources, and investigating the effect of over-pumping on land subsidence in different depth. In addition, a complete plan for managing both the flooding and water resources will be instituted by scheming non-engineering adaptation strategies for homeland planning, ex. controlling pumping behavior in area vulnerable to land subsidence and increasing groundwater recharge.

  15. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    DOE PAGES

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-flymore » during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.« less

  16. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  17. An Excel Macro to Plot the HFE-Diagram to Identify Sea Water Intrusion Phases.

    PubMed

    Giménez-Forcada, Elena; Sánchez San Román, F Javier

    2015-01-01

    A hydrochemical facies evolution diagram (HFE-D) is a multirectangular diagram, which is a useful tool in the interpretation of sea water intrusion processes. This method note describes a simple method for generating an HFE-D plot using the spreadsheet software package, Microsoft Excel. The code was applied to groundwater from the alluvial coastal plain of Grosseto (Tuscany, Italy), which is characterized by a complex salinization process in which sea water mixes with sulfate or bicarbonate recharge water. © 2014, National GroundWater Association.

  18. Effects of intrusions on grades and contents of gold and other metals in volcanogenic massive sulfide deposits

    USGS Publications Warehouse

    Singer, Donald A.; Berger, Vladimir; Mosier, Dan L.

    2011-01-01

    The reason some VMS deposits contain more gold or other metals than others might be due to the influence of intrusions. A new approach examining this possibility is based on examining the information about many VMS deposits to test statistically if those with associated intrusions have significantly different grades or amounts of metals. A set of 632 VMS deposits with reported grades, tonnages, and information about the observed presence or absence of subvolcanic or plutonic intrusive bodies emplaced at or after VMS mineralization is statistically analyzed.Deposits with syn-mineralization or post-mineralization intrusions nearby have higher tonnages than deposits without reported intrusions, but the differences are not statistically significant. When both kinds of intrusions are reported, VMS deposit sizes are significantly higher than in the deposits without any intrusions. Gold, silver, zinc, lead, and copper average grades are not significantly different in the VMS deposits with nearby intrusions compared to deposits without regardless of relative age of intrusive. Only zinc and copper contents are significantly higher in VMS deposits with both kinds of intrusive reported. These differences in overall metal content are due to significantly larger deposit sizes of VMS deposits where both intrusive kinds are observed and reported, rather than any difference in metal grades.

  19. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  20. Alerts Visualization and Clustering in Network-based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administratormore » with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.« less

  1. The Effects of Saltwater Intrusion to Flood Mitigation Project

    NASA Astrophysics Data System (ADS)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  2. Imaging Saltwater Intrusion Along the Coast of Monterey Bay Using Long-Offset Electrical Resistivity Tomography

    NASA Astrophysics Data System (ADS)

    Goebel, M.; Knight, R. J.; Pidlisecky, A.

    2016-12-01

    Coastal regions represent a complex dynamic interface where saltwater intrusion moves seawater landward and groundwater discharge moves freshwater seaward. These processes can have a dramatic impact on water quality, affecting both humans and coastal ecosystems. The ability to map the subsurface distribution of fresh and salt water is a critical step in predicting and managing water quality in coastal regions. This is commonly accomplished using wells, which are expensive and provide point information, which may fail to capture the spatial complexity in subsurface conditions. We present an alternate method for acquiring data, long-offset Electrical Resistivity Tomography (ERT), which is non-invasive, cost effective, and can address the problem of poor spatial sampling. This geophysical method can produce continuous profiles of subsurface electrical resistivity to a depth of 300 m, with spatial resolution on the order of tens of meters. Our research focuses on the Monterey Bay region, where sustained groundwater extraction over the past century has led to significant saltwater intrusion. ERT was acquired along 40 kilometers of the coast using the roll along method, allowing for continuous overlap in data acquisition. Electrodes were spaced every 22.2 m, with a total of 81 electrodes along the 1.8 km active cable length. The data show a complex distribution of fresh and salt water, influenced by geology, groundwater pumping, recharge, and land-use. While the inverted ERT resistivity profiles correspond well with existing data sets and geologic interpretations in the region, the spatial complexity revealed through the ERT data goes beyond what is known from traditional data sources alone. This leads us to conclude that this form of data can be extremely useful in informing and calibrating groundwater flow models, making targeted management decisions, and monitoring changes in subsurface salinities over time.

  3. Quantification of the Intrusion Process at Kïlauea Volcano, Hawai'I

    NASA Astrophysics Data System (ADS)

    Wright, T. L.; Marsh, B. D.

    2014-12-01

    Knowing the time between initial intrusion and later eruption of a given volume of differentiated magma is key to evaluating the connections among magma transport and emplacement, solidification and differentiation, and melt extraction and eruption. Cooling rates for two Kïlauea lava lakes as well as known parent composition and residence times for intrusions that resulted in fractionated lavas later erupted on the East Rift Zone in 1955 (34 years) and 1977 (22 years) allow intrusion dimensions to be calculated. We model intrusions beneath Kïlauea's East Rift Zone near their point of separation from the magma transport path at ~ 5 km depth using Jaeger's (1957) method calibrated against Alae and Makaopuhi lava lakes with wallrock temperatures above the curie point at 450-550°C. Minimum thicknesses of 50-70 meters are found for intrusions that fed the two fractionated lavas, as well as for long-lived magma bodies identified from geodetic monitoring during many East Rift eruptions. These intrusions began as dikes, but probably became sills or laccolithic bodies that remained near the transport path. Short-lived intrusions also arrested near the magma transport path, but that retain a dike geometry, are hypothesized to serve as a trigger for the small but discrete increments of seaward movement on Kïlauea's south flank that characterize slow-slip earthquakes. Two additional thoughts arise from the quantitative modeling of magma cooling. First, long-term heating of the wallrock surrounding the horizontal East Rift Zone transport path slows the rate of cooling within the conduit, possibly contributing to the longevity of the East Rift eruption that began in 1983. Second, the combined effects of heating of the wall rock and ever-increasing magma supply rate from the mantle may have forced breakdown and widening of the vertical transport conduit, which could explain the 5-15-km deep long-period earthquake swarms beneath Kīlauea's summit between 1987 and 1992.

  4. Genetic relationship between deformation and low-Ca content in olivine from magmatic systems: evidence from the Poyi ultramafic intrusion, NW China

    NASA Astrophysics Data System (ADS)

    Yao, Zhuo-sen; Qin, Ke-zhang; Xue, Sheng-chao

    2017-12-01

    The deformation features (e.g., undulose extinction and subgrain boundaries) and low Ca content (<1000 ppm) of high-Fo olivine have been widely used as indictors for the mantle origin of olivine in the past. However, grains with these characteristics are also found in some crustal intrusions, e.g., Duke Island and Bushveld complexes. Here, we study this type of olivine in the Poyi ultramafic intrusion, NW China, to trace the formation of these unusual features in magmatic systems. As a result of the possible Ca-depleted parental melt and low Ca olivine/melt partition coefficient, olivine from the Poyi intrusion is extremely depleted in Ca. On the other hand, it has been confirmed that trace elements with large ionic radii (e.g., Ca2+ and Al3+) are chemically segregated at the grain boundary of olivine, exerting a dragging influence on grain boundary processes (named as solute drag effect). In this regard, the low Ca content in olivine weakens the solute drag effect, and in doing so it enhances the rate and strength of grain deformation, which occurs to accommodate the stress derived by fast compaction of the crystal mush in Poyi intrusion. Therefore, there is a genetic relationship between the plastic deformation and low Ca content in olivines from magmatic cumulates, and this link is one of the reasons causing the widespread deformation observed in Ca-depleted olivine from Poyi and other intrusions. What is more important, this work fills the gaps in the interpretation of this type of olivine in volcanic rocks.

  5. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    NASA Astrophysics Data System (ADS)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  6. ON-LINE CALCULATOR: VAPOR INTRUSION MODELING

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is called vapor intrusion (VI). Volatile organic chemicals in contaminated soils or groundwater can emit vapors, which may migrate through subsurface soils and may enter the indoor air of overlying build...

  7. Work Zone Intrusion Report Interface Design

    DOT National Transportation Integrated Search

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  8. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  9. ASSESSMENT OF VAPOR INTRUSION USING INDOOR AND SUB-SLAB AIR SAMPLING

    EPA Science Inventory

    The objective of this investigation was to develop a method for evaluating vapor intrusion using indoor and sub-slab air measurement and at the same time directly assist EPA’s New England Regional Office in evaluating vapor intrusion in 15 homes and one business near the former R...

  10. Iron Hill (Powderhorn) carbonatite complex, Gunnison County, CO - A potential source of several uncommon mineral resources

    USGS Publications Warehouse

    Van Gosen, B. S.; Lowers, H.A.

    2007-01-01

    The Iron Hill (Powderhorn) carbonatite complex is a 31-kM2 (12-sq mile) alkalic intrusion located about 35 km (22 miles) south-southwest of Gunnison, CO. The intrusion has been well studied and described because of its classic petrology and architecture ofa carbonatite-alkalic complex. The complex is also noteworthy because it contains enrichments of titanium, rare earth elements, thorium, niobium (columbium), vanadium and deposits of vermiculite and nepheline syenite. In particular, the complex is thought to host the largest titanium and niobium resources in the United States, although neither has been developed. It may be economic to extract multiple resources from this complex with a well-coordinated mine and mill plan.

  11. Mantle reservoirs (EM-1, OIB, E-MORB and N-MORB), long duration and polystages history for PGE-bearing paleoproterozoic layered intrusions in the N-E part of Fennoscandian Shield.

    NASA Astrophysics Data System (ADS)

    Bayanova, Tamara; Nerovich, Ludmila; Serov, Pavel; Kunakkuzin, Evgeniy; Elizarov, Dmitriy

    2015-04-01

    Paleoproterozoic layered PGE -bearing intrusions located in the N-E part of the Fennoscandian Shield and have a total are about 2000 km2. Long multidisciplinary studies using isotope Nd-Sr, U-Pb and 3He/4He systematics permit create a big bank of geochemistry data for different part of the intrusions: barren and main Cu-Ni-Cr-Ti-V and PGE phases, dykes complexes and host rocks. Based on U-Pb isotope data (on baddeleyite and zircon) and Sm-Nd mineral isochrones (on rock-forming and sulphides minerals) there is distinguished long magmatic duration from 2.53 to 2.40 Ga. Using precise U-Pb and Sm-Nd data for different part of the intrusions there are established four main impulses: 2.53, 2.50, 2.45, and 2.40 Ga of magmatic (LIP) activities for gabbronorite, anothosite et.set. rocks. The primary reservoir for all precious and multimetal massifs are considered as enriched mantle EM-1 using ɛNd- ISr system with negative ɛNd values and low ISr data for whole rocks of the intrusions. Dyke complexes are presented as three groups: high Ti-ferrodolerites, low Ti and low Fe-gabbronorites. Complex isotope (U-Pb, Sm-Nd) and geochemistry (REE, ɛNd, ISr) data investigations reflect OIB, E-MORB and N-MORB reservoirs for its origin (Nerovich et all., 2014). Isotope 3He/4He and 3He concentrations for accessory minerals ( ilmenite, magnetite et. set ) from the layered paleoproterozoic intrusions reflect significant lower mantle component and upper mantle contribution. According to the model of binary mixing (Jahn et all, 2000) there were calculated mantle and core component into plume magmatic reservoir connected with the origin of the PGE paleoproterozoic intrusions. The mantle contributions lie in the interval from 85 to 93% and core component are very less. All investigations are devoted to memory of academician RAS, professor F.Mitrofanov (Russia), he was a leader of scientific school for geology, geochemistry and metallogenesis of ore deposits. The studies are

  12. Accounting for intrusive thoughts in PTSD: Contributions of cognitive control and deliberate regulation strategies.

    PubMed

    Bomyea, Jessica; Lang, Ariel J

    2016-03-01

    Persistent, trauma-related intrusive thoughts are common in individuals with posttraumatic stress disorder (PTSD). Automatic aspects of cognitive functioning (including executive functioning) and maladaptive deliberate attempts at cognitive regulation have been proposed as individual difference factors that may perpetuate intrusive thoughts. The current study sought to examine the joint contribution of these two factors on intrusive thoughts in PTSD. Forty-two women with PTSD completed an executive functioning assessment followed by a thought suppression task. Intrusive thoughts (frequency and duration), as well as participants' use of specific cognitive regulation strategies (avoidance-based thought regulation strategies; TRS), were measured during the task. Hierarchical linear regression was used to examine the interaction of executive functioning and TRS on intrusive thoughts. Greater use of TRS was associated with greater intrusive thought persistence for those with low executive functioning, but not those with high executive functioning. Data was collected cross-sectionally and the laboratory thought suppression task may not correspond to naturalistic thought regulation. Results are consistent with prior literature suggesting that certain responses deployed by individuals to control intrusive thoughts may be unhelpful, but that a higher level of cognitive capacity may mitigate this effect. Implications of these findings for recent models of cognition in PTSD are discussed. Published by Elsevier B.V.

  13. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is crediblemore » as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required.« less

  14. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  15. Attenuating fearful memories: effect of cued extinction on intrusions.

    PubMed

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  16. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    PubMed

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  17. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms

    PubMed Central

    James, Ella L.; Bonsall, Michael B.; Hoppitt, Laura; Tunbridge, Elizabeth M.; Geddes, John R.; Milton, Amy L.

    2015-01-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind’s eye and cause distress. We investigated whether reconsolidation—the process during which memories become malleable when recalled—can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. PMID:26133572

  18. Reassessment of the volume of the Las Aguilas mafic-ultramafic intrusives, San Luis, Argentina, based on an alternative geophysical model

    NASA Astrophysics Data System (ADS)

    Claudia, Zaffarana; Silvana, Geuna; Stella, Poma; Alberto, Patiño Douce

    2011-10-01

    In the Sierra de San Luis, Central Argentina, a belt of small and discontinuous lenses of mafic-ultramafic rocks intrude a polydeformed basement and are thought to be the cause of a local increase of the metamorphic grade from amphibolite to granulite facies conditions. This assumption was especially based on forward modelling of a huge gravity anomaly centered over the Sierra de San Luis, which lead some workers to think that a vast volume of mafic-ultramafic rocks lay in shallow levels. Here, we propose an alternative model to explain this anomaly, in which the mafic-ultramafic intrusion is not the ultimate source. Therefore, there is no need to propose a bigger size than that observed in outcrops for the mafic-ultramafic bodies. The thermal effect of the emplacement of mafic-ultramafic sills and dikes on the host rocks was estimated applying a simple analytical solution (error function) for heating of a semi-infinite half space (the country rocks) in contact with a hotter sheet of finite thickness (the mafic-ultramafic intrusion). Results indicate that the effect of the intrusion of these hot mafic magmas is local, because beyond a few hundred meters from the contact zone temperatures never exceed 600 °C, and a few km from the intrusion they barely increase 50 °C relative to the initial temperature. These results, together with the preservation of primary igneous characteristics (such as rhythmic layering) being overprinted by metamorphic textural changes, indicate that the intrusion occurred before regional deformation. It is suggested that the thermal anomaly in the Pringles Metamorphic Complex could have been mainly caused by factors inherent to their geodynamic setting.

  19. A new interpretation of the structure of the Sept Iles Intrusive suite, Canada

    NASA Astrophysics Data System (ADS)

    Higgins, Michael D.

    2005-08-01

    The layered mafic intrusion at Sept Iles, Canada, is one of the largest intrusions in the world. A new interpretation of its structure is proposed, based on a review of its geology and a comparison with the Skaergaard intrusion, Greenland. Several different magmatic components are recognized; hence the name Sept Iles Intrusive suite (SIIS) is proposed. Emplacement of the suite may have been preceded by eruption of flood basalts. The first magmas of the suite rose in the crust to accumulate beneath the density filter afforded by the basalts. The largest component is the Sept Iles Mafic intrusion (SIMI). The Lower series of the SIMI is dominated by leucotroctolites and leucogabbros. Above it lie the Layered series, which is largely comprised of gabbro and troctolite. Both these units are unchanged from earlier interpretations. The anorthosites (s.l.), gabbros and monzogabbros, formerly called the Transitional series, are now considered to be the Upper Border series, developed by floatation of plagioclase. Common autoliths in the Layered series are parts of the hydrothermally altered Upper Border series from towards the interior of the intrusion, which have foundered and settled through the magma. The contamination of the magma that accompanied this event oxidised iron in the magma and led to the precipitation of magnetite around the periphery of the intrusion. The subsequent depletion of Fe 3+ and/or increase in SiO 2, CaO and P 2O 5 may have induced apatite saturation and accumulation to form two layers rich in apatite, near the base and at top of the Layered series. Granitic magma was developed by fractional crystallisation and was emplaced along the roof of the chamber, where it acquired large quantities of xenoliths. These were probably derived from the flood basalts, their evolved members and fragments of mafic dykes chilled by the granitic magma. Accumulations of monzonite pillows in this unit testify to another magmatic event and a floor to the granitic magma

  20. Constraints on the Geometries and Compositions of Subvolcanic Conduits from Intrusions of the San Rafael Swell, Utah

    NASA Astrophysics Data System (ADS)

    Wetmore, P. H.; Connor, C.; Wilson, J.

    2010-12-01

    Conduit models incorporate varying degrees of complexity (or parsimony) and account for the transport properties of magmas, steady-state or transient behavior, and conduit geometry (e.g., 1- to 1.5 D, variable width and erodable conduit walls). Improvement of these models is important if we are to work toward deployment of eruption models at active volcanoes, link these models to geophysical observations (seismic, deformation, gravity) and eventually forecast eruption magnitude. One conclusion of a recent comparison of many conduit models (Sahagian, 2005 JVGR) is that next generation models need to better account for interaction of the erupting mixture with surrounding wall rocks (accounting for melting, solidification, and erosion) and better account for the effects of conduit shape on flows. In an effort to address these issues our research group has completed mapping of a suite of subvolcanic intrusions (dikes, sills, and conduits) from the west-central San Rafael Swell of central Utah. The results of this study demonstrate that vertical flow of melt through crust in this system of intrusion was dominated by dikes. Conduits form, in nearly all cases, as a result of localized flow along dikes. The conduits are commonly comprised of three distinct lithologic units: brecciated host rock (without any intrusive material), brecciated host rock mixed with brecciated and mechanically contaminated intrusive, and relatively clean (i.e. containing less than ~10% accidental material) intrusive. Contacts between all three of these units are typically discreet and traceable for several tens of meters. In some examples clasts within the unmixed breccia unit exhibit a strong alignment of clasts dipping into the core of the conduit. These observations suggests an evolutionary history that involves an early phase of brecciation and mixing, followed by confined flow with a fluidized mixed unit and an essentially uninvolved outer zone (i.e. the breccia). The final phase likely

  1. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    PubMed

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  2. The role of intrusions in the formation of Irish-type mineralisation

    NASA Astrophysics Data System (ADS)

    McCusker, Jim; Reed, Christopher

    2013-08-01

    The Stonepark Prospect is located in County Limerick, south-central Ireland. Multiple zones of Zn-Pb mineralisation have been identified at Stonepark and these are approximately 5 km west of the Pallas Green Prospect. At Stonepark, the sulphide bodies are hosted within the Waulsortian Limestone and closely resemble other Irish-type deposits. The mineralisation is composed of pyrite-marcasite, sphalerite and galena with gangue Fe-dolomite and calcite cements. A key difference at Stonepark is the presence of Chadian-aged volcanic rocks (Knockroe Volcanics) that intrude into and overlie the Waulsortian Limestone. Subsequent hydrothermal brecciation of the Waulsortian Limestone and Knockroe intrusions resulted in the formation of tabular polymict breccia bodies containing mixed carbonate and clasts of intrusive rocks. These have then been overprinted by massive sulphide mineralisation. Further syn-mineralisation brecciation has overprinted the earlier breccias. Drilling has demonstrated a spatial relationship between the volume of intrusive rocks (dykes and polymict breccias) and Zn-Pb mineralisation. This association suggests that the intrusive rocks provided a mechanism for the introduction of the mineralising fluids into the breccia bodies. This is significant as to date no large controlling fault has been identified, as is seen at other Irish-type deposits. Further work is required to understand the alteration process of the intrusive rocks and how this may relate to the mineralising process.

  3. Sill intrusion in volcanic calderas: implications for vent opening probability

    NASA Astrophysics Data System (ADS)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  4. Dating intrusion and cooling of Cenozoic granitoids in the Dinarides of Southern Serbia and discussion of the geodynamic setting of Paleocene-Miocene magmatism in the Balkan Peninsula

    NASA Astrophysics Data System (ADS)

    Senecio, Schefer; Cvetković, Vladica; Fügenschuh, Bernhard; Kounov, Alexandre; Ovtcharova, Maria; Schaltegger, Urs; Schmid, Stefan

    2010-05-01

    This paper presents the results of high precision single grain U-Pb dating and Hf isotope analyses of thermally annealed and chemically abraded zircons from the Kopaonik, Drenje, Željin, Golija and Polumir intrusions in the inner Dinarides of southern Serbia. In addition, new zircon and apatite fission-track data together with local structural observations, allow for constraining the subsequent exhumation history of these intrusions. Two age groups were determined for the granitoid intrusions: (i) Oligocene intrusive bodies (Kopaonik, Drenje, Željin) ranging in age from 31.7 to 30.6 Ma and (ii) Miocene Golija and Polumir intrusions which emplaced at 20.58-20.17 and 18.06-17.74 Ma, respectively. The apatite fission-track modelling combined with zircon central ages show rapid cooling from above 300 to ca. 80 °C between 16 and 10 Ma for granitoids of both age groups, followed by rather slow cooling to surface temperatures for the last 10 Ma. Fast Middle Miocene cooling between 16 and 10 Ma is caused by extensional exhumation of the plutons that are located in the footwall of core-complexes. This documents that Miocene magmatism and core-complex formation leading to formation of the Pannonian basin also affected a part of the mountainous areas of the internal Dinarides. The discussion of an extensive set of age data from the literature and the geodynamic setting of the Balkan Peninsula reveals that there is no direct connection of the Dinaridic Late Eocene to earliest Miocene magmatic belt with contemporaneous Periadriatic intrusions in the Alps and along the Mid-Hungarian fault zone as proposed in the literature. We insist on the fact that the subduction polarity in the Alps, including that within the Western Carpathians north of the Mid-Hungarian fault zone, is opposite to that of the Dinarides during the given time span. Instead, we propose that Late Eocene to Oligocene magmatism, which affects the Adria-derived lower plate units of the internal Dinarides, may be

  5. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    PubMed

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. A Citizen's Guide to Vapor Intrusion Mitigation

    EPA Pesticide Factsheets

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  7. Celebrating 50 years of SWIMs (Salt Water Intrusion Meetings)

    NASA Astrophysics Data System (ADS)

    Post, Vincent E. A.; Essink, Gualbert Oude; Szymkiewicz, Adam; Bakker, Mark; Houben, Georg; Custodio, Emilio; Voss, Clifford

    2018-06-01

    The Salt Water Intrusion Meetings, or SWIMs, are a series of meetings that focus on seawater intrusion in coastal aquifers and other salinisation processes. 2018 marks the 50th year of the SWIM and the 25th biennial meeting. The SWIM proceedings record half a century of research progress on site characterisation, geophysical and geochemical techniques, variable-density flow, modelling, and water management. The SWIM is positioning itself to remain a viable platform for discussing the coastal aquifer management challenges of the next 50 years.

  8. Posttraumatic Intrusion, Avoidance, and Social Functioning: A 20-Year Longitudinal Study

    ERIC Educational Resources Information Center

    Solomon, Zahava; Mikulincer, Mario

    2007-01-01

    The study assesses posttraumatic intrusion, avoidance, and social functioning among 214 Israeli combat veterans from the first Lebanon War with and without combat stress reaction (CSR) 1, 2, 3, and 20 years after the war. CSR veterans reported higher intrusion and avoidance than did non-CSR veterans. With time, there was a decline in these…

  9. Obsessive relational intrusion: incidence, perceived severity, and coping.

    PubMed

    Cupach, W R; Spitzberg, B H

    2000-01-01

    Two studies investigated the phenomenon of obsessive relational intrusion (ORI), defined as repeated and unwanted pursuit and invasion of one's sense of physical or symbolic privacy by another person, either stranger or acquaintance, who desires and/or presumes an intimate relationship. In Study 1, we sought to identify the incidence of a broad range of relationally intrusive behaviors, to identify the coping responses employed by victims of ORI, and to assess the associations between coping responses and ORI behaviors. Study 2 assessed the perceived degree of severity of ORI behaviors. Results revealed that each of 63 ORI behaviors was experienced by 3-78% of respondents in three different samples. Factor analysis revealed four types of ORI behavior: pursuit, violation, threat, and hyper-intimacy. Responses for coping with ORI consisted of interaction, protection, retaliation, and evasion. Virtually all intrusive behaviors were perceived to be annoying. Some types of ORI behaviors were perceived to be relatively more threatening, upsetting and privacy-invading than others. Although sex differences were not observed for the incidence of ORI or coping, women consistently perceived ORI behaviors to be more annoying, upsetting, threatening, and privacy-invading than did men.

  10. Using Unix system auditing for detecting network intrusions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators knowmore » what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.« less

  11. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida

    NASA Astrophysics Data System (ADS)

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett

    2016-08-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  12. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida.

    PubMed

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett

    2016-08-25

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  13. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida

    PubMed Central

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett

    2016-01-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer. PMID:27557803

  14. Geochemistry and mineralogy of the Dotson Zone HREE deposit in the Bokan Mountain peralkaline igneous complex, southeastern Alaska, USA

    USGS Publications Warehouse

    Taylor, Cliff D.; Lowers, Heather; Adams, David; Robinson, R. James

    2017-01-01

    The Bokan Mountain igneous complex (BMIC) is a typical example of a peralkaline intrusive system that has evolved to the point of developing late stage HFSE- and REE-rich silicic pegmatites and dikes. The Dotson Zone comprises a series of felsic dikes that extend from the southeast margin of the composite pluton and may represent an important resource of critical HREEs. Petrographically, the primary igneous mineral assemblage is altered by late-igneous and hydrothermal fluids resulting in redistribution and enrichment of REEs. An area of flexure in the southeastern end of the Dotson Zone was the primary locus of enrichment as shown by the pervasive alteration and consistently high REE+Y values. We favor a model in which the dikes were emplaced concurrently with the marginal intrusions, and then altered during emplacement of the inner, main intrusion in a relatively rapid series of overlapping intrusive and late magmatic fluid-high temperature hydrothermal events as the complex cooled. A much later sodic intrusive event focused on the BMIC may have resulted in additional silica-Na-Zr-rich alteration in proximity to the pluton.

  15. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability

    PubMed Central

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A.

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals. PMID:25814962

  16. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    PubMed

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  17. Climate variability modulates western US ozone air quality in spring via deep stratospheric intrusions

    PubMed Central

    Lin, Meiyun; Fiore, Arlene M.; Horowitz, Larry W.; Langford, Andrew O.; Oltmans, Samuel J.; Tarasick, David; Rieder, Harald E.

    2015-01-01

    Evidence suggests deep stratospheric intrusions can elevate western US surface ozone to unhealthy levels during spring. These intrusions can be classified as ‘exceptional events', which are not counted towards non-attainment determinations. Understanding the factors driving the year-to-year variability of these intrusions is thus relevant for effective implementation of the US ozone air quality standard. Here we use observations and model simulations to link these events to modes of climate variability. We show more frequent late spring stratospheric intrusions when the polar jet meanders towards the western United States, such as occurs following strong La Niña winters (Niño3.4<−1.0 °C). While El Niño leads to enhancements of upper tropospheric ozone, we find this influence does not reach surface air. Fewer and weaker intrusion events follow in the two springs after the 1991 volcanic eruption of Mt. Pinatubo. The linkage between La Niña and western US stratospheric intrusions can be exploited to provide a few months of lead time during which preparations could be made to deploy targeted measurements aimed at identifying these exceptional events. PMID:25964012

  18. Fronts and intrusions in the upper Deep Polar Water of the Eurasian and Makarov basins

    NASA Astrophysics Data System (ADS)

    Kuzmina, Natalia; Rudels, Bert; Zhurbas, Natalia; Lyzhkov, Dmitry

    2013-04-01

    CTD data obtained in the Arctic Basin are analyzed to describe structural features of intrusive layers and fronts encountered in the upper Deep Polar Water. This work is an extension of Arctic intrusions studies by Rudels et al. (1999) and Kuzmina et al. (2011). Numerous examples of fronts and intrusions observed in a deep layer (depth range of 600-1300 m) in the Eurasian and Makarov basins where salinity is increasing, and temperature is decreasing with depth (stable-stable thermohaline stratification), are described. The data are used to estimate hydrological parameters capable of determining different types of fronts and characterizing intrusive layers depending on the front structure. Coherence of intrusive layers is shown to get broken with the change of front structure. An evidence is found that enhanced turbulent mixing above local bottom elevations can prevent from intrusive layering. A linear stability model description of the observed intrusions is developed based on the Merryfield's (2000) assumption that interleaving is caused by differential mixing. Theoretical analysis is focused on prediction of the slopes of unstable modes at baroclinic and thermohaline fronts. Apparent vertical diffusivity due to turbulent mixing at baroclinic and thermohaline fronts is estimated on the basis of comparison of observed intrusion slopes with modeled slopes of the most unstable modes. Apparent lateral diffusivity is estimated too, based on Joyce (1980) approach. These estimates show that intrusive instability of fronts caused by differential mixing can result in sizable values of apparent lateral heat diffusivity in the deep Arctic layer that are quite comparable with those of the upper and intermediate Arctic layers (Walsh, Carmack, 2003; Kuzmina et al., 2011).

  19. The impact of dissociation on perceptual priming and intrusions after listening to auditory narratives.

    PubMed

    Dorahy, Martin J; Peck, Rowan K; Huntjens, Rafaele J C

    2016-01-01

    This study investigates the causal role of dissociation in intrusive memory development and possible underlying aberrant memory processes (e.g., increased perceptual priming). Using an audio-only adaption of the trauma film paradigm, we divided 60 participants into 3 conditions and presented them with different visual tasks-mirror staring, dot staring, or neutral images. The former 2 conditions were hypothesized to induce dissociation. Postaudio, a number of factors were assessed, including state dissociation, perceptual priming and conceptual priming, as well as intrusions over 3 days. Participants in the dissociation conditions displayed an increase in perceptual priming compared to those in the control condition and reported more distressing intrusions. No differences were found in conceptual priming and the overall number of intrusions between conditions. Findings contribute to the growing knowledge on the impact of dissociation and cognitive processing in the etiology of posttraumatic stress disorder intrusions.

  20. Comparison of intrusion effects on maxillary incisors among mini implant anchorage, j-hook headgear and utility arch.

    PubMed

    Jain, Ravindra Kumar; Kumar, Sridhar Prem; Manjula, W S

    2014-07-01

    Intrusion of maxillary incisors is one of the most important and difficult tooth movements to achieve as a part of orthodontic therapy. A variety of techniques were used in the past to intrude the maxillary incisors before the emergence of mini implants in Orthodontics. Mini implants are temporary anchorage devices used to produce various tooth movements. The research was carried out to evaluate and compare the efficiency of producing intrusion of maxillary incisors using mini implants, utility arch and j- hook headgear. The study was conducted on 30 subjects divided into 3 Groups equally. Group 1- mini implant anchorage, Group 2 - j- hooks headgear and Group 3- utility arch were used for intrusion of the maxillary incisors. Conventional lateral cephalograms were taken before treatment and at the end of intrusion. Five cephalometric parameters were used to measure the amount of intrusion attained in each Group. Intra Group comparisons were done using student t-test and inter Group comparisons were done using ANOVA The duration of intrusion was four months in all the three Groups. In Group 1 the mean average intrusion attained was 2.1 mm, the mean average intrusion attained in Group 2 was 0.7 mm, and the mean average intrusion achieved in Group 3 was 1.4 mm with a side effect of 0.75 mm of molar extrusion. Although, both mini implants and utility arch can be used to attain significant amounts of incisor intrusion but using mini implants will produce true intrusion without any other side effects.

  1. Water intrusion in thin-skinned composite honeycomb sandwich structures

    NASA Technical Reports Server (NTRS)

    Jackson, Wade C.; O'Brien, T. Kevin

    1988-01-01

    Thin-skinned composite honeycomb sandwich structures from the trailing edge of the U.S. Army's Apache and Chinook helicopters have been tested to ascertain their susceptibility to water intrusion as well as such intrusions' effects on impact damage and cyclic loading. Minimum-impact and fatigue conditions were determined which would create microcracks sufficiently large to allow the passage of water through the skins; damage sufficient for this to occur was for some skins undetectable under a 40X-magnification optical microscope. Flow rate was a function of moisture content, damage, applied strain, and pressure differences.

  2. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  3. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    NASA Astrophysics Data System (ADS)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  4. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  5. Time Dependent Model of Magma Intrusion in and around Miyake and Kozu Islands, Central Japan in June-August, 2000

    NASA Astrophysics Data System (ADS)

    Murase, M.; Irwan, M.; Kariya, S.; Tabei, T.; Okuda, T.; Miyajima, R.; Kimata, F.; Fujii, N.

    2004-12-01

    We discuss a time dependent model of magma intrusion in and around Miyake and Kozu Islands, Central Japan from GPS measurements at 28 sites in Miyake Island, Kozu Island and their surrounding islands in the period from June 27 to August 27, 2000. A dike complex model of three sheets is assumed between Miyake and Kozu Islands, suggested from the precise hypocenter distribution map (Sakai et al., 2003). Other dike intrusion models, a dike with an aseismic creep model (Nishimura et al.,2001; Furuya et al.,2003) and a dike with a deep deflation source model (Yamaoka et al., submitted) , are also discussed. Akaike's Information Criteria (AIC) value of optimal parameters of a dike complex model indicates lower than that of other two models. After fixing the geometry of three dikes using a genetic algorithm (GA), the amounts of dike openings of top, inside, and bottom of each dike are estimated by GA for seven time periods. In the period from June 27 to July 8, dike opening is concentrated in the dike near Miyake Island, and a large deflation is also estimated at a depth of 5 km of Miyake Volcano. It suggests that magma is supplied from the depths of Miyake Island. In next period until August 10, a huge dike intrusion is characterized in the dike near Kozu Island and the lower parts of dike in central and near Miyake Island. This suggests that magma is supplied from depth between Miyake and Kozu Islands. In the period of August 10 to 27, a huge deflation is estimated at a depth of 10 km under Miyake Volcano, and dike opening is limited

  6. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  7. Development and Application of a Three-Dimensional Finite Element Vapor Intrusion Model

    PubMed Central

    Pennell, Kelly G.; Bozkurt, Ozgur; Suuberg, Eric M.

    2010-01-01

    Details of a three-dimensional finite element model of soil vapor intrusion, including the overall modeling process and the stepwise approach, are provided. The model is a quantitative modeling tool that can help guide vapor intrusion characterization efforts. It solves the soil gas continuity equation coupled with the chemical transport equation, allowing for both advective and diffusive transport. Three-dimensional pressure, velocity, and chemical concentration fields are produced from the model. Results from simulations involving common site features, such as impervious surfaces, porous foundation sub-base material, and adjacent structures are summarized herein. The results suggest that site-specific features are important to consider when characterizing vapor intrusion risks. More importantly, the results suggest that soil gas or subslab gas samples taken without proper regard for particular site features may not be suitable for evaluating vapor intrusion risks; rather, careful attention needs to be given to the many factors that affect chemical transport into and around buildings. PMID:19418819

  8. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    NASA Astrophysics Data System (ADS)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  9. Mechanical response of the south flank of kilauea volcano, hawaii, to intrusive events along the rift systems

    USGS Publications Warehouse

    Dvorak, J.J.; Okamura, A.T.; English, T.T.; Koyanagi, R.Y.; Nakata, J.S.; Sako, M.K.; Tanigawa, W.T.; Yamashita, K.M.

    1986-01-01

    Increased earthquake activity and compression of the south flank of Kilauea volcano, Hawaii, have been recognized by previous investigators to accompany rift intrusions. We further detail the temporal and spatial changes in earthquake rates and ground strain along the south flank induced by six major rift intrusions which occurred between December 1971 and January 1981. The seismic response of the south flank to individual rift intrusions is immediate; the increased rate of earthquake activity lasts from 1 to 4 weeks. Horizontal strain measurements indicate that compression of the south flank usually accompanies rift intrusions and eruptions. Emplacement of an intrusion at a depth greater than about 4 km, such as the June 1982 southwest rift intrusion, however, results in a slight extension of the subaerial portion of the south flank. Horizontal strain measurements along the south flank are used to locate the January 1983 east-rift intrusion, which resulted in eruptive activity. The intrusion is modeled as a vertical rectangular sheet with constant displacement perpendicular to the plane of the sheet. This model suggests that the intrusive body that compressed the south flank in January 1983 extended from the surface to about 2.4 km depth, and was aligned along a strike of N66??E. The intrusion is approximately 11 km in length, extended beyond the January 1983 eruptive fissures, which are 8 km in length and is contained within the 14-km-long region of shallow rift earthquakes. ?? 1986.

  10. Mellin Transform-Based Correction Method for Linear Scale Inconsistency of Intrusion Events Identification in OFPS

    NASA Astrophysics Data System (ADS)

    Wang, Baocheng; Qu, Dandan; Tian, Qing; Pang, Liping

    2018-05-01

    For the problem that the linear scale of intrusion signals in the optical fiber pre-warning system (OFPS) is inconsistent, this paper presents a method to correct the scale. Firstly, the intrusion signals are intercepted, and an aggregate of the segments with equal length is obtained. Then, the Mellin transform (MT) is applied to convert them into the same scale. The spectral characteristics are obtained by the Fourier transform. Finally, we adopt back-propagation (BP) neural network to identify intrusion types, which takes the spectral characteristics as input. We carried out the field experiments and collected the optical fiber intrusion signals which contain the picking signal, shoveling signal, and running signal. The experimental results show that the proposed algorithm can effectively improve the recognition accuracy of the intrusion signals.

  11. Contact metamorphism, partial melting and fluid flow in the granitic footwall of the South Kawishiwi Intrusion, Duluth Complex, USA

    NASA Astrophysics Data System (ADS)

    Benko, Z.; Mogessie, A.; Molnar, F.; Severson, M.; Hauck, S.; Lechler, P.; Arehart, G.

    2012-04-01

    The footwall of the South Kawishiwi Intrusion (SKI) a part of the Mesoproterozoic (1.1 Ga) Duluth Complex consists of Archean granite-gneiss, diorite, granodiorite (Giant Range Batholith), thin condensed sequences of Paleoproterozoic shale (Virginia Fm.), as well as banded iron formation (Biwabik Iron Fm). Detailed (re)logging and petrographic analysis of granitic footwall rocks in the NM-57 drillhole from the Dunka Pit area has been performed to understand metamorphic processes, partial melting, deformation and geochemical characteristics of de-volatilization or influx of fluids. In the studied drillhole the footwall consists of foliated metagranite that is intersected by mafic (dioritic) dykes of older age than the SKI. In the proximal contact zones, in the mafic dykes, the orthopyroxene+clinopyroxene+plagioclase+quartz+Fe-Ti-oxide+hornblende±biotite porphyroblasts embedded in a plagioclase+K-feldspar+orthopyroxene+apatite matrix indicate pyroxene-hornfels facies conditions. Migmatitization is revealed by the euhedral crystal faces of plagioclase and pyroxene against anhedral quartz crystals in the in-situ leucosome and by the presence of abundant in-source plagioclase±biotite leucosome veinlets. Amphibole in the melanosome of mafic dykes was formed with breakdown of biotite and implies addition of H2O to the system during partial melting. Towards the deeper zones, the partially melted metatexite-granite can be characterized by K-feldspar+plagioclase+quartz+ortho/clinopyroxene+biotite+Fe-Ti-oxide+apatite mineral assemblage. The felsic veins with either pegmatitic or aplititic textures display sharp contact both to the granite and the mafic veins. They are characterized by K-feldspar+quartz±plagioclase±muscovite mineral assemblage. Sporadic occurrence of muscovite suggest local fluid saturated conditions. Emplacement of gabbroic rocks of the SKI generated intense shear in some zones of the granitic footwall resulting in formation of biotite-rich mylonites with

  12. Les intrusions de Wirgane (Haut Atlas occidental, Maroc): témoins d'un magmatisme syn- à tardi-cinématique hercynien? (Intrusions of Wirgane [western High Atlas, Morocco]: evidence for a syn- to late kinematic magmatism of Variscan age?)

    NASA Astrophysics Data System (ADS)

    Eddif, A.; Gasquet, D.; Hoepffner, C.; Ayad, N. Ait

    2000-11-01

    The Wirgane intrusives were emplaced into the Late Neoproterozoic to Palæozoic series of the northeast of the Moroccan western High Atlas. The intrusions exhibit a large compositional range from monzogabbro to granite, and they have suffered, together with the country rocks, part of the Variscan tectonic evolution. In the immediate vicinity of the intrusions, thermal metamorphism developed in the country rocks. According to the mineral chemistry of igneous amphibole compositions of diorites and metamorphic minerals, the depth of intrusives was estimated to be less than 11 km. Strain patterns, mapped in both the plutons and the country rocks, and microtectonic data indicate that the intrusions were emplaced in a dextral transcurrent shearing context during the Variscan Orogen. When compared with other intrusions of the western High Atlas (Tichka, Azegour), the Wirgane intrusives are considered to be related to the late stages of the Variscan Belt of Morocco.

  13. Intrusive Thoughts and Young Children's Knowledge about Thinking following a Natural Disaster

    ERIC Educational Resources Information Center

    Sprung, Manuel; Harris, Paul L.

    2010-01-01

    Background: "Hurricane Katrina" devastated the Mississippi Gulf Coast in August 2005. Intrusive re-experiencing is a common posttraumatic stress symptom. However, young children with limited introspection skills might have difficulties identifying their intrusive thoughts. Method: A sample of 165 5- to 9-year-old children were surveyed about their…

  14. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    PubMed Central

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field with scanning electron microscopy coupled to energy dispersive X-ray spectroscopy, chromatographic and spectrophotometric methods, and stable isotope tracing coupled with a mass balance of sulfur compounds. We found that Z. marina detoxified gaseous sediment-derived sulfide through incorporation and that most of the detoxification occurred in underground tissues, where sulfide intrusion was greatest. Elemental sulfur was a major detoxification compound, precipitating on the inner wall of the aerenchyma of underground tissues. Sulfide was metabolized into thiols and entered the plant sulfur metabolism as well as being stored as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments. PMID:26030258

  15. Magma intrusion and accumulation in the southern Altiplano: Structural observations from the PLUTONS project

    NASA Astrophysics Data System (ADS)

    West, M. E.; Christensen, D. H.; Pritchard, M. E.; Del Potro, R.; Gottsmann, J.; Unsworth, M.; Minaya, E.; Sunagua, M.; McNutt, S. R.; Yu, Q.; Farrell, A. K.

    2012-12-01

    The PLUTONS project is attempting to capture the process of magma intrusion and pluton formation, in situ, through multi-disciplinary study of known magmatic inflation centers. With support from the NSF Continental Dynamics program, and a sister project in the UK funded by NERC, two such centers are receiving focused study. Uturuncu volcano in the Altiplano of southern Bolivia is being investigated with combined seismics, magnetotellurics, geodesy, microgravity, geomorphology, petrology, geochemistry, historical studies and modeling. 350 km to the south, comparable investigations are targeting the Lastarria-Cordon del Azufre complex. Field studies are ongoing into 2013. In this presentation we highlight results from Uturuncu that bear on the crustal magmatic process. Seismic tomography, gravity and magnetotellurics indicate a complex structure in the upper 20 km with some evidence for partial melt. Seismic receiver functions indicate a layer of very low velocities across the region at 15-25 km depth that is almost certainly melt-rich. High conductivities corroborate the interpretation of a partial melt component to this layer. In addition to the throughgoing melt layer, seismic velocities and attenuation indicate shallow features above the melt body extending upward toward the surface. It is not clear whether these features are associated with recent uplift or are remnants from a previous period of activity. Uturuncu is seismically active with hundreds of locatable earthquakes each year. Seismic lineations and swarm behavior suggest that the seismicity reflects regional stress patterns. While there is little evidence that these earthquakes are the direct result of magmatic intrusion, the resulting high heat flow may be hastening existing strains.

  16. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    PubMed

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency During Early Childhood

    PubMed Central

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2012-01-01

    Longitudinal relations among ego-resiliency, effortful control, and observed intrusive parenting were examined at 18, 30, and 42 months of age (Ns = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted effortful control a year later, over and above earlier levels. Effortful control at 30 months mediated the negative relation between 18-month intrusive parenting and ego-resiliency at 42 months when controlling for stability of the variables. Ego-resiliency did not predict effortful control. The findings suggest that intrusive parenting may have a negative effect on children’s personality resiliency through its effects on the abilities to regulate attention and behavior. PMID:23379965

  18. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    NASA Astrophysics Data System (ADS)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  19. Effective use of surface-water management to control saltwater intrusion

    NASA Astrophysics Data System (ADS)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  20. Interactive Modelling of Salinity Intrusion in the Rhine-Meuse Delta

    NASA Astrophysics Data System (ADS)

    Baart, F.; Kranenburg, W.; Luijendijk, A.

    2015-12-01

    In many delta's of the world salinity intrusion imposes limits to fresh water availability. With increasing population and industry, the need for fresh water increases. But also salinity intrusion is expected to increase due to changes in river discharge, sea level and storm characteristics. In the Rhine-Meuse delta salt intrusion is impacted by human activities as well, like deepening of waterways and opening of delta-branches closed earlier. All these developments call for increasing the understanding of the system, but also for means for policy makers, coastal planners and engineers to assess effects of changes and to explore and design measures. In our presentation we present the developments in interactive modelling of salinity intrusion in the Rhine-Meuse delta. In traditional process-based numerical modelling, impacts are investigated by researchers and engineers by following the steps of pre-defining scenario's, running the model and post-processing the results. Interactive modelling lets users adjust simulations while running. Users can for instance change river discharges or bed levels, and can add measures like changes to geometry. The model will take the adjustments into account immediately, and will directly compute the effect. In this way, a tool becomes available with which coastal planners, policy makers and engineers together can develop and evaluate ideas and designs by interacting with the numerical model. When developing interactive numerical engines, one of the challenges is to optimize the exchange of variables as e.g. salt concentration. In our case we exchange variables on a 3D grid every time step. For this, the numerical model adheres to the Basic Model Interface (http://csdms.colorado.edu/wiki), which allows external control and the exchange of variables through pointers while the model is running. In our presentation we further explain our method and show examples of interactive design of salinity intrusion measures in the Rhine

  1. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    PubMed

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  2. The petrogenesis of late Neoproterozoic mafic dyke-like intrusion in south Sinai, Egypt

    NASA Astrophysics Data System (ADS)

    Azer, M. K.; Abu El-Ela, F. F.; Ren, M.

    2012-08-01

    New field, petrographical and geochemical studies are presented here for the late Neoproterozoic Rimm intrusion (˜15 km long) exposed in the southern Sinai Peninsula, Egypt in the northernmost Arabian-Nubian Shield (ANS). Field relations indicate that the Rimm intrusion is younger than the surrounding metamorphic rocks and calc-alkaline syn-tectonic granodiorite and it was not affected by regional metamorphism. The anorogenic peralkaline granite of Gebel Serbal crosscuts the Rimm intrusion. The Rimm intrusion is made up of several consanguineous rock types with gradational contacts. It is composed chiefly of pyroxene-hornblende gabbro, hornblende gabbro and minor quartz diorite. The chemical composition of the mafic minerals indicated that the studied rocks derived from calc-alkaline mafic magma. Geochemically, the studied rocks are characterized by enrichment in LILE relative to HFSE and LREE relative to HREE [(Ce/Yb)N = 4.50-6.36]. Quartz diorite display slightly concave HREE pattern and slightly negative Eu-anomaly [(Eu/Eu*)n = 0.91] which may be the result of fractionation of amphibole and plagioclase from the source melt, respectively. The Rimm intrusion evolved from mafic mantle magma into different type rocks by fractional crystallization with minor crustal contamination. The initial magma corresponds to pyroxene-hornblende gabbro and the crystallization of hornblende was caused by slight H2O increase in magma after crystallization of near-liquidus clinopyroxene and Ca-rich plagioclase. Amphiboles geobarometer indicate that the gabbroic rocks of the Rimm intrusion crystallized at pressures between 4.8 and 6.4 Kb, while quartz diorite crystallized at 1.3-2.1 Kb. Crystallization temperatures range between 800 and 926 °C for the gabbros and between 667 and 784 °C for the quartz diorite. The Rimm intrusion represents a post-orogenic phase formed during the crustal thinning and extension of the Arabian-Nubian Shield.

  3. Mapping the 3-D extent of the Northern Lobe of the Bushveld layered mafic intrusion from geophysical data

    USGS Publications Warehouse

    Finn, Carol A.; Bedrosian, Paul A.; Cole, Janine; Khoza, Tshepo David; Webb, Susan J.

    2015-01-01

    Geophysical models image the 3D geometry of the mafic portion of the Bushveld Complex north of the Thabazimbi-Murchison Lineament (TML), critical for understanding the origin of the world's largest layered mafic intrusion and platinum group element deposits. The combination of the gravity and magnetic data with recent seismic, MT, borehole and rock property measurements powerfully constrains the models. The intrusion north of the TML is generally shallowly buried (generally <1500 m) with a modeled area of ∼160 km × ∼125 km. The modeled thicknesses are not well constrained but vary from ∼<1000 to >12,000 m, averaging ∼4000 m. A feeder, suggested by a large modeled thickness (>10,000 m) and funnel shape, for Lower Zone magmas could have originated near the intersection of NS and NE trending TML faults under Mokopane. The TML has been thought to be the feeder zone for the entire Bushveld Complex but the identification of local feeders and/or dikes in the TML in the models is complicated by uncertainties on the syn- and post-Bushveld deformation history. However, modeled moderately thick high density material near the intersection of faults within the central and western TML may represent feeders for parts of the Bushveld Complex if deformation was minimal. The correspondence of flat, high resistivity and density regions reflect the sill-like geometry of the Bushveld Complex without evidence for feeders north of Mokopane. Magnetotelluric models indicate that the Transvaal sedimentary basin underlies much of the Bushveld Complex north of the TML, further than previously thought and important because the degree of reaction and assimilation of the Transvaal rocks with the mafic magmas resulted in a variety of mineralization zones.

  4. Deformation mechanisms accommodating the emplacement of an igneous sill-complex in the Irish sector of the Rockall Basin, offshore NW Ireland

    NASA Astrophysics Data System (ADS)

    Magee, Craig; Jackson, Christopher; Schofield, Nick

    2013-04-01

    Magma intrusion within the subsurface is heavily influenced by the pre-existing architecture of the upper crust and, depending on the emplacement mechanisms, may modify basin structure and fluid flow pathways. Seismic reflection data reveal that intrusive networks predominantly consist of interconnected, saucer-shaped sills that are often associated with dome-shaped 'forced' folds generated by intrusion-induced uplift. Previous studies of intrusion-related forced folds have primarily focused on isolated sills or laccoliths and have shown that the fold amplitude is less than the intrusion thickness, suggesting that additional space-making mechanisms (e.g. grain comminution, fluidization) accompanied emplacement. Furthermore, forced folding is often considered as an instantaneous process over geological time. However, fold growth and the interplay between accompanying ductile and brittle deformation styles remains poorly understood. Here, we use 3D seismic reflection data from the eastern margin of the Irish Rockall Basin, NE Atlantic, to quantitatively study eighty-two igneous intrusions (i.e. saucer-shaped sills and inclined sheets) in order to constrain the emplacement history of a Palaeocene-to-Middle Eocene sill-complex. Emplacement occurred across a Cretaceous clastic-to-marl dominated succession at palaeodepths of <5 km. Northwards-dipping, planar transgressive sheet intrusions are most abundant in the deeper portion of the sill-complex and magma flow indicators within them (i.e. steps and broken bridges) reveal that magma flowed upwards and outwards, feeding into shallow-level saucer-shaped sills at the peak of the transgressive limbs. The saucer-shaped sills are characterized by radial magma flow patterns, emanating from the inner sill, distinguished by mapping the long axes of magma lobes and fingers. These magma flow indictors also provide a proxy for intrusion style; i.e. where sills intrude the Lower Cretaceous sandstones, magma propagation was

  5. Beta-blockers may reduce intrusive thoughts in newly diagnosed cancer patients.

    PubMed

    Lindgren, Monica E; Fagundes, Christopher P; Alfano, Catherine M; Povoski, Stephen P; Agnese, Doreen M; Arnold, Mark W; Farrar, William B; Yee, Lisa D; Carson, William E; Schmidt, Carl R; Kiecolt-Glaser, Janice K

    2013-08-01

    A cancer diagnosis provokes significant levels of emotional distress, with intrusive thoughts being the most common manifestation among breast cancer survivors. Cancer-related intrusive thoughts can take the form of emotional memories, flashbacks, nightmares, and intrusive images. Emotional arousal after a severe life stressor prolongs adrenergic activation, which in turn may increase risk for post-traumatic symptomatology. However, antihypertensive beta-blockers block adrenergic activation and are known to reduce traumatic memories and related psychological distress. Thus, the current study examined the association between beta-blocker use and the severity of cancer-related intrusive thoughts and related symptoms following a cancer diagnosis. The 174 breast and 36 female colorectal cancer patients who had recently undergone diagnostic screening or biopsy included 39 beta-blocker users and 171 non-users. Prior to any cancer treatment including surgery, participants completed questionnaires that included the Impact of Events Scale and the Center for Epidemiological Studies Depression Scale. Analyses controlled for age, education, cancer stage, cancer type, days since diagnosis, marital status, depression, and comorbidities. Although the high rates of cancer-related distress in this sample were similar to those of other studies with recently diagnosed patients, beta-blocker users endorsed 32% fewer cancer-related intrusive thoughts than non-users. Recently diagnosed cancer patients using beta-blockers reported less cancer-related psychological distress. These results suggest that beta-blocker use may benefit cancer patients' psychological adjustment following diagnosis, and provide a promising direction for future investigations on the pharmacological benefits of beta-blockers for cancer-related distress. Copyright © 2012 John Wiley & Sons, Ltd.

  6. Beta-blockers May Reduce Intrusive Thoughts in Newly Diagnosed Cancer Patients

    PubMed Central

    Lindgren, Monica E.; Fagundes, Christopher P.; Alfano, Catherine M.; Povoski, Stephen P.; Agnese, Doreen M.; Arnold, Mark W.; Farrar, William B.; Yee, Lisa D.; Carson, William E.; Schmidt, Carl R.; Kiecolt-Glaser, Janice K.

    2012-01-01

    Objective A cancer diagnosis provokes significant levels of emotional distress, with intrusive thoughts being the most common manifestation among breast cancer survivors. Cancer-related intrusive thoughts can take the form of emotional memories, flashbacks, nightmares, and intrusive images. Emotional arousal after a severe life stressor prolongs adrenergic activation, which in turn may increase risk for posttraumatic symptomatology. However, antihypertensive beta-blockers block adrenergic activation and are known to reduce traumatic memories and related psychological distress. Thus, the current study examined the association between beta-blocker use and the severity of cancer-related intrusive thoughts and related symptoms following a cancer diagnosis. Methods The 174 breast and 36 female colorectal cancer patients who had recently undergone diagnostic screening or biopsy included 39 beta-blocker users and 171 non-users. Prior to any cancer treatment including surgery, participants completed questionnaires that included the Impact of Events Scale (IES) and the Center for Epidemiological Studies Depression Scale (CES-D). Analyses controlled for age, education, cancer stage, cancer type, days since diagnosis, marital status, depression, and comorbidities. Results Although the high rates of cancer-related distress in this sample were similar to those of other studies with recently diagnosed patients, beta-blocker users endorsed 32% fewer cancer-related intrusive thoughts than non-users. Conclusions Recently diagnosed cancer patients using beta-blockers reported less cancer-related psychological distress. These results suggest that beta-blocker use may benefit cancer patients’ psychological adjustment following diagnosis, and provide a promising direction for future investigations on the pharmacological benefits of beta-blockers for cancer-related distress. PMID:23255459

  7. Mental Imagery and Post-Traumatic Stress Disorder: A Neuroimaging and Experimental Psychopathology Approach to Intrusive Memories of Trauma

    PubMed Central

    Clark, Ian A.; Mackay, Clare E.

    2015-01-01

    This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of post-traumatic stress disorder (PTSD). However, key questions, including those involving etiology, remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma) memory, involuntary recall, negative emotions, attention hijacking, and mental imagery. Each component part is considered in turn, both behaviorally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory, and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them. PMID:26257660

  8. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    PubMed

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p < .01, but was unrelated to physiological responses to trauma reminder images (ps > .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  9. Link between the granitic and volcanic rocks of the Bushveld Complex, South Africa

    NASA Astrophysics Data System (ADS)

    Schweitzer, J. K.; Hatton, C. J.; De Waal, S. A.

    1997-02-01

    Until recently, it was proposed that the Bushveld Complex, consisting of the extrusive Rooiberg Group and the intrusive Rashoop Granophyre, Rustenburg Layered and Lebowa Granite Suites, evolved over a long period of time, possibly exceeding 100 Ma. Most workers therefore considered that the various intrusive and extrusive episodes were unrelated. Recent findings suggest that the intrusive, mafic Rustenburg Layered Suite, siliceous Rashoop Granophyre Suite and the volcanic Rooiberg Group were synchronous, implying that the Bushveld igneous event was short-lived. Accepting the short-lived nature of the complex, the hypothesis that the granites are genetically unrelated to the other events of the Bushveld Complex can be reconsidered. Re-examination of the potential Rooiberg Group/Lebowa Granite Suite relationship suggests that the granites form part of the Bushveld event. Rhyolite lava, granite and granophyre melts originated from a source similar in composition to upper crustal rocks. This source is interpreted to have been melted by a thermal input associated with a mantle plume. Granite intruded after extrusion of the last Rooiberg rhyolite, or possibly overlapped in time with the formation of the youngest volcanic flows.

  10. Intrusive [r] and Optimal Epenthetic Consonants

    ERIC Educational Resources Information Center

    Uffmann, Christian

    2007-01-01

    This paper argues against the view of intrusive [r] as a synchronically arbitrary insertion process. Instead, it is seen as a phonologically natural process, which can be modelled within the framework of Optimality Theory (OT). Insertion of [r] in phonologically restricted environments is a consequence of a more general theory of consonant…

  11. Testing the differential effects of acceptance and attention-based psychological interventions on intrusive thoughts and worry.

    PubMed

    Ainsworth, B; Bolderston, H; Garner, M

    2017-04-01

    Worry is a key component of anxiety and may be an effective target for therapeutic intervention. We compared two psychological processes (attention and acceptance) on the frequency of intrusive worrying thoughts in an experimental worry task. 77 participants were randomised across three groups and completed either a 10 min attention or acceptance-based psychological exercise, or progressive muscle relaxation control. We subsequently measured anxiety, and the content and frequency of intrusive thoughts before and after a 'worry induction task'. Groups did not differ in baseline worry, anxiety or thought intrusions. Both attention and acceptance-based groups experienced fewer negative thought intrusions (post-worry) compared to the relaxation control group. The acceptance exercise had the largest effect, preventing 'worry induction'. Increases in negative intrusive thoughts predicted subjective anxiety. We provide evidence that acceptance and attention psychological exercises may reduce anxiety by reducing the negative thought intrusions that characterise worry. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. Platinum mineralization in the Kapalagulu Intrusion, western Tanzania

    NASA Astrophysics Data System (ADS)

    Wilhelmij, Harry R.; Cabri, Louis J.

    2016-03-01

    Low-grade copper and nickel mineralization was found near the eastern shore of Lake Tanganyika at Kungwe Bay in the early part of the twentieth century. The mineralization occurs in harzburgite at the base of a layered gabbro complex known as the Kapalagulu Intrusion, emplaced between the Paleoproterozoic Ubendian basement and overlying Neoproterozoic Itiaso Group metasediments. Several mining and exploration companies continued the geophysical and drilling exploration for base metals throughout the last century culminating in the discovery of high-grade platinum-group element (PGE) mineralization associated with chromitite and sulfide-bearing harzburgite within the southeastern extension of the Kapalagulu Intrusion (known as the Lubalisi Zone) that is covered by a layer of nickel-rich laterite regolith. The poorly layered southeastern harzburgite forms part of the >1500 m-thick Lower Ultramafic Sequence and resembles a dike-like body that flares upwards into a succession of well-layered gabbroic rocks of the Upper Mafic Sequence. No PGE mineralization has been found in the layered gabbro; all the mineralization is associated with the chromite- and sulfide-rich harzburgite of the Lower Ultramafic Sequence and the laterite regolith overlying the mineralized harzburgite. The Lubalisi Zone harzburgite is underlain by basal dunite and overlain by an interval of layered harzburgite and troctolite and this ultramafic sequence is folded into a syncline that plunges towards the northwest that has been modified by major dolerite-filled faults orientated subparallel to the fold axial surface. Extensive deep drilling in the Lubalisi Zone of the Kapalagulu Intrusion shows that the folded harzburgite can be subdivided into a lower feldspathic harzburgite, a harzburgite containing chromitite seams and intervals of sulfide and chromite mineralization known as the Main Chromite Sulfide Succession (MCSS), an overlying sulfide-rich harzburgite, and an upper feldspathic harzburgite

  13. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.

    PubMed

    Ganapathy, S; Yogesh, P; Kannan, A

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  14. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    NASA Astrophysics Data System (ADS)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  15. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    PubMed Central

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  16. Ring complexes and related rocks in Africa

    NASA Astrophysics Data System (ADS)

    Vail, J. R.

    Over 625 igneous complexes throughout Africa and Arabia have been selected and classified on the basis of petrographic association and chronology into six broad age groups forming 29 provinces. The groups range from Mid-Proterozoic to Tertiary and include gabbro, granite, syenite, foid syenite and carbonatite plutonic rocks, the majority in the form of ring-dykes, cone-sheets, plugs, circular intrusions, and their associated extrusive phases. Pan-African late or post-orogenic complexes (720-490 Ma) are common in the Arabian-Nubian and Tuareg shields of north Africa originating from subduction zone derived magmatism. Anorogenic complexes in Egypt, NE and central Sudan, Niger, Nigeria, Cameroon, Zaïre-Burundi, Malawi, Mozambique, Zimbabwe, Namibia and Angola span 550 to 50 Ma and are dominantly alkali granites and foid syenites. Many groups occur as en-echelon bands within linear arrays, and show migrating centres of intrusion in variable directions. In W. Africa there was a progressive shift of emplacement southwards during early Ordovician to Mid-Cretaceous times. Distribution patterns suggest thatdeep seated features, such as shear zones associated with lithospheric plate movements,controlled melting, and the resultant location of the complexes. Economic mineralization is not widespread in the rocks of the African ring complexes and is mainly restricted to small deposits of Sn, W, F, U and Nb.

  17. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    PubMed

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  18. Multi-User Low Intrusive Occupancy Detection

    PubMed Central

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  19. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth

    PubMed Central

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.

    2013-01-01

    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  20. An artificial bioindicator system for network intrusion detection.

    PubMed

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  1. Intrusion Detection System Visualization of Network Alerts

    DTIC Science & Technology

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  2. Construction of the Devonian bimodal Gouldsboro pluton via multiple intrusion, coastal Maine, USA

    NASA Astrophysics Data System (ADS)

    Koteas, C.

    2006-12-01

    The Gouldsboro pluton (377 ± 19 ma) (Metzger et al., 1982) of the eastern coastal Maine magmatic province preserves abundant evidence of mechanical interaction between mafic and felsic magmas, as well as the stoping and doming of country rock. Coastal Maine is a unique location where subequal volumes of felsic and mafic material have interacted and are preserved in both plutonic and volcanic complexes. The effects of generation and mobilization of large volumes of magma in the shallow crust are well-preserved. The Gouldsboro pluton provides an excellent perspective from the highest to lowest sections (southwest to northeast) of a hybrid magmatic system. The Gouldsboro magmatic complex is hosted by undated greenstone to the north that is overlain by the 477 ± 18 ma (Metzger, 1977) meta-volcanic/meta-sedimentary Bar Harbor formation. Blocks of both units are discernable as 10 cm to 2 m-diameter blocks within the pluton. The Gouldsboro granite is dominantly a fine to medium grained feldspar- rich leucocratic hornblende granite, although biotite is sometimes present. Miarolitic cavities are common in the highest exposure of the system, especially in the south where the finest grained, most leucocratic granite occurs. Other units include, from lowest to highest in the system, hybrid diorite-gabbro, hybrid granite-granodiorite, granite hosting 30 cm to 3 m-diameter globular basaltic pillows, and a previously unrecognized pyroclastic unit, very similar to the lowermost member of the Cranberry Isle series, a volcanic breccia (Seaman et al., 1999). The pyroclastic unit is intruded by medium grained granite hosting angular fragments of volcanic, mafic plutonic, and country rock. While the contact between gabbro near the base of the pluton and granite in the middle of the pluton is commonly gradational, there are complex intrusive breccias in some areas where fine to coarse, angular diorite to gabbro xenoliths are hosted by granodiorite and granite. Enclave-rich zones

  3. Parallel Regulation of Memory and Emotion Supports the Suppression of Intrusive Memories

    PubMed Central

    Anderson, Michael C.

    2017-01-01

    Intrusive memories often take the form of distressing images that emerge into a person's awareness, unbidden. A fundamental goal of clinical neuroscience is to understand the mechanisms allowing people to control these memory intrusions and reduce their emotional impact. Mnemonic control engages a right frontoparietal network that interrupts episodic retrieval by modulating hippocampal activity; less is known, however, about how this mechanism contributes to affect regulation. Here we report evidence in humans (males and females) that stopping episodic retrieval to suppress an unpleasant image triggers parallel inhibition of mnemonic and emotional content. Using fMRI, we found that regulation of both mnemonic and emotional content was driven by a shared frontoparietal inhibitory network and was predicted by a common profile of medial temporal lobe downregulation involving the anterior hippocampus and the amygdala. Critically, effective connectivity analysis confirmed that reduced amygdala activity was not merely an indirect consequence of hippocampal suppression; rather, both the hippocampus and the amygdala were targeted by a top-down inhibitory control signal originating from the dorsolateral prefrontal cortex. This negative coupling was greater when unwanted memories intruded into awareness and needed to be purged. Together, these findings support the broad principle that retrieval suppression is achieved by regulating hippocampal processes in tandem with domain-specific brain regions involved in reinstating specific content, in an activity-dependent fashion. SIGNIFICANCE STATEMENT Upsetting events sometimes trigger intrusive images that cause distress and that may contribute to psychiatric disorders. People often respond to intrusions by suppressing their retrieval, excluding them from awareness. Here we examined whether suppressing aversive images might also alter emotional responses to them, and the mechanisms underlying such changes. We found that the better

  4. Geochemistry of Rock Samples Collected from the Iron Hill Carbonatite Complex, Gunnison County, Colorado

    USGS Publications Warehouse

    Van Gosen, Bradley S.

    2008-01-01

    A study conducted in 2006 by the U.S. Geological Survey collected 57 surface rock samples from nine types of intrusive rock in the Iron Hill carbonatite complex. This intrusive complex, located in Gunnison County of southwestern Colorado, is known for its classic carbonatite-alkaline igneous geology and petrology. The Iron Hill complex is also noteworthy for its diverse mineral resources, including enrichments in titanium, rare earth elements, thorium, niobium (columbium), and vanadium. This study was performed to reexamine the chemistry and metallic content of the major rock units of the Iron Hill complex by using modern analytical techniques, while providing a broader suite of elements than the earlier published studies. The report contains the geochemical analyses of the samples in tabular and digital spreadsheet format, providing the analytical results for 55 major and trace elements.

  5. Perceptual processing during trauma, priming and the development of intrusive memories

    PubMed Central

    Sündermann, Oliver; Hauschildt, Marit; Ehlers, Anke

    2013-01-01

    Background Intrusive reexperiencing in posttraumatic stress disorder (PTSD) is commonly triggered by stimuli with perceptual similarity to those present during the trauma. Information processing theories suggest that perceptual processing during the trauma and enhanced perceptual priming contribute to the easy triggering of intrusive memories by these cues. Methods Healthy volunteers (N = 51) watched neutral and trauma picture stories on a computer screen. Neutral objects that were unrelated to the content of the stories briefly appeared in the interval between the pictures. Dissociation and data-driven processing (as indicators of perceptual processing) and state anxiety during the stories were assessed with self-report questionnaires. After filler tasks, participants completed a blurred object identification task to assess priming and a recognition memory task. Intrusive memories were assessed with telephone interviews 2 weeks and 3 months later. Results Neutral objects were more strongly primed if they occurred in the context of trauma stories than if they occurred during neutral stories, although the effect size was only moderate (ηp2=.08) and only significant when trauma stories were presented first. Regardless of story order, enhanced perceptual priming predicted intrusive memories at 2-week follow-up (N = 51), but not at 3 months (n = 40). Data-driven processing, dissociation and anxiety increases during the trauma stories also predicted intrusive memories. Enhanced perceptual priming and data-driven processing were associated with lower verbal intelligence. Limitations It is unclear to what extent these findings generalize to real-life traumatic events and whether they are specific to negative emotional events. Conclusions The results provide some support for the role of perceptual processing and perceptual priming in reexperiencing symptoms. PMID:23207970

  6. An Optimal Method for Detecting Internal and External Intrusion in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.

    Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

  7. Volumetric measurement of root resorption following molar mini-screw implant intrusion using cone beam computed tomography.

    PubMed

    Li, Wen; Chen, Fei; Zhang, Feng; Ding, Wanghui; Ye, Qingsong; Shi, Jiejun; Fu, Baiping

    2013-01-01

    Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. 1. The volumes of 32 teeth were measured using CBCT and laser scanning to verify the accuracy of CBCT. 2. Twelve overerupted molars from adult patients were investigated in this study. After mini-screw implants were inserted into the buccal and palatal alveolar bones, 150 g of force was applied to the mini-screw implants on each side to intrude the molars. CBCT images of all patients were taken immediately prior to intrusion and after intrusion. The volumes of the roots were calculated using the Mimics software program. The differences between the pre-intrusion and post-intrusion root volumes were statistically evaluated with a paired-samples t-test. In addition, the losses of the roots were statistically compared with each other using one-way analysis of variance at the P<0.05 level. No statistically significant volume differences were observed between the physical (laser scanning) and CBCT measurements (P>0.05). The overerupted molars were significantly intruded (P<0.05), and the average intrusion was 3.30±1.60 mm. The differences between the pre-intrusion and post-intrusion root volumes were statistically significant for all of the roots investigated (P<0.05). The roots were sorted by volume loss in descending order as follows: mesiobuccal, palatal, and distobuccal. Statistical significance was achieved among the three roots. The average total resorption for each tooth was 58.39±1.54 mm(3). Volume measurement using CBCT was able to effectively evaluate root resorption caused by mini-screw intrusion. The highest volume loss was observed in the mesiobuccal root among the three roots of

  8. Volumetric Measurement of Root Resorption following Molar Mini-Screw Implant Intrusion Using Cone Beam Computed Tomography

    PubMed Central

    Li, Wen; Chen, Fei; Zhang, Feng; Ding, Wanghui; Ye, Qingsong; Shi, Jiejun; Fu, Baiping

    2013-01-01

    Objective Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. Materials and Methods 1. The volumes of 32 teeth were measured using CBCT and laser scanning to verify the accuracy of CBCT. 2. Twelve overerupted molars from adult patients were investigated in this study. After mini-screw implants were inserted into the buccal and palatal alveolar bones, 150 g of force was applied to the mini-screw implants on each side to intrude the molars. CBCT images of all patients were taken immediately prior to intrusion and after intrusion. The volumes of the roots were calculated using the Mimics software program. The differences between the pre-intrusion and post-intrusion root volumes were statistically evaluated with a paired-samples t-test. In addition, the losses of the roots were statistically compared with each other using one-way analysis of variance at the P<0.05 level. Results No statistically significant volume differences were observed between the physical (laser scanning) and CBCT measurements (P>0.05). The overerupted molars were significantly intruded (P<0.05), and the average intrusion was 3.30±1.60 mm. The differences between the pre-intrusion and post-intrusion root volumes were statistically significant for all of the roots investigated (P<0.05). The roots were sorted by volume loss in descending order as follows: mesiobuccal, palatal, and distobuccal. Statistical significance was achieved among the three roots. The average total resorption for each tooth was 58.39±1.54 mm3. Conclusion Volume measurement using CBCT was able to effectively evaluate root resorption caused by mini-screw intrusion. The highest volume loss was observed

  9. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms.

    PubMed

    Dreano, Denis; Raitsos, Dionysios E; Gittings, John; Krokos, George; Hoteit, Ibrahim

    2016-01-01

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin's shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  10. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    PubMed Central

    Alcalá, José M.; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-01-01

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented. PMID:28208672

  11. Petrological constraints on the recycling of mafic crystal mushes, magma ascent and intrusion of braided sills in the Torres del Paine mafic complex (Patagonia)

    NASA Astrophysics Data System (ADS)

    Leuthold, Julien; Müntener, Othmar; Baumgartner, Lukas; Putlitz, Benita

    2014-05-01

    Cumulate and crystal mush disruption and reactivation are difficult to recognise in coarse grained shallow plutonic rocks. Mafic minerals included in hornblende and zoned plagioclase provide snapshots of early crystallization and cumulate formation, but are difficult to interpret in terms of the dynamics of magma ascent and possible links between silicic and mafic rock emplacement. We will present the field relations, the microtextures and the mineral chemistry of the Miocene mafic sill complex of the Torres del Paine intrusive complex (Patagonia, Chile) and its sub-vertical feeder-zone. The mafic sill complex was built up by a succession of braided sills of shoshonitic and high-K calc-alkaline porphyritic hornblende-gabbro and fine grained monzodioritic sills. The mafic units were over-accreted over 41±11 ka, underplating the overlying granite. Local diapiric structures and felsic magma accumulation between sills indicate limited separation of intercumulus liquid from the mafic sills. Anhedral hornblende cores, with olivine + clinopyroxene ± plagioclase ± apatite inclusions, crystallized at temperatures >900°C and pressures of ~300 to ~500 MPa. The corresponding rims and monzodiorite matrix crystallized at <830°C, ~70 MPa. This abrupt compositional variation suggests stability and instability of hornblende during mafic roots recycling and subsequent decompression. The near lack of intercumulus crystals in the sub-vertical feeder zone layered gabbronorite and pyroxene-hornblende gabbronorite stocks testifies that melt is more efficiently extracted than in sills, resulting in a cumulate signature in the feeding system. The emplacement age of the sill complex topmost granitic unit is identical, within uncertainties, to the feeder zone mafic cumulates. Granitic liquids formed by AFC processes and were extracted at high temperature (T>950°C) from the middle crust reservoir to the emplacement level. We show that hornblende-plagioclase thermobarometry is a useful

  12. Temporal associations and prior-list intrusions in free recall.

    PubMed

    Zaromb, Franklin M; Howard, Marc W; Dolan, Emily D; Sirotin, Yevgeniy B; Tully, Michele; Wingfield, Arthur; Kahana, Michael J

    2006-07-01

    When asked to recall the words from a just-presented target list, subjects occasionally recall words that were not on the list. These intrusions either appeared on earlier lists (prior-list intrusions, or PLIs) or had not appeared over the course of the experiment (extra-list intrusions). The authors examined the factors that elicit PLIs in free recall. A reanalysis of earlier studies revealed that PLIs tend to come from semantic associates as well as from recently studied lists, with the rate of PLIs decreasing sharply with list recency. The authors report 3 new experiments in which some items in a given list also appeared on earlier lists. Although repetition enhanced recall of list items, subjects were significantly more likely to make PLIs following the recall of repeated items, suggesting that temporal associations formed in earlier lists can induce recall errors. The authors interpret this finding as evidence for the interacting roles of associative and contextual retrieval processes in recall. Although contextual information helps to focus recall on words in the target list, it does not form an impermeable boundary between current- and prior-list experiences. Copyright 2006 APA, all rights reserved.

  13. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  14. Internet use, Facebook intrusion, and depression: Results of a cross-sectional study.

    PubMed

    Błachnio, A; Przepiórka, A; Pantic, I

    2015-09-01

    Facebook has become a very popular social networking platform today, particularly among adolescents and young adults, profoundly changing the way they communicate and interact. However, some reports have indicated that excessive Facebook use might have detrimental effects on mental health and be associated with certain psychological problems. Because previous findings on the relationship between Facebook addiction and depression were not unambiguous, further investigation was required. The main objective of our study was to examine the potential associations between Internet use, depression, and Facebook intrusion. A total of 672 Facebook users took part in the cross-sectional study. The Facebook Intrusion Questionnaire and the Center for Epidemiologic Studies Depression Scale were used. For collecting the data, the snowball sampling procedure was used. We showed that depression can be a predictor of Facebook intrusion. Our results provides additional evidence that daily Internet use time in minutes, gender, and age are also predictors of Facebook intrusion: that Facebook intrusion can be predicted by being male, young age, and an extensive number of minutes spent online. On the basis of this study, it is possible to conclude that there are certain demographic - variables, such as age, gender, or time spent online - that may help in outlining the profile of a user who may be in danger of becoming addicted to Facebook. This piece of knowledge may serve for prevention purposes. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  15. Extruded upper first molar intrusion: Comparison between unilateral and bilateral miniscrew anchorage.

    PubMed

    Sugii, Mari Miura; Barreto, Bruno de Castro Ferreira; Francisco Vieira-Júnior, Waldemir; Simone, Katia Regina Izola; Bacchi, Ataís; Caldas, Ricardo Armini

    2018-01-01

    The aim of his study was to evaluate the stress on tooth and alveolar bone caused by orthodontic intrusion forces in a supraerupted upper molar, by using a three-dimensional Finite Element Method (FEM). A superior maxillary segment was modeled in the software SolidWorks 2010 (SolidWorks Corporation, Waltham, MA, USA) containing: cortical and cancellous bone, supraerupted first molar, periodontal tissue and orthodontic components. A finite element model has simulated intrusion forces of 4N onto a tooth, directed to different mini-screw locations. Three different intrusion mechanics vectors were simulated: anchoring on a buccal mini-implant; anchoring on a palatal mini-implant and the association of both anchorage systems. All analyses were performed considering the minimum principal stress and total deformation. Qualitative analyses exhibited stress distribution by color maps. Quantitative analysis was performed with a specific software for reading and solving numerical equations (ANSYS Workbench 14, Ansys, Canonsburg, Pennsylvania, USA). Intrusion forces applied from both sides (buccal and palatal) resulted in a more homogeneous stress distribution; no high peak of stress was detected and it has allowed a vertical resultant movement. Buccal or palatal single-sided forces resulted in concentrated stress zones with higher values and tooth tipping to respective force side. Unilateral forces promoted higher stress in root apex and higher dental tipping. The bilateral forces promoted better distribution without evidence of dental tipping. Bilateral intrusion technique suggested lower probability of root apex resorption.

  16. A Gulf Stream-derived pycnocline intrusion on the Middle Atlantic Bight shelf

    NASA Astrophysics Data System (ADS)

    Gawarkiewicz, Glen; McCarthy, Robert K.; Barton, Kenneth; Masse, Ann K.; Church, Thomas M.

    1990-12-01

    Saline intrusions from the upper slope onto the outer shelf are frequently observed at the pycnocline along the shelfbreak front in the Middle Atlantic Bight during the summer. A brief cruise was conducted in July, 1986 between Baltimore and Washington Canyons to examine along-shelf variability of pycnocline salinity intrusions. A particularly saline intrusion of 35.8 Practical Salinity Units (PSU) was observed between 20 and 40 m in a water depth of 70 to 80 m. The along-shelf extent was at least 40 km. The cooler, sub-pycnocline outer shelf water was displaced 15 km shoreward of the shelfbreak. A Gulf Stream filament was present in the slope region prior to the hydrographic sampling, but was not visible in thermal imagery during the hydrographic sampling. Temperature-salinity characteristics of the intrusion suggest that it was a mixture of Gulf Stream water and slope water, possibly from the filament. The shoreward penetration of saline water was most pronounced at the pycnocline and penetrated the shelfbreak front, with salinities as high as 35.0 PSU reaching as far shoreward as the 35 m isobath. These pycnocline intrusions may be an important mechanism for the transport of Gulf Stream-derived water onto the shelf during the summer. The presence of filaments or other Gulf Stream-derived water on the upper slope may account for some of the along-front variability of the pycnocline salinity maximum that has previously been observed.

  17. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability maymore » also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system« less

  18. Acute effects of alcohol on the development of intrusive memories.

    PubMed

    Bisby, James A; Brewin, Chris R; Leitz, Julie R; Valerie Curran, H

    2009-07-01

    Post-traumatic stress disorder is characterised by repeated intrusive imagery of the traumatic event. Despite alcohol's impairing effect on memory and frequent involvement in real-life trauma, virtually nothing is known of the interaction between alcohol and trauma memory. We aimed to investigate the acute alcohol effects on spontaneous memories following a trauma film as well as explicit memory for the film. Utilising an independent-group double-blind design, 48 healthy volunteers were randomly allocated to receive alcohol of 0.4 or 0.8 g/kg or a matched placebo drink. A stressful film was viewed post-drink. Skin conductance was monitored throughout and mood and dissociative symptoms were indexed. Volunteers recorded their spontaneous memories of the film daily in an online diary over the following week. Their explicit memory for both gist and details of the film was tested on day 7. Intriguingly, an inverted 'U' alcohol dose-response was observed on intrusive memories with a low dose of alcohol increasing memory intrusions while a high dose decreased intrusions. In contrast, explicit memory performance after 7 days showed a linear dose-response effect of alcohol with both recall and recognition decreasing as dose increased. These findings highlight a striking differential pattern of alcohol's effects on spontaneous memories as compared with explicit memories. Alcohol's effect on spontaneous memories may reflect a dose-dependent impairment of two separate memory systems integral to the processing of different aspects of a traumatic event.

  19. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.

  20. HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

    DTIC Science & Technology

    2003-01-01

    securing the routing protocols of mobile ad hoc wireless net- works has been done in prevention. Intrusion detection systems play a complimentary...TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified...hops of A would be unable to communicate with B and vice versa [1]. 1.2 The role of intrusion detection in security In order to provide reliable

  1. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    NASA Astrophysics Data System (ADS)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  2. Hypomanic Experience in Young Adults Confers Vulnerability to Intrusive Imagery After Experimental Trauma

    PubMed Central

    Malik, Aiysha; Goodwin, Guy M.; Hoppitt, Laura

    2014-01-01

    Emotional mental imagery occurs across anxiety disorders, yet is neglected in bipolar disorder despite high anxiety comorbidity. Furthermore, a heightened susceptibility to developing intrusive mental images of stressful events in bipolar disorder and people vulnerable to it (with hypomanic experience) has been suggested. The current study assessed, prospectively, whether significant hypomanic experience (contrasting groups scoring high vs. low on the Mood Disorder Questionnaire, MDQ) places individuals at increased risk of visual reexperiencing after experimental stress. A total of 110 young adults watched a trauma film and recorded film-related intrusive images for 6 days. Compared to the low MDQ group, the high MDQ group experienced approximately twice as many intrusive images, substantiated by convergent measures. Findings suggest hypomanic experience is associated with developing more frequent intrusive imagery of a stressor. Because mental imagery powerfully affects emotion, such imagery may contribute to bipolar mood instability and offer a cognitive treatment target. PMID:25419498

  3. Non-Intrusive Load Monitoring Approaches for Disaggregated Energy Sensing: A Survey

    PubMed Central

    Zoha, Ahmed; Gluhak, Alexander; Imran, Muhammad Ali; Rajasegarar, Sutharshan

    2012-01-01

    Appliance Load Monitoring (ALM) is essential for energy management solutions, allowing them to obtain appliance-specific energy consumption statistics that can further be used to devise load scheduling strategies for optimal energy utilization. Fine-grained energy monitoring can be achieved by deploying smart power outlets on every device of interest; however it incurs extra hardware cost and installation complexity. Non-Intrusive Load Monitoring (NILM) is an attractive method for energy disaggregation, as it can discern devices from the aggregated data acquired from a single point of measurement. This paper provides a comprehensive overview of NILM system and its associated methods and techniques used for disaggregated energy sensing. We review the state-of-the art load signatures and disaggregation algorithms used for appliance recognition and highlight challenges and future research directions. PMID:23223081

  4. Bald Mountain gold mining district, Nevada: A Jurassic reduced intrusion-related gold system

    USGS Publications Warehouse

    Nutt, C.J.; Hofstra, A.H.

    2007-01-01

    The Bald Mountain mining district has produced about 2 million ounces (Moz) of An. Geologic mapping, field relationships, geochemical data, petrographic observations, fluid inclusion characteristics, and Pb, S, O, and H isotope data indicate that An mineralization was associated with a reduced Jurassic intrusion. Gold deposits are localized within and surrounding a Jurassic (159 Ma) quartz monzonite porphyry pluton and dike complex that intrudes Cambrian to Mississippian carbonate and clastic rocks. The pluton, associated dikes, and An mineralization were controlled by a crustal-scale northwest-trending structure named the Bida trend. Gold deposits are localized by fracture networks in the pluton and the contact metamorphic aureole, dike margins, high-angle faults, and certain strata or shale-limestone contacts in sedimentary rocks. Gold mineralization was accompanied by silicification and phyllic alteration, ??argillic alteration at shallow levels. Although An is typically present throughout, the system exhibits a classic concentric geochemical zonation pattern with Mo, W, Bi, and Cu near the center, Ag, Pb, and Zn at intermediate distances, and As and Sb peripheral to the intrusion. Near the center of the system, micron-sized native An occurs with base metal sulfides and sulfosalts. In peripheral deposits and in later stages of mineralization, Au is typically submicron in size and resides in pyrite or arsenopyrite. Electron microprobe and laser ablation ICP-MS analyses show that arsenopyrite, pyrite, and Bi sulfide minerals contain 10s to 1,000s of ppm Au. Ore-forming fluids were aqueous and carbonic at deep levels and episodically hypersaline at shallow levels due to boiling. The isotopic compositions of H and O in quartz and sericite and S and Pb in sulfides are indicative of magmatic ore fluids with sedimentary sulfur. Together, the evidence suggests that Au was introduced by reduced S-bearing magmatic fluids derived from a reduced intrusion. The reduced

  5. Contextual representations increase analogue traumatic intrusions: evidence against a dual-representation account of peri-traumatic processing.

    PubMed

    Pearson, David G

    2012-12-01

    Information processing accounts of post-traumatic stress disorder (PTSD) state that intrusive memories emerge due to a lack of integration between perceptual and contextual trauma representations in autobiographical memory. This hypothesis was tested experimentally using an analogue trauma paradigm in which participants viewed an aversive film designed to elicit involuntary recollections. Participants viewed scenes from the film either paired with contextual information or with the contextual information omitted. After viewing the film participants were asked to record for one week any involuntary intrusions for the film using a provided intrusions diary. The results revealed a significant increase in analogue intrusions for the film when viewed with contextual information in comparison to when the film was viewed with the contextual information omitted. In contrast there was no effect of contextual information on valence ratings or voluntary memory for the film, or on the reported vividness and emotionality of the intrusions. The analogue trauma paradigm may have failed to reproduce the effect of extreme stress on encoding that is postulated to occur during PTSD. The findings have potential implications for trauma intervention as they suggest that the contextual understanding of a scene during encoding can be integral to the subsequent occurrence of traumatic intrusions. The pattern of results found in the study are inconsistent with dual-representation accounts of intrusive memory formation, and instead provide new evidence that contextual representations play a casual role in increasing the frequency of involuntary intrusions for traumatic material. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. Intrusive imagery in severe health anxiety: Prevalence, nature and links with memories and maintenance cycles

    PubMed Central

    Muse, Kate; McManus, Freda; Hackmann, Ann; Williams, Matthew; Williams, Mark

    2010-01-01

    Increased understanding of the nature and role of intrusive imagery has contributed to the development of effective treatment protocols for some anxiety disorders. However, intrusive imagery in severe health anxiety (hypochondriasis) has been comparatively neglected. Hence, the current study investigates the prevalence, nature and content of intrusive imagery in 55 patients who met DSM-IV-TR (APA, 2000) criteria for the diagnosis of hypochondriasis. A semi-structured interview was used to assess the prevalence, nature and possible role of intrusive imagery in this disorder. Over 78% of participants reported experiencing recurrent, distressing intrusive images, the majority (72%) of which either were a memory of an earlier event or were strongly associated with a memory. The images tended to be future orientated, and were reliably categorised into four themes: i) being told ‘the bad news’ that you have a serious/life threatening-illness (6.9%), ii) suffering from a serious or life-threatening illness (34.5%), iii) death and dying due to illness (22.4%) and iv) impact of own death or serious illness on loved ones (36.2%). Participants reported responding to experiencing intrusive images by engaging in avoidance, checking, reassurance seeking, distraction and rumination. Potential treatment implications and links to maintenance cycles are considered. PMID:20627270

  7. WISESight : a multispectral smart video-track intrusion monitor.

    DOT National Transportation Integrated Search

    2015-05-01

    International Electronic Machines : Corporation (IEM) developed, tested, and : validated a unique smart video-based : intrusion monitoring system for use at : highway-rail grade crossings. The system : used both thermal infrared (IR) and : visible/ne...

  8. Natural tooth intrusion and reversal in implant-assisted prosthesis: evidence of and a hypothesis for the occurrence.

    PubMed

    Sheets, C G; Earthmann, J C

    1993-12-01

    Based on clinical observation, a hypothesis of the mechanism of intrusion of natural teeth in an implant-assisted prosthesis is suggested. Engineering principles are presented that establish an energy absorption model as it relates to the implant-assisted prosthesis. In addition, in the course of patient treatment it has been discovered that the intrusion of natural teeth can be reversed. Patient histories that demonstrate intrusion reversal are reviewed. The possible mechanisms for the intrusion/reversal phenomenon are presented and preventative recommendations are given.

  9. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  10. Biological intrusion of low-level-waste trench covers

    NASA Astrophysics Data System (ADS)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  11. Quantification of the intrusion process at Kīlauea volcano, Hawai'i

    NASA Astrophysics Data System (ADS)

    Wright, Thomas L.; Marsh, Bruce

    2016-12-01

    The characteristic size of two types of intrusions identified beneath Kīlauea's East Rift zone are uniquely estimated by combining time constraints from fractional crystallization and the rates of magma solidification during cooling. Some intrusions were rapidly emplaced as dikes, but stalled before reaching the surface, and cooled and crystallized to feed later fractionated eruptions. More specifically, using the observed time interval between initial emplacement and eruption of fractionated lava, whose degree of fractionation is estimated from petrologic mixing calculations, the extent of solidification or cooling needed to produce this amount of fractionation can be directly inferred. And from the known erupted volumes the spatial extent or size of this fractionated volume can be analytically related to the full size of the source body itself. Two examples yield dike widths of 82 and 68 m. Other intrusions remain close to the east rift magma transport path and are observed to last for decades or longer as viable magma bodies that may participate in feeding later eruptions. The thickness of semi-permanent reservoirs near the East Rift Zone magma transport path can be estimated by assuming a resupply rate that is sufficiently frequent to restrict cooling to < 10 °C. It is inferred that both types of intrusions likely began as dike offshoots from the East Rift Zone magma transport path, but the frequently resupplied bodies may have later been converted to sills or laccoliths of heights estimated at 43-62 m. Our modeled intrusions contrast with models of rapidly emplaced thinner dikes feeding shallow intrusions, which are accompanied by intense rift earthquake swarms and are often associated with eruptions. These calculations show that long-term heating of the wallrock of the magma transport paths serves to slow conduit cooling, which may be partly responsible for sustaining long East Rift Zone eruptions. Adjacent to the vertical transport path beneath K

  12. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  13. Multilayer Statistical Intrusion Detection in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  14. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  15. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  16. Intrusive Method for Uncertainty Quantification in a Multiphase Flow Solver

    NASA Astrophysics Data System (ADS)

    Turnquist, Brian; Owkes, Mark

    2016-11-01

    Uncertainty quantification (UQ) is a necessary, interesting, and often neglected aspect of fluid flow simulations. To determine the significance of uncertain initial and boundary conditions, a multiphase flow solver is being created which extends a single phase, intrusive, polynomial chaos scheme into multiphase flows. Reliably estimating the impact of input uncertainty on design criteria can help identify and minimize unwanted variability in critical areas, and has the potential to help advance knowledge in atomizing jets, jet engines, pharmaceuticals, and food processing. Use of an intrusive polynomial chaos method has been shown to significantly reduce computational cost over non-intrusive collocation methods such as Monte-Carlo. This method requires transforming the model equations into a weak form through substitution of stochastic (random) variables. Ultimately, the model deploys a stochastic Navier Stokes equation, a stochastic conservative level set approach including reinitialization, as well as stochastic normals and curvature. By implementing these approaches together in one framework, basic problems may be investigated which shed light on model expansion, uncertainty theory, and fluid flow in general. NSF Grant Number 1511325.

  17. Modeling of February 1993 Intrusion Seen by JERS-1 Satellite, Kilauea Volcano, Hawaii

    NASA Astrophysics Data System (ADS)

    Moore, S.; Wauthier, C.; Fukushima, Y.; Poland, M. P.

    2016-12-01

    Interferometric Synthetic Aperture Radar (InSAR) is a valuable means of remotely assessing deformation on the surface of the earth. At Kilauea Volcano, Hawai'i many InSAR deformation maps (interferograms) have been studied in recent years to monitor deformation on the volcano. In February 1993, a diking event occurred that could be one of the first intrusions seen by InSAR satellites at Kilauea. This event has not received much attention due to little geodetic data spanning the event. Between October 1992 and March 1993, SAR images from the JERS-1 satellite captured 30 centimeters of surface deformation occurring along the East Rift Zone (ERZ) near Makaopuhi crater. Seismic activity was similar to other intrusions with more than 5,000 shallow (<5 km) earthquakes occurred in the area between the summit caldera and Makaopuhi crater from February 7-9, 1993 [Okubo & Nakata, 2003]. We used simple analytical half-space solutions (e.g., Mogi [1958], Okada [1992)]), as well as a more complex and mechanically robust numerical approach (3D-MBEM [Cayol and Cornet, 1997]) to model deformation sources active between October 1992 and March 1993. Non-linear inversions of the JERS-1 Interferogram show that the most likely source to account for the February 1993 observed deformation is a subvertical rectangular dike with an opening of 1.5 m reaching depths of 1.5 to 3 km.

  18. Intrusive Rock Database for the Digital Geologic Map of Utah

    USGS Publications Warehouse

    Nutt, C.J.; Ludington, Steve

    2003-01-01

    Digital geologic maps offer the promise of rapid and powerful answers to geologic questions using Geographic Information System software (GIS). Using modern GIS and database methods, a specialized derivative map can be easily prepared. An important limitation can be shortcomings in the information provided in the database associated with the digital map, a database which is often based on the legend of the original map. The purpose of this report is to show how the compilation of additional information can, when prepared as a database that can be used with the digital map, be used to create some types of derivative maps that are not possible with the original digital map and database. This Open-file Report consists of computer files with information about intrusive rocks in Utah that can be linked to the Digital Geologic Map of Utah (Hintze et al., 2000), an explanation of how to link the databases and map, and a list of references for the databases. The digital map, which represents the 1:500,000-scale Geologic Map of Utah (Hintze, 1980), can be obtained from the Utah Geological Survey (Map 179DM). Each polygon in the map has a unique identification number. We selected the polygons identified on the geologic map as intrusive rock, and constructed a database (UT_PLUT.xls) that classifies the polygons into plutonic map units (see tables). These plutonic map units are the key information that is used to relate the compiled information to the polygons on the map. The map includes a few polygons that were coded as intrusive on the state map but are largely volcanic rock; in these cases we note the volcanic rock names (rhyolite and latite) as used in the original sources Some polygons identified on the digital state map as intrusive rock were misidentified; these polygons are noted in a separate table of the database, along with some information about their true character. Fields may be empty because of lack of information from references used or difficulty in finding

  19. Externalizing symptoms, effortful control, and intrusive parenting: A test of bidirectional longitudinal relations during early childhood.

    PubMed

    Eisenberg, Nancy; Taylor, Zoe E; Widaman, Keith F; Spinrad, Tracy L

    2015-11-01

    At approximately 30, 42, and 54 months of age (N = 231), the relations among children's externalizing symptoms, intrusive maternal parenting, and children's effortful control (EC) were examined. Both intrusive parenting and low EC have been related to psychopathology, but children's externalizing problems and low EC might affect the quality of parenting and one another. Mothers' intrusive behavior with their children was assessed with observations, children's EC was measured with mothers' and caregivers' reports, and children's externalizing symptoms were assessed with mothers', fathers', and caregivers' reports. In a structural equation panel model, bidirectional relations between intrusive parenting and EC were found: EC at 30 and 42 months predicted low levels of intrusive parenting a year later, controlling for prior levels of parenting and vice versa. Moreover, high levels of children's externalizing problems at both 30 and 42 months negatively predicted EC a year later, controlling for prior levels of EC. Although externalizing problems positively predicted high EC over time, this appeared to be a suppression effect because these variables had a strong negative pattern in the zero-order correlations. Moreover, when controlling for the stability of intrusive parenting, EC, and externalizing (all exhibited significant stability across time) and the aforementioned cross-lagged predictive paths, EC and externalizing problems were still negatively related within the 54-month assessment. The findings are consistent with the view that children's externalizing behavior undermines their EC and contributes to intrusive mothering and that relations between intrusive parenting and EC are bidirectional across time. Thus, interventions that focus on modifying children's externalizing problems (as well as the quality of parenting) might affect the quality of parenting they receive and, hence, subsequent problems with adjustment.

  20. Erosion and intrusion of silicone rubber scleral buckle. Presentation and management.

    PubMed

    Nguyen, Q D; Lashkari, K; Hirose, T; Pruett, R C; McMeel, J W; Schepens, C L

    2001-01-01

    To describe the clinical presentation and management of erosion and intrusion of silicone rubber implants that are used in scleral buckling procedures for the treatment of retinal detachment. The authors identified four patients from their practices during the last 20 years (1978-1998) who had erosion or intrusion of silicone rubber scleral buckles that were used to manage retinal detachment. Approximately 4400 scleral buckling procedures were performed during this period. A retrospective review of the medical records of all patients was performed. Factors that influenced management decisions concerning the intruding buckle are emphasized. All four patients had myopia. The interval between placement of the scleral buckle and development of intrusion ranged from 1 to 20 years. The buckles were intrascleral in three cases and episcleral in one. Recurrent detachment and vitreous hemorrhage were indications for surgical intervention in three cases. After the surgical removal of buckling elements, visual acuity stabilized in all patients and the retina remained attached in all cases. Erosion and intrusion of scleral buckle are rare complications of scleral buckling procedures. The intruding buckle may be left intact unless there is significant threat to the integrity of ocular structures, recurrent detachment, or hemorrhage. Manipulation of the encircling band or buckle does not necessarily alter the visual acuity or the status of the retina.

  1. Intrusion-Tolerant Location Information Services in Intelligent Vehicular Networks

    NASA Astrophysics Data System (ADS)

    Yan, Gongjun; Yang, Weiming; Shaner, Earl F.; Rawat, Danda B.

    Intelligent Vehicular Networks, known as Vehicle-to-Vehicle and Vehicle-to-Roadside wireless communications (also called Vehicular Ad hoc Networks), are revolutionizing our daily driving with better safety and more infortainment. Most, if not all, applications will depend on accurate location information. Thus, it is of importance to provide intrusion-tolerant location information services. In this paper, we describe an adaptive algorithm that detects and filters the false location information injected by intruders. Given a noisy environment of mobile vehicles, the algorithm estimates the high resolution location of a vehicle by refining low resolution location input. We also investigate results of simulations and evaluate the quality of the intrusion-tolerant location service.

  2. Young cumulate complex beneath Veniaminof caldera, Aleutian arc, dated by zircon in erupted plutonic blocks

    USGS Publications Warehouse

    Bacon, C.R.; Sison, T.W.; Mazdab, F.K.

    2007-01-01

    Mount Veniaminof volcano, Alaska Peninsula, provides an opportunity to relate Quaternary volcanic rocks to a coeval intrusive complex. Veniaminof erupted tholeiitic basalt through dacite in the past ???260 k.y. Gabbro, diorite, and miarolitic granodiorite blocks, ejected 3700 14C yr B.P. in the most recent caldera-forming eruption, are fragments of a shallow intrusive complex of cumulate mush and segregated vapor-saturated residual melts. Sensitive high-resolution ion microprobe (SHRIMP) analyses define 238U-230Th isochron ages of 17.6 ?? 2.7 ka, 5+11/-10 ka, and 10.2 ?? 4.0 ka (2??) for zircon in two granodiorites and a diorite, respectively. Sparse zircons from two gabbros give 238-230Th model ages of 36 ?? 8 ka and 26 ?? 7 ka. Zircons from granodiorite and diorite crystallized in the presence of late magmatic aqueous fluid. Although historic eruptions have been weakly explosive Strombolian fountaining and small lava effusions, the young ages of plutonic blocks, as well as late Holocene dacite pumice, are evidence that the intrusive complex remains active and that evolved magmas can segregate at shallow levels to fuel explosive eruptions. ?? 2007 The Geological Society of America.

  3. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    PubMed

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  4. Quasi-horizontal circulation cells in 3D seawater intrusion

    USGS Publications Warehouse

    Abarca, E.; Carrera, J.; Sanchez-Vila, X.; Voss, C.I.

    2007-01-01

    The seawater intrusion process is characterized by the difference in freshwater and seawater density that causes freshwater to float on seawater. Many confined aquifers have a large horizontal extension with respect to thickness. In these cases, while buoyancy acts in the vertical direction, flow is confined between the upper and bottom boundaries and the effect of gravity is controlled by variations of aquifer elevation. Therefore, the effective gravity is controlled by the slope and the shape of the aquifer boundaries. Variability in the topography of the aquifer boundaries is one case where 3D analysis is necessary. In this work, density-dependent flow processes caused by 3D aquifer geometry are studied numerically and specifically, considering a lateral slope of the aquifer boundaries. Sub-horizontal circulation cells are formed in the saltwater entering the aquifer. The penetration of the saltwater can be quantified by a dimensionless buoyancy number that measures the lateral slope of the aquifer relative to freshwater flux. The penetration of the seawater intrusion wedge is controlled more by this slope than by the aquifer thickness and dispersivity. Thus, the slope must be taken into account in order to accurately evaluate seawater intrusion. ?? 2007 Elsevier B.V. All rights reserved.

  5. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks

    PubMed Central

    Navia, Marlon; Campelo, Jose C.; Bonastre, Alberto; Ors, Rafael; Capella, Juan V.; Serrano, Juan J.

    2015-01-01

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature. PMID:26393604

  6. 76 FR 14660 - Public Comment on the Development of Final Guidance for Evaluating the Vapor Intrusion to Indoor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... Groundwater and Soils (Subsurface Vapor Intrusion Guidance) AGENCY: Environmental Protection Agency (EPA... Pathway from Contaminated Groundwater and Soil (Subsurface Vapor Intrusion Guidance). A draft of the... Evaluating Vapor Intrusion to Indoor Air Pathway from Contaminated Groundwater and Soil (Subsurface Vapor...

  7. Intrusive images and voluntary memory for affective pictures: contextualization and dual-task interference.

    PubMed

    Krans, Julie; Langner, Oliver; Reinecke, Andrea; Pearson, David G

    2013-12-01

    The present study addressed the role of context information and dual-task interference during the encoding of negative pictures on intrusion development and voluntary recall. Healthy participants were shown negative pictures with or without context information. Pictures were either viewed alone or concurrently with a visuospatial or verbal task. Participants reported their intrusive images of the pictures in a diary. At follow-up, perceptual and contextual memory was tested. Participants in the context group reported more intrusive images and perceptual voluntary memory than participants in the no context group. No effects of the concurrent tasks were found on intrusive image frequency, but perceptual and contextual memory was affected according to the cognitive load of the task. The analogue method cannot be generalized to real-life trauma and the secondary tasks may differ in cognitive load. The findings challenge a dual memory model of PTSD but support an account in which retrieval strategy, rather than encoding processes, accounts for the experience of involuntary versus voluntary recall. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Multiple levels of bilingual language control: evidence from language intrusions in reading aloud.

    PubMed

    Gollan, Tamar H; Schotter, Elizabeth R; Gomez, Joanne; Murillo, Mayra; Rayner, Keith

    2014-02-01

    Bilinguals rarely produce words in an unintended language. However, we induced such intrusion errors (e.g., saying el instead of he) in 32 Spanish-English bilinguals who read aloud single-language (English or Spanish) and mixed-language (haphazard mix of English and Spanish) paragraphs with English or Spanish word order. These bilinguals produced language intrusions almost exclusively in mixed-language paragraphs, and most often when attempting to produce dominant-language targets (accent-only errors also exhibited reversed language-dominance effects). Most intrusion errors occurred for function words, especially when they were not from the language that determined the word order in the paragraph. Eye movements showed that fixating a word in the nontarget language increased intrusion errors only for function words. Together, these results imply multiple mechanisms of language control, including (a) inhibition of the dominant language at both lexical and sublexical processing levels, (b) special retrieval mechanisms for function words in mixed-language utterances, and (c) attentional monitoring of the target word for its match with the intended language.

  9. Innovative methods to reduce salt water intrusion in harbours

    NASA Astrophysics Data System (ADS)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  10. Petrological evidence for non-linear increase of magmatic intrusion rates before eruption at open vent mafic volcanoe

    NASA Astrophysics Data System (ADS)

    Ruth, D. C. S.; Costa Rodriguez, F.

    2015-12-01

    The most active volcanoes on earth erupt in a yearly to decadal time scales, typically erupt mafic magmas and are open-vent systems with prominent degassing plumes (e.g. Mayon, Arenal, Llaima, Etna). Here we investigate the plumbing systems, dynamics, and processes that drive eruptions at these systems. These are key questions for improving hazard evaluation, and better understanding the unrest associated with these types of volcanoes. The petrology and geochemistry from six historical eruptions (1947-2006) of Mayon volcano (Philippines) shows that all lavas are basaltic andesite with phenocrysts of plagioclase + orthopyroxene (Opx) + clinopyroxene. Opx crystals show a variety of compositions and zoning patterns (reverse, normal or complex) with Mg# (= 100 *Mg/[Mg+Fe]) varying from 67 to 81. The simplest interpretation is that the low Mg# parts of the crystals resided on an upper crustal and crystal rich reservoir that was intruded by more primitive magmas from which the high Mg# parts of the crystals grew. Modelling Mg-Fe diffusion in Opx shows that times since magma injection and eruption range from a few days up to 3.5 years in all of the investigated eruptions. The longest diffusion times are shorter than the repose times between the eruptions, which implies that crystal recycling between eruptive events is negligible. This is a surprising result that shows that for each eruption a different part of the evolved crystal-rich plumbing system is activated. This can be due to random intrusion location or an irreversibility of the plumbing system that prevents multiple eruptions from the same crystal-rich part. Moreover, we find that the number of intrusions markedly increases before each eruption in a non-linear manner. Such an increased rate of intrusions with time might reflect non-linear rheological properties of the crystal-rich system, of the enclosing rocks, or the non-linear evolution of crystal-melt reaction-dissolution fronts during magma intrusions.

  11. Stable isotopic constraints on fluid-rock interaction and Cu-PGE-S redistribution in the Sonju Lake intrusion, Minnesota

    USGS Publications Warehouse

    Park, Y.-R.; Ripley, E.M.; Miller, J.D.; Li, C.; Mariga, J.; Shafer, P.

    2004-01-01

    The Sonju Lake intrusion, part of the 1.1 Ga Midcontinent rift-related Beaver Bay Complex, is a 1,200-m-thick, strongly differentiated, layered sequence of mafic cumulates located in northeastern Minnesota. Basal melatroctolite and dunite layers are overlain by troctolite, gabbro, Fe-Ti oxide-rich gabbro, apatite diorite, and monzodiorite. Stratigraphic intervals rich in Pt + Pd, Cu, and S occur over ???500 m in the Fe-Ti oxide-rich gabbro and apatite diorite units. Peak concentrations show offsets that are similar to those found in other tholeiitic layered intrusions. Concentrations of Pd in excess of 100 ppb are confined to the lowermost 25 m of the interval. Copper shows a sharp increase to 630 ppm above the Pd-rich interval. Sulfur contents are low (<375 ppm) in the Cu-rich interval, but they increase to values as high as 3,150 ppm above in the apatite diorite. Disseminated sulfides in the intrusion have ??34S values that range from -2.2 to 3 per mil Vienna-Canyon Diablo Troilite (V-CDT) and suggest that contamination by country rock sulfur was not an important process in the formation of the metal-rich interval. ??18O values of plagioclase from the intrusion range from 5.6 to 12.0 per mil (V-SMOW) and indicate that a relatively low-18O fluid (??18O ???3-5 ???) interacted with the rocks of the intrusion at temperatures less than ???275??C. Clinopyroxene and Fe-Ti oxides (ilmenite with minor amounts of titanomagnetite) show much more restricted ranges in ??18O values (4.6-5.7 and 5.5-6.7 per mil, respectively) and attest to the kinetic control of the oxygen isotope exchange process. The externally derived fluid that interacted with rocks now enriched in platinum group elements (PGE) + Cu- and Fe-sulfide minerals locally liberated sulfur and replaced chalcopyrite and pyrite with goethite. In the Cu-rich zone, goethite that replaces chalcopyrite may contain up to 8.5 weight percent Cu. It is evident that hydrothermal alteration resulted in a decoupling of copper

  12. DEVELOPMENT OF A SUB-SLAB AIR SAMPLING PROTOCOL TO SUPPORT ASSESSMENT OF VAPOR INTRUSION

    EPA Science Inventory

    The primary purpose of this research effort is to develop a methodology for sub-slab sampling to support the EPA guidance and vapor intrusion investigations after vapor intrusion has been established at a site. Methodologies for sub-slab air sampling are currently lacking in ref...

  13. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    EPA Science Inventory

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  14. Type D personality, stress coping strategies and self-efficacy as predictors of Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Czuczwar, Stanisław Jerzy

    2017-07-01

    Recently, Facebook has become one of the most popular social networking sites. People use it more and more often. A number of studies have recently addressed the issue of excessive Facebook use, showing this phenomenon to be a spreading problem. The main aim of the present study was to examine whether Type D personality, self-efficacy and coping strategies are related to Facebook intrusion. The participants were 882 students of Polish universities, all of them Facebook users (72% women, mean age: 22.25 years, SD =2.06). We used the Facebook Intrusion Questionnaire, the Facebook Intensity Scale, the General Self-Efficacy Scale, the Coping Inventory for Stressful Situations, and the Type D Scale. We applied the pen-and-paper procedure. Our results indicate that emotion-oriented and avoidance-oriented strategies of coping in stressful situations are predictors of Facebook intrusion and Facebook intensity. The relations between both Facebook intrusion and intensity and social inhibition are significant only when emotion-oriented coping strategy is controlled. The knowledge of whether coping strategies in stressful situations, such as focus on emotions or avoidance, are related to Facebook intrusion might be useful for clinical purposes. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  15. Prediction of changes due to mandibular autorotation following miniplate-anchored intrusion of maxillary posterior teeth in open bite cases.

    PubMed

    Kassem, Hassan E; Marzouk, Eiman S

    2018-05-14

    Prediction of the treatment outcome of various orthodontic procedures is an essential part of treatment planning. Using skeletal anchorage for intrusion of posterior teeth is a relatively novel procedure for the treatment of anterior open bite in long-faced subjects. Data were analyzed from lateral cephalometric radiographs of a cohort of 28 open bite adult subjects treated with intrusion of the maxillary posterior segment with zygomatic miniplate anchorage. Mean ratios and regression equations were calculated for selected variables before and after intrusion. Relative to molar intrusion, there was approximately 100% vertical change of the hard and soft tissue mention and 80% horizontal change of the hard and soft tissue pogonion. The overbite deepened two folds with 60% increase in overjet. The lower lip moved forward about 80% of the molar intrusion. Hard tissue pogonion and mention showed the strongest correlations with molar intrusion. There was a general agreement between regression equations and mean ratios at 3 mm molar intrusion. This study attempted to provide the clinician with a tool to predict the changes in key treatment variables following skeletally anchored maxillary molar intrusion and autorotation of the mandible.

  16. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    USGS Publications Warehouse

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  17. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    PubMed

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  18. Repeated magmatic intrusions at El Hierro Island following the 2011-2012 submarine eruption

    NASA Astrophysics Data System (ADS)

    Benito-Saz, Maria A.; Parks, Michelle M.; Sigmundsson, Freysteinn; Hooper, Andrew; García-Cañada, Laura

    2017-09-01

    After more than 200 years of quiescence, in July 2011 an intense seismic swarm was detected beneath the center of El Hierro Island (Canary Islands), culminating on 10 October 2011 in a submarine eruption, 2 km off the southern coast. Although the eruption officially ended on 5 March 2012, magmatic activity continued in the area. From June 2012 to March 2014, six earthquake swarms, indicative of magmatic intrusions, were detected underneath the island. We have studied these post-eruption intrusive events using GPS and InSAR techniques to characterize the ground surface deformation produced by each of these intrusions, and to determine the optimal source parameters (geometry, location, depth, volume change). Source inversions provide insight into the depth of the intrusions ( 11-16 km) and the volume change associated with each of them (between 0.02 and 0.13 km3). During this period, > 20 cm of uplift was detected in the central-western part of the island, corresponding to approximately 0.32-0.38 km3 of magma intruded beneath the volcano. We suggest that these intrusions result from deep magma migrating from the mantle, trapped at the mantle/lower crust discontinuity in the form of sill-like bodies. This study, using joint inversion of GPS and InSAR data in a post-eruption period, provides important insight into the characteristics of the magmatic plumbing system of El Hierro, an oceanic intraplate volcanic island.

  19. The relationship between loss of parents in the holocaust, intrusive memories, and distress among child survivors.

    PubMed

    Letzter-Pouw, Sonia; Werner, Perla

    2012-04-01

    The prevalence of intrusive memories of the Holocaust and their relationship to distress was examined among 272 child survivors in Israel. Using attachment theory as a conceptual framework, the authors also examined the effects of type of experience and loss of parents in the Holocaust, psychological resources, other life events, and sociodemographic characteristics on distress and symptomatic behavior. Eighty five percent of the participants reported suffering from intrusive memories. Structural equation modeling showed that survivors who lost one or both parents in the Holocaust suffered more distress because of more intrusive memories. These findings suggest that intrusive memories may be part of unfinished mourning processes related to the loss of parents in the Holocaust. © 2012 American Orthopsychiatric Association.

  20. Unconventional maar diatreme and associated intrusions in the soft sediment-hosted Mardoux structure (Gergovie, France)

    NASA Astrophysics Data System (ADS)

    Valentine, Greg A.; van Wyk de Vries, Benjamin

    2014-03-01

    A Miocene age volcanic-hypabyssal structure comprising volcaniclastic deposits and mafic intrusions is exposed with vertical relief of ˜110 m on the side of Gergovie Plateau (Auvergne, France). Three main volcaniclastic facies are: (1) Fluidal tuff breccia composed of juvenile basalt and sediment clasts with dominantly fluidal shapes, with several combinations of basalt and sediment within individual clasts. (2) Thickly bedded lapilli tuff composed of varying proportions of fine-grained sediment derived from Oligocene-Miocene lacustrine marls and mudstones and basaltic lapilli, blocks, and bombs. (3) Planar-bedded tuff forming thin beds of fine to coarse ash-size sedimentary material and basalt clasts. Intrusive bodies in the thickly bedded lapilli tuff range from irregularly shaped and anastomosing dikes and sills of meters to tens of meters in length, to a main feeder dike that is up to ˜20 m wide, and that flares into a spoon-shaped sill at ˜100 m in diameter and 10-20 m thick in the eastern part of the structure. Volcaniclastic deposits and structural features suggest that ascending magma entrained soft, saturated sediment host material into the feeder dike and erupted fluidal magma and wet sediment via weak, Strombolian-like explosions. Host sediment and erupted material subsided to replace the extracted sediments, producing the growth subsidence structure that is similar to upper diatreme facies in typical maar diatremes but lacks evidence for explosive disruption of diatreme fill. Irregularly shaped small intrusions extended from the main feeder dike into the diatreme, and many were disaggregated due to shifting and subsidence of diatreme fill and recycled via eruption. The Mardoux structure is an "unconventional" maar diatreme in that it was produced mainly by weak explosive activity rather than by violent phreatomagmatic explosions and is an example of complex coupling between soft sediment and ascending magma.

  1. Report: Lack of Final Guidance on Vapor Intrusion Impedes Efforts to Address Indoor Air Risks

    EPA Pesticide Factsheets

    Report #10-P-0042, December 14, 2009. EPA’s efforts to protect human health at sites where vapor intrusion risks may occur have been impeded by the lack of final Agency guidance on vapor intrusion risks.

  2. Intrusive luxation in primary teeth – Review of literature and report of a case

    PubMed Central

    Gupta, Megha

    2011-01-01

    Luxation injuries such as intrusion are commonly seen in the primary dentition. Intrusion drives the tooth deeper into the alveolar socket, which results in damage to the pulp and peridontium. Difficulty in gaining compliance from a very young child and the risk of damaging the permanent tooth germ makes the management of these injuries challenging. Careful clinical and radiographic examination along with regular follow-up is essential. A case of intrusive luxation to the maxillary central incisor in a 3-year-old patient is reported. Spontaneous reeruption was noted 4 months after injury, but the tooth had developed an abscess and external root resorption. Hence, extraction of the tooth was done and an anterior esthetic fixed space maintainer was placed. Traumatic injuries to the primary dentition should not be ignored by the parents or by the dentist. The paper also includes a literature review of intrusive luxation in the primary dentition. PMID:23960512

  3. Identifying and forecasting deep stratospheric ozone intrusions over the western United States from space

    NASA Astrophysics Data System (ADS)

    Lin, M.; Fiore, A. M.; Horowitz, L. W.; Cooper, O. R.; Langford, A. O.; Pan, L.; Liu, X.; Reddy, P. J.

    2012-12-01

    Recent studies have shown that deep stratospheric ozone intrusions can episodically enhance ground-level ozone above the health-based standard over the western U.S. in spring. Advanced warning of incoming intrusions could be used by state agencies to inform the public about poor air quality days. Here we explore the potential for using total ozone retrievals (version 5.2, level 3) at twice daily near global coverage from the AIRS instrument aboard the NASA Aqua satellite to identify stratospheric intrusions and forecast the eventual surface destination of transported stratospheric ozone. The method involves the correlation of AIRS daily total ozone columns at each 1ox1o grid box ~1-3 days prior to stratospheric enhancements to daily maximum 8-hour average ozone at a selected surface site using datasets from April to June in 2003-2011. The surface stratospheric enhancements are estimated by the GFDL AM3 chemistry-climate model which includes full stratospheric and tropospheric chemistry and is nudged to reanalysis winds. Our earlier work shows that the model presents deep stratospheric intrusions over the Western U.S. consistently with observations from AIRS, surface networks, daily ozone sondes, and aircraft lidar available in spring of 2010 during the NOAA CalNex field campaign. For the 15 surface sites in the U.S. Mountain West considered, a correlation coefficient of 0.4-0.7 emerges with AIRS ozone columns over 30o-50oN latitudes and 125o-105oW longitudes - variability in the AIRS column within this spatial domain indicates incoming intrusions. For each "surface receptor site", the spatial domain can narrow to an area ~5ox5o northwest of the individual site, with the strong correlation (0.5-0.7) occurring when the AIRS data is lagged by 1 day from the AM3 stratospheric enhancements in surface air. The spatial pattern of correlations is consistent with our process-oriented understanding developed from case studies of extreme intrusions. Surface observations

  4. Acoustic emission intrusion detector

    DOEpatents

    Carver, Donald W.; Whittaker, Jerry W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  5. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    PubMed Central

    Dreano, Denis; Raitsos, Dionysios E.; Gittings, John; Krokos, George; Hoteit, Ibrahim

    2016-01-01

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)—the Ocean Color Climate Change Initiative (OC-CCI)—has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin’s shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms. PMID:28006006

  6. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    NASA Astrophysics Data System (ADS)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  7. Intrusion of Soil Water through Pipe Cracks

    EPA Science Inventory

    This report describes a series of experiments conducted at U.S. EPA’s Test and Evaluation Facility in 2013-2014 to study the intrusion of contaminated soil water into a pipe crack during simulated backflow events. A test rig was used consisting of a 3’ x 3’ x 3’ acrylic soil bo...

  8. LANDSAT and radar mapping of intrusive rocks in SE-Brazil

    NASA Technical Reports Server (NTRS)

    Parada, N. D. J. (Principal Investigator); Dossantos, A. R.; Dosanjos, C. E.; Moreira, J. C.; Barbosa, M. P.; Veneziani, P.

    1982-01-01

    The feasibility of intrusive rock mapping was investigated and criteria for regional geological mapping established at the scale of 1:500,00 in polycyclic and polymetamorphic areas using the logic method of photointerpretation of LANDSAT imagery and radar from the RADAMBRASIL project. The spectral behavior of intrusive rocks, was evaluated using the interactive multispectral image analysis system (Image-100). The region of Campos (city) in northern Rio de Janeiro State was selected as the study area and digital imagery processing and pattern recognition techniques were applied. Various maps at the 2:250,000 scale were obtained to evaluate the results of automatic data processing.

  9. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island.

    NASA Astrophysics Data System (ADS)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen

    2017-04-01

    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  10. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    PubMed

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  11. User's Guide for Evaluating Subsurface Vapor Intrusion into Buildings

    EPA Pesticide Factsheets

    This revised version of the User's Guide corresponds with the release of Version 3.1 of the Johnson and Ettinger (1991) model (J E) spreadsheets for estimating subsurface vapor intrusion into buildings.

  12. Assessment of TDEM data sensitivity to changes in geoelectric structure as a result of saltwater intrusion

    NASA Astrophysics Data System (ADS)

    Nenna, V.; Knight, R. J.

    2011-12-01

    Pressure from increasing population as well as agricultural and industrial use of freshwater coastal aquifers makes these groundwater resources increasingly vulnerable to saltwater intrusion. Effective management strategies are required to protect these aquifers from overuse and salination. However, development and implementation of these strategies is often complicated by limited information about the complex hydrogeologic structures, properties and processes that govern groundwater flow and saltwater intrusion. To justify the cost of acquiring additional information, water managers need to demonstrate that the value of the acquired information, in terms of the ability to make a decision, exceeds the cost. Traditional hydrologic measurements from wells can give accurate information on hydrogeologic properties, but they are costly and spatially limited. In this study, we propose the use of time-domain electromagnetic (TDEM) methods as a non-invasive alternative to traditional hydrologic measurements for characterizing saltwater intrusion in an unconfined aquifer in Northern California. The aquifer system in this region consists of the unconfined aquifer and an underlying confined freshwater aquifer, which are separated by a clay layer. At our research site, the water in the unconfined aquifer is saline in places, but the underlying, confined aquifer shows no evidence of saltwater intrusion. Water managers require information about the hydraulic connectivity of these two aquifers, as well as the extent of saltwater intrusion in the unconfined aquifer to mitigate the potential for saltwater intrusion into the confined freshwater aquifer. Prior to October 2007, four monitoring wells were drilled approximately 100 m inland from the coast and spanning roughly 300 m from south to north. Wells were drilled to depths between 280 m and 460 m. During construction, lithology information and drilling samples were collected on 1.5 m intervals. Induction logs were also collected

  13. Theoretical prediction of gold vein location in deposits originated by a wall magma intrusion

    NASA Astrophysics Data System (ADS)

    Martin, Pablo; Maass-Artigas, Fernando; Cortés-Vega, Luis

    2016-05-01

    The isotherm time-evolution resulting from the intrusion of a hot dike in a cold rock is analized considering the general case of nonvertical walls. This is applied to the theoretical prediction of the gold veins location due to isothermal evolution. As in previous treatments earth surface effects are considered and the gold veins are determined by the envelope of the isotherms. The locations of the gold veins in the Callao mines of Venezuela are now well predicted. The new treatment is now more elaborated and complex that in the case of vertical walls, performed in previous papers, but it is more adequated to the real cases as the one in El Callao, where the wall is not vertical.

  14. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    NASA Astrophysics Data System (ADS)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  15. Assessment of regional management strategies for controlling seawater intrusion

    USGS Publications Warehouse

    Reichard, E.G.; Johnson, T.A.

    2005-01-01

    Simulation-optimization methods, applied with adequate sensitivity tests, can provide useful quantitative guidance for controlling seawater intrusion. This is demonstrated in an application to the West Coast Basin of coastal Los Angeles that considers two management options for improving hydraulic control of seawater intrusion: increased injection into barrier wells and in lieu delivery of surface water to replace current pumpage. For the base-case optimization analysis, assuming constant groundwater demand, in lieu delivery was determined to be most cost effective. Reduced-cost information from the optimization provided guidance for prioritizing locations for in lieu delivery. Model sensitivity to a suite of hydrologic, economic, and policy factors was tested. Raising the imposed average water-level constraint at the hydraulic-control locations resulted in nonlinear increases in cost. Systematic varying of the relative costs of injection and in lieu water yielded a trade-off curve between relative costs and injection/in lieu amounts. Changing the assumed future scenario to one of increasing pumpage in the adjacent Central Basin caused a small increase in the computed costs of seawater intrusion control. Changing the assumed boundary condition representing interaction with an adjacent basin did not affect the optimization results. Reducing the assumed hydraulic conductivity of the main productive aquifer resulted in a large increase in the model-computed cost. Journal of Water Resources Planning and Management ?? ASCE.

  16. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    EPA Science Inventory

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  17. Late Cretaceous and early Tertiary plutonism and deformation in the Skagit Gneiss Complex, north Cascade Range, Washington and British Columbia

    USGS Publications Warehouse

    Haugerud, R.A.; Van Der Heyden, P.; Tabor, R.W.; Stacey, J.S.; Zartman, R.E.

    1991-01-01

    The Skagit Gneiss Complex forms a more-or-less continuous terrane within the North Cascade Range. The complex comprises abundant plutons intruded at mid-crustal depths into a variety of metamorphosed supracrustal rocks of both oceanic and volcanic-arc origin. U-Pb zircon ages from gneissis plutons within and near the Skagit Gneiss Complex indicate magmatic crystallziations between 75 and 60 Ma. Deformation, recrystallization, and migmatization in part postdate intrusion of the 75-60 Ma plutons. This latest Cretaceous and earliest Tertiary plutonism and migmatization may reflect thermal relaxation following early Late Cretaceous orogeny. The complex was ductilely extended northwest-southeast shortly after intrusion of granite dikes at ~45 Ma, but before emplacement of the earliest (~34 Ma) plutons of the Cascade arc. -from Authors

  18. Music effects on EEG in intrusive and withdrawn mothers with depressive symptoms.

    PubMed

    Tornek, Alexandra; Field, Tiffany; Hernandez-Reif, Maria; Diego, Miguel; Jones, Nancy

    2003-01-01

    The EEG patterns of 48 intrusive and withdrawn mothers with depressive symptoms were assessed following a 20-minute music session to determine if the music had mood-altering effects. Half the mothers listened to classical music while half listened to rock music. Intrusive mothers were expected to have more positive responses and more symmetrical EEG following the calming classical music, while withdrawn mothers were expected to have a more positive response and symmetrical EEG following the energizing rock music. Although more positive EEGs were noted for rock music in both groups, only the withdrawn mothers showed a significant change in EEG toward symmetry following rock music, and only the intrusive mothers showed a decrease in cortisol levels following the rock music. Their State Anxiety Inventory (STAI) anxiety levels also decreased, while the Profile of Mood States (POMS) depressed mood levels decreased significantly for all four groups following music.

  19. Quantitation by Portable Gas Chromatography: Mass Spectrometry of VOCs Associated with Vapor Intrusion

    PubMed Central

    Fair, Justin D.; Bailey, William F.; Felty, Robert A.; Gifford, Amy E.; Shultes, Benjamin; Volles, Leslie H.

    2010-01-01

    Development of a robust reliable technique that permits for the rapid quantitation of volatile organic chemicals is an important first step to remediation associated with vapor intrusion. This paper describes the development of an analytical method that allows for the rapid and precise identification and quantitation of halogenated and nonhalogenated contaminants commonly found within the ppbv level at sites where vapor intrusion is a concern. PMID:20885969

  20. Non-intrusive practitioner pupil detection for unmodified microscope oculars.

    PubMed

    Fuhl, Wolfgang; Santini, Thiago; Reichert, Carsten; Claus, Daniel; Herkommer, Alois; Bahmani, Hamed; Rifai, Katharina; Wahl, Siegfried; Kasneci, Enkelejda

    2016-12-01

    Modern microsurgery is a long and complex task requiring the surgeon to handle multiple microscope controls while performing the surgery. Eye tracking provides an additional means of interaction for the surgeon that could be used to alleviate this situation, diminishing surgeon fatigue and surgery time, thus decreasing risks of infection and human error. In this paper, we introduce a novel algorithm for pupil detection tailored for eye images acquired through an unmodified microscope ocular. The proposed approach, the Hough transform, and six state-of-the-art pupil detection algorithms were evaluated on over 4000 hand-labeled images acquired from a digital operating microscope with a non-intrusive monitoring system for the surgeon eyes integrated. Our results show that the proposed method reaches detection rates up to 71% for an error of ≈3% w.r.t the input image diagonal; none of the state-of-the-art pupil detection algorithms performed satisfactorily. The algorithm and hand-labeled data set can be downloaded at:: www.ti.uni-tuebingen.de/perception. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Immiscibility of Fluid Phases at Magmatic-hydrothermal Transition: Formation of Various PGE-sulfide Mineralization for Layered Basic Intrusions

    NASA Astrophysics Data System (ADS)

    Zhitova, L.; Borisenko, A.; Morgunov, K.; Zhukova, I.

    2007-12-01

    Fluid inclusions in quartz of the Merensky Reef (Bushveld Complex, South Africa) and the Chineisky Pluton (Transbaikal Region, Russia) were studied using cryometry, microthermometry, Raman-spectroscopy, LA ICP- MS, scanning electronic microscopy, gas-chromatography and isotopic methods. This allowed us to document some examples of fluid phase separation resulting in formation of different types of PGE-sulfide mineralization for layered basic intrusions. The results obtained show at least three generations of fluid separated from boiling residual alumosilicate intercumulus liquid of the Merensky Reef. The earliest fluid phase composed of homogenous high-dense methane and nitrogen gas mixture was identified in primary gas and co-existing anomalous fluid inclusions from symplectitic quartz. The next generation, heterophase fluid, composed of brines containing a free low-dense (mostly of carbon dioxide) gas phase, was observed in primary multiphase and coexisting gas-rich inclusions of miarolitic quartz crystals. The latest generation was also a heterophase fluid (low salinity water-salt solution and free low-dense methane gas phase) found in primary water-salt and syngenetic gas inclusions from peripheral zones of miarolitic quartz crystals. For the Chineisky Pluton reduced endocontact magmatogene fluids changed to oxidized low salinity hydrothermal fluids in exocontact zone. This resulted in formation of sulfide-PGE enrichment marginal zones of intrusion. The results obtained give us a possibility to suggest that: 1) Fluid phase separation is a typical feature of magmatogene fluids for layered basic intrusions. 2) Reduced fluids can extract and transport substantial PGE and sulfide concentrations. 3) Oxidation of reduced fluids is one of the most important geochemical barriers causing abundant PGE minerals and sulfides precipitation. This in turn results in both formation of PGE reefs or enriched contact zones of layered basic intrusions. This work was supported by

  2. Disequilibrium growth of olivine in mafic magmas revealed by phosphorus zoning patterns of olivine from mafic-ultramafic intrusions

    NASA Astrophysics Data System (ADS)

    Xing, Chang-Ming; Wang, Christina Yan; Tan, Wei

    2017-12-01

    Olivine from mafic-ultramafic intrusions rarely displays growth zoning in major and some minor elements, such as Fe, Mg and Ni, due to fast diffusion of these elements at high temperatures. These elements in olivine are thus not useful in deciphering magma chamber processes, such as magma convection, multiple injection and mixing. High-resolution X-ray elemental intensity mapping reveals distinct P zoning patterns of olivine from two mafic-ultramafic intrusions in SW China. Polyhedral olivine grains from lherzolite and dunite of the Abulangdang intrusion show P-rich dendrites similar to those observed in volcanic rocks. Rounded olivine grains from net-textured Fe-Ti oxide ores of the Baima layered intrusion have irregular P-rich patches/bands crosscut and interlocked by P-poor olivine domains. P-rich patches/bands contain 250 to 612 ppm P, much higher than P-poor olivine domains with 123 to 230 ppm P. In electron backscattered diffraction (EBSD) maps, P-rich patches/bands within a single olivine grain have the same crystallographic orientation, indicating that they were remnants of the same crystal. Thus, both P-rich patches/bands and P-poor olivine domains in the same grain show a disequilibrium texture and clearly record two-stage growth. The P-rich patches/bands are likely the remnants of a polyhedral olivine crystal that formed in the first stage, whereas the P-poor olivine domains containing rounded Ti-rich magnetite and Fe-rich melt inclusions may have formed from an Fe-rich ambient melt in the second stage. The complex P zoning of olivine can be attributed to the dissolution of early polyhedral olivine and re-precipitation from the Fe-rich ambient melt. The early polyhedral olivine was in chemical disequilibrium with the ambient melt that may have been developed by silicate liquid immiscibility in a crystal mush. Our study implies that olivine crystals in igneous cumulates with an equilibrium appearance may have experienced disequilibrium growth processes

  3. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

    PubMed Central

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-01-01

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu–Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors. PMID:23529146

  4. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features.

    PubMed

    Amudha, P; Karthik, S; Sivakumari, S

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different.

  5. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    PubMed Central

    Amudha, P.; Karthik, S.; Sivakumari, S.

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  6. A distributed signature detection method for detecting intrusions in sensor systems.

    PubMed

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-03-25

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

  7. Individual differences in experiencing intrusive memories: the role of the ability to resist proactive interference.

    PubMed

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J

    2009-06-01

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N=91) completed a self-report measure of intrusive memories, and carried out experimental tasks intended to measure two different types of inhibition: resistance to proactive interference and response inhibition (i.e., the ability to prevent automatically triggered responses). The results showed a significant relationship between inhibition at the cognitive level (i.e., resistance to proactive interference) and the frequency of intrusive memories (especially in the group of female participants) whereas no such relationship with measures of response inhibition emerged. These findings are consistent with the idea that deficient inhibitory control reflects a vulnerability factor for experiencing intrusive memories. Implications for research investigating risk factors for the development of posttraumatic stress disorder (PTSD) are discussed.

  8. Comparison of the intrusion effects on the maxillary incisors between implant anchorage and J-hook headgear.

    PubMed

    Deguchi, Toru; Murakami, Takashi; Kuroda, Shingo; Yabuuchi, Toshinori; Kamioka, Hiroshi; Takano-Yamamoto, Teruko

    2008-05-01

    Recently, miniscrews have been used to provide anchorage during orthodontic treatment, especially for incisor intrusion. Miniscrews during incisor intrusion are commonly used in implant orthodontics. Traditionally, effective incisor intrusion has been accomplished with J-hook headgear. In this study, we compared the effect of incisor intrusion, force vector, and amount of root resorption between implant orthodontics and J-hook headgear. Lateral cephalometric radiographs from 8 patients in the implant group and 10 patients in the J-hook headgear group were analyzed for incisor retraction. The estimated force vector was analyzed in the horizontal and vertical directions in both groups. Root resorption was also measured on periapical radiographs. In the implant group, significant reductions in overjet, overbite, maxillary incisor to palatal plane, and maxillary incisor to upper lip were observed after intrusion of the incisors. In the J-hook headgear group, significant reductions in overjet, overbite, maxillary incisor to upper lip, and maxillary incisor to SN plane were observed after intrusion of the incisors. There were significantly greater reductions in overbite, maxillary incisor to palatal plane, and maxillary incisor to upper lip in the implant group than in the J-hook headgear group. Estimated force analysis resulted in significantly more force in the vertical direction and less in the horizontal direction in the implant group. Furthermore, significantly less root resorption was observed in the implant group compared with the J-hook headgear group. The maxillary incisors were effectively intruded by using miniscrews as orthodontic anchorage without patient cooperation. The amount of root resorption was not affected by activating the ligature wire from the miniscrew during incisor intrusion.

  9. No Evidence for Connectivity between the Bushveld Igneous Complex and the Molopo Farms Complex from Forward Modeling of Receiver Functions

    NASA Astrophysics Data System (ADS)

    Skryzalin, P. A.; Ramirez, C.; Durrheim, R. J.; Raveloson, A.; Nyblade, A.; Feineman, M. D.

    2016-12-01

    The Bushveld Igneous Complex contains one of the most studied and economically important layered mafic intrusions in the world. The Rustenburg Layered Suite outcrops in northern South Africa over an area of 65,000 km2, and has a volume of up to 1,000,000 km3. Both the Bushveld Igneous Complex and the Molopo Farms Complex in Botswana intruded the crust at 2.05 Ga. Despite being extensively exploited by the mining industry, many questions still exist regarding the structure of the Bushveld Igneous Complex, specifically the total size and connectivity of the different outcrops. In this study, we used receiver function analysis, a technique for determining the seismic velocity structure of the crust and upper mantle, to search for evidence of the Bushveld at station LBTB, which lies in Botswana, between the Far Western Limb of the Bushveld and the Molopo Farms Complex. The goal of our study was to determine whether a fast, high-density mafic body can be seen in the crust beneath this region using receiver functions. Observation of a high density layer would argue in favor of connectivity of the Bushveld between The Far Western Limb and the Molopo Farms Complex. We forward modeled stacks of receiver functions as well as sub-stacks that were split into azimuthal groups which share similar characteristics. We found that there was no evidence for a high velocity zone in the crust, and that the Moho in this region is located at a depth of 38 ± 3 km, about 8-9 km shallower than Moho depths determined beneath the Bushveld Complex. These two lines of evidence give no reason to assume connectivity between the Bushveld Igneous Complex and the Molopo Farms Complex, and rather suggest two separate intrusive suites.

  10. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.F.; Maccabe, A.B.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  11. Investigating the long-term geodetic response to magmatic intrusions at volcanoes in northern California

    NASA Astrophysics Data System (ADS)

    Parker, A. L.; Biggs, J.; Annen, C.; Houseman, G. A.; Yamasaki, T.; Wright, T. J.; Walters, R. J.; Lu, Z.

    2014-12-01

    Ratios of intrusive to extrusive activity at volcanic arcs are thought to be high, with estimates ranging between 5:1 and 30:1. Understanding the geodetic response to magmatic intrusion is therefore fundamental to large-scale studies of volcano deformation, providing insight into the dynamics of the inter-eruptive period of the volcano cycle and the building of continental crust. In northern California, we identify two volcanoes - Medicine Lake Volcano (MLV) and Lassen Volcanic Center (LaVC) - that exhibit long-term (multi-decadal) subsidence. We test the hypothesis that deformation at these volcanoes results from processes associated with magmatic intrusions. We first constrain the spatial and temporal characteristics of the deformation fields, establishing the first time-series of deformation at LaVC using InSAR data, multi-temporal analysis techniques and global weather models. Although the rates of deformation at the two volcanoes are similar (~1 cm/yr), our results show that the ratio of vertical to horizontal displacements is significantly different, suggesting contrasting source geometries. To test the origin of deformation, we develop modeling strategies to investigate thermal and viscoelastic processes associated with magmatic intrusions. The first model we develop couples analytical geodetic models to a numerical model of volume loss due to cooling and crystallization based upon temperature-melt fraction relationships from petrological experiments. This model provides evidence that magmatic intrusion at MLV has occurred more recently than the last eruption ~1 ka. The second model we test uses a finite element approach to simulate the time-dependent viscoelastic response of the crust to magmatic intrusion. We assess the magnitude and timescales of ground deformation that may result from these processes, exploring the model parameter space before applying the models to our InSAR observations of subsidence in northern California.

  12. Executive functions in adolescents with spina bifida: relations with autonomy development and parental intrusiveness.

    PubMed

    Tuminello, Elizabeth R; Holmbeck, Grayson N; Olson, Rick

    2012-01-01

    The current study was part of a larger longitudinal investigation and examined the relation of parent-report and performance measures of executive functioning (EF) with measures of behavioral and emotional autonomy and parental intrusiveness in adolescents with and without spina bifida (SB; n=65 in a comparison sample and 61 in an SB sample; M age=14.55, SD=0.63). For both groups, higher levels of parent-reported EF problems predicted higher levels of observed child dependency and lower levels of teacher-reported intrinsic motivation. Higher scores on performance EF measures predicted lower levels of observed child dependency and observed maternal intrusiveness for both groups. In adolescents with SB only, higher performance EF scores predicted higher intrinsic motivation and emotional autonomy from both mother and father and predicted lower levels of observed paternal intrusiveness. While causal conclusions cannot be drawn, EFs appear to be closely related to autonomy development and parental intrusiveness, particularly for adolescents with SB. These results suggest that the inclusion of EF training in interventions targeting adolescents with SB may be beneficial for autonomy development.

  13. Petrology and chemistry of Jebel Tanumah complex, Khamis Mushayt, Southern Arabian shield, Saudi Arabia

    NASA Astrophysics Data System (ADS)

    Nassief, M. O.; Ali, H. M.; Zakir, F. A.

    The mafic intrusive complex at Jebel Tanumah is located 15 km north-west of Khamis Mushayt in the southern Arabian Shield and includes olivine-bearing gabbro as well as amphibole-diopside-hornblende gabbro cumulates. These rocks have been generally metamorphosed to upper greeenschist-lower amphibolite facies. Fourteen white rock silicate analyses indicate that the majority of the rocks are calc-alkaline to tholeiitic in composition. The two major structural units in the Khamis Mushayt region identified by Coleman consist of the basement complex of Asir Mountains and the younger metamorphic rocks. Syntectonic granitic rocks intruded the antiforms characterizing the younger rocks whereas the lower parts of the synforms are intruded by post-tectonic intrusions of layered gabbros such as the one studied at Jebel Tanumah.

  14. Geochemistry and tectonic implications of the Early Carboniferous Keketuobie intrusion in the West Junggar foldbelt, NW China

    NASA Astrophysics Data System (ADS)

    Deng, Yu-Feng; Yuan, Feng; Zhou, Taofa; Hollings, Pete; Zhang, Dayu

    2018-06-01

    The Keketuobie intrusion is situated in the northern part of the West Junggar foldbelt at the southern margin of the Central Asian Orogeic Belt. The intrusion consists of medium- to coarse-grained gabbro, fine-grained gabbro and diorite. Igneous zircons from the medium- to coarse-grained gabbro yielded a LA-ICP-MS U-Pb age of 320.8 ± 5.7 Ma, indicating that the intrusion was emplaced in the Early Carboniferous. The intrusive contact between the medium- to coarse-grained gabbro and the fine-grained gabbro indicates they formed from distinct magma pulses. Magnetite crystals from the fine-grained gabbro have lower V2O3 but higher TiO2 and Al2O3 contents than those of the medium- to coarse-grained gabbro, suggesting that the fine-grained gabbro crystallized in a relatively higher fO2 and temperature magma than the medium- to coarse-grained gabbro. The Keketuobie intrusive rocks are characterized by enriched large ion lithophile elements and depleted high field strength elements relative to N-MORB with restricted (87Sr/86Sr)t ratios (0.70370-0.70400) and εNd(t) values (+5.85 to +6.97). The petrography and geochemistry are comparable to those of subduction-related volcanic rocks. The trace elements and isotopic compositions of the mafic intrusive rocks suggest that the primary magmas were derived from mixing of metasomatized lithospheric mantle and depleted asthenospheric melts, perhaps triggered by slab break-off. The Keketuobie intrusion is younger than adjacent ophiolite sequences, island arc volcanic rocks and porphyry deposits, but predates the post-collisional A-type granites and bimodal volcanic rocks in the district, suggesting that the Keketuobie intrusion likely formed in a syn-collisional setting.

  15. Geophysical characterization of saltwater intrusion in a coastal aquifer: The case of Martil-Alila plain (North Morocco)

    NASA Astrophysics Data System (ADS)

    Himi, Mahjoub; Tapias, Josefiina; Benabdelouahab, Sara; Salhi, Adil; Rivero, Luis; Elgettafi, Mohamed; El Mandour, Abdenabi; Stitou, Jamal; Casas, Albert

    2017-02-01

    Several factors can affect the quantity and the quality of groundwater resources, but in coastal aquifers seawater intrusion is often the most significant issue regarding freshwater supply. Further, saltwater intrusion is a worldwide issue because about seventy percent of the world's population lives in coastal regions. Generally, fresh groundwater not affected by saltwater intrusion is characterized by low salinity and therefore low electrical conductivity (EC) values. Consequently, high values of EC in groundwater along the coastline are usually associated to seawater intrusion. This effect is amplified if the coastal aquifer is overexploited with a subsequent gradual displacement of the freshwater-saltwater interface towards the continent. Delineation of marine intrusion in coastal aquifers has traditionally relied upon observation wells and collection of water samples. This approach may miss important hydrologic features related to saltwater intrusion in areas where access is difficult and where wells are widely spaced. Consequently, the scarcity of sampling points and sometimes their total absence makes the number of data available limited and most of the time not representative for mapping the spatial and temporal variability of groundwater salinity. In this study, we use a series of geophysical methods for characterizing the aquifer geometry and the extension of saltwater intrusion in the Martil-Alila coastal region (Morocco) as a complement to geological and hydrogeochemical data. For this reason, we carried out three geophysical surveys: Gravity, Electrical Resistivity and Frequency Domain Electromagnetic. The geometry of the basin has been determined from the interpretation of a detailed gravity survey. Electrical resistivity models derived from vertical electrical soundings allowed to characterize the vertical and the lateral extensions of aquifer formations. Finally, frequency domain electromagnetic methods allowed delineating the extension of the

  16. First steps in using machine learning on fMRI data to predict intrusive memories of traumatic film footage

    PubMed Central

    Clark, Ian A.; Niehaus, Katherine E.; Duff, Eugene P.; Di Simplicio, Martina C.; Clifford, Gari D.; Smith, Stephen M.; Mackay, Clare E.; Woolrich, Mark W.; Holmes, Emily A.

    2014-01-01

    After psychological trauma, why do some only some parts of the traumatic event return as intrusive memories while others do not? Intrusive memories are key to cognitive behavioural treatment for post-traumatic stress disorder, and an aetiological understanding is warranted. We present here analyses using multivariate pattern analysis (MVPA) and a machine learning classifier to investigate whether peri-traumatic brain activation was able to predict later intrusive memories (i.e. before they had happened). To provide a methodological basis for understanding the context of the current results, we first show how functional magnetic resonance imaging (fMRI) during an experimental analogue of trauma (a trauma film) via a prospective event-related design was able to capture an individual's later intrusive memories. Results showed widespread increases in brain activation at encoding when viewing a scene in the scanner that would later return as an intrusive memory in the real world. These fMRI results were replicated in a second study. While traditional mass univariate regression analysis highlighted an association between brain processing and symptomatology, this is not the same as prediction. Using MVPA and a machine learning classifier, it was possible to predict later intrusive memories across participants with 68% accuracy, and within a participant with 97% accuracy; i.e. the classifier could identify out of multiple scenes those that would later return as an intrusive memory. We also report here brain networks key in intrusive memory prediction. MVPA opens the possibility of decoding brain activity to reconstruct idiosyncratic cognitive events with relevance to understanding and predicting mental health symptoms. PMID:25151915

  17. Paleomagnetic record of a geomagnetic field reversal from late miocene mafic intrusions, southern nevada.

    PubMed

    Ratcliff, C D; Geissman, J W; Perry, F V; Crowe, B M; Zeitler, P K

    1994-10-21

    Late Miocene (about 8.65 million years ago) mafic intrusions and lava flows along with remagnetized host rocks from Paiute Ridge, southern Nevada, provide a high-quality paleomagnetic record of a geomagnetic field reversal. These rocks yield thermoremanent magnetizations with declinations of 227 degrees to 310 degrees and inclinations of -7 degrees to 49 degrees , defining a reasonably continuous virtual geomagnetic pole path over west-central Pacific longitudes. Conductive cooling estimates for the intrusions suggest that this field transition, and mafic magmatism, lasted only a few hundred years. Because this record comes principally from intrusive rocks, rather than sediments or lavas, it is important in demonstrating the longitudinal confinement of the geomagnetic field during a reversal.

  18. Visual behavior characterization for intrusion and misuse detection

    NASA Astrophysics Data System (ADS)

    Erbacher, Robert F.; Frincke, Deborah

    2001-05-01

    As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.

  19. Hydrothermal vent complexes offshore Northeast Greenland: A potential role in driving the PETM

    NASA Astrophysics Data System (ADS)

    Reynolds, P.; Planke, S.; Millett, J. M.; Jerram, D. A.; Trulsvik, M.; Schofield, N.; Myklebust, R.

    2017-06-01

    Continental rifting is often associated with voluminous magmatism and perturbations in the Earth's climate. In this study, we use 2D seismic data from the northeast Greenland margin to document two Paleogene-aged sill complexes ≥ 18 000 and ≥ 10 000 km2 in size. Intrusion of the sills resulted in the contact metamorphism of carbon-rich shales, producing thermogenic methane which was released via 52 newly discovered hydrothermal vent complexes, some of which reach up to 11 km in diameter. Mass balance calculations indicate that the volume of methane produced by these intrusive complexes is comparable to that required to have caused the negative δ13 C isotope excursion associated with the PETM. Combined with data from the conjugate Norwegian margin, our study provides evidence for margin-scale, volcanically-induced greenhouse gas release during the late Paleocene/early Eocene. Given the abundance of similar-aged sill complexes in Upper Paleozoic-Mesozoic and Cretaceous-Tertiary basins elsewhere along the northeast Atlantic continental margin, our findings support a major role for volcanism in driving global climate change.

  20. Petrology, geochemistry and geochonology of the Jacupiranga ultramafic, alkaline and carbonatitic complex (southern Brazil)

    NASA Astrophysics Data System (ADS)

    Chmyz, Luanna; Arnaud, Nicolas; Biondi, João Carlos

    2015-04-01

    Brazilian carbonatitic complexes are located at the edges of the Paleozoic basins and are usually associated to tectonic crustal flexuring or deep fault zones. The Jacupiranga Complex is a 65 km² ultrabasic-alkaline carbonatitic intrusive body outcroping at the northeastern border of the Paraná Basin, South of São Paulo State (Brazil). The northern portion of the unit is mostly composed of peridotitic rocks, while the southern part contains ijolites, melteigites, clinopyroxenites and carbonatites which host a phosphate deposit, mined since 1966. Even though the carbonatites only represent 1% of the Complex's area, they have concentrated most of the historical petrogenetic studies, leaving almost unknown the petrogenetic and the geochronological characteristics of other rocks. This explains why the few petrogenetic models from the literature are very partial and mostly unsatisfactory. While the peridotitic rocks are largely hindered by the absence of fresh outcrops, the regolith thickness and the high serpentinization degree, field observations and petrographic data notably show a heterogeneous zone around the peridotitic body. That zone is composed of a large variety of lithotypes over a relatively small area (~9 km²), comprising diorites, monzodiorites, alkali feldspar syenites, trachytes, lamprophyres and syenites. Moreover, these rocks present a restricted lateral continuity (decametric) and a lack of the magmatic bedding characteristic of the ijolitic and clinopyroxenitc rocks. The southern clinopyroxenitic zone (~20 km²) is composed of clinopyroxenite and melteigite with prominent magmatic layering, probably of cumulative origin, and a body of carbonatites which outcrops over less than 1 km2 essentially composed of sovite and beforsite, with abundant apatite. The Jacupiranga Complex characteristics indicate that its formation possibly comprises at least five magmatic events which cannot at present be surely ordinated in time: a) the emplacement of the

  1. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    ERIC Educational Resources Information Center

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  2. Both trust and self-control are necessary to prevent intrusive behaviors: evidence from a longitudinal study of married couples.

    PubMed

    Buyukcan-Tetik, Asuman; Finkenauer, Catrin; Kuppens, Sofie; Vohs, Kathleen D

    2013-08-01

    Many people engage in intrusive behaviors in close relationships. Existing research links intrusive behaviors to a lack of trust and an imbalance between self- and partner-interest. The authors tested the novel hypothesis that people need self-control to regulate intrusive behaviors. Self-control enables people to forgo their self-interests (reassurance or closeness) for the sake of their partner or the relationship. Specifically, we predicted that people need both trust and self-control to refrain from intrusive behavior. One-hundred-eighty-nine couples participated in a prospective longitudinal study with three waves. Consistent with predictions, multilevel analyses revealed an interaction between trust and self-control on intrusive behaviors cross-sectionally as well as longitudinally (albeit marginally). These results provide support for our hypothesis that neither trust in the partner nor self-control is sufficient to forestall intrusive behaviors, but rather both are necessary to refrain from intruding into one's partner's privacy. © 2013 American Psychological Association

  3. Eating-related Intrusive Thoughts Inventory: exploring the dimensionality of eating disorder symptoms.

    PubMed

    Perpiñá, Conxa; Roncero, María; Belloch, Amparo; Sánchez-Reales, Sergio

    2011-08-01

    The aims of this study were, first, to examine the structure and validity of the Eating-related Intrusive Thoughts Inventory (INPIAS), a self-report questionnaire designed to assess eating disorders related to intrusive thoughts (EDITs), and second, to explore the existence of a continuum ranging from normal to abnormal thought intrusions related to eating, weight, and shape. Participants were 574 (408 women) nonclinical community individuals. Analyses revealed that EDITs can be clustered into three sets: appearance-dieting, need to exercise, and thoughts-impulses related to eating disorders. EDITs' consequences showed a two-factor structure: emotional consequences/personal meaning and thought-action fusion responsibility; and four factors of strategies: "anxiety," suppression, obsessive-compulsive rituals, and distraction. The sample was then divided according to reported restrained eating. The High dietary restraint group reported a higher frequency of EDITs, whereas differences in the other factors were mediated by depression, anxiety, and obsessionality. The results suggest that eating disorder-related cognitions are experienced by nonclinical individuals, and distributed on a continuum.

  4. Does repeated human intrusion alter use of wildland sites by red squirrels? Multiyear experimental evidence

    Treesearch

    Kevin J. Gutzwiller; Samuel K. Riffell

    2008-01-01

    Intrusion by humans into wildlife habitat during recreational activities has become a worldwide conservation concern. Low levels of intrusion, which occur frequently in many wildlands, could influence use of sites by red squirrels (Tamiasciurus hudsonicus) and have important ramifications for conservation. Red squirrels can influence forest...

  5. Acceptance- and imagery-based strategies can reduce chocolate cravings: A test of the elaborated-intrusion theory of desire.

    PubMed

    Schumacher, Sophie; Kemps, Eva; Tiggemann, Marika

    2017-06-01

    The elaborated-intrusion theory of desire proposes that craving is a two-stage process whereby initial intrusions about a desired target are subsequently elaborated with mental imagery. The present study tested whether the craving reduction strategies of cognitive defusion and guided imagery could differentially target the intrusion and elaboration stages, respectively, and thus differentially impact the craving process. Participants were randomly assigned to a cognitive defusion, a guided imagery or a mind-wandering control condition. Pre- and post-intervention chocolate-related thoughts, intrusiveness of thoughts, vividness of imagery, craving intensity, and chocolate consumption were compared. Experiment 1 recruited a general sample of young women (n = 94), whereas Experiment 2 recruited a sample of chocolate cravers who wanted to reduce their chocolate consumption (n = 97). Across both experiments, cognitive defusion lowered intrusiveness of thoughts, vividness of imagery and craving intensity. Guided imagery reduced chocolate-related thoughts, intrusiveness, vividness and craving intensity for chocolate cravers (Experiment 2), but not for the general sample (Experiment 1). There were no group differences in chocolate consumption in either experiment. Results add to existing evidence supporting the elaborated-intrusion theory of desire in the food domain, and suggest that acceptance- and imagery-based techniques have potential for use in combatting problematic cravings. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Children’s Dietary Recalls from Three Validation Studies: Types of Intrusion Vary with Retention Interval

    PubMed Central

    Baxter, Suzanne Domel; Hardin, James W.; Smith, Albert F.; Royer, Julie A.; Guinn, Caroline H.

    2008-01-01

    SUMMARY Using previously collected data of fourth-grade children observed eating school meals and then interviewed, we categorized intrusions (food items reported but not observed eaten) as stretches (on the child’s tray) or confabulations (not on the child’s tray). We investigated intrusions, confabulations, and stretches, and the role of liking, at different retention intervals (morning interviews about the previous day’s intake; evening interviews about that day’s intake) and under different reporting-order prompts (forward; reverse). As retention interval between consumption and report increased, the likelihood 1) increased that reported items were intrusions, that reported items were confabulations, and that intrusions were confabulations; and 2) was constant that reported items were stretches. Results concerning reporting-order prompts were inconclusive. Liking ratings were higher for matches (reports of items observed eaten) than stretches, for confabulations than stretches, and for matches than omissions (unreported items observed eaten), but did not vary by retention interval or reporting-order prompts. PMID:19023454

  7. Trauma Films, Information Processing, and Intrusive Memory Development

    ERIC Educational Resources Information Center

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  8. The Interplay between Rumination and Intrusions in the Prediction of Concurrent and Prospective Depressive Symptoms in Two Nonclinical Samples

    ERIC Educational Resources Information Center

    Smets, Jorien; Wessel, Ineke; Schreurs, Ellen; Raes, Filip

    2012-01-01

    Depressed patients commonly experience intrusive memories. There is some evidence that ruminative responses to those intrusions are important for maintaining depressive symptoms. Three models concerning the interplay of intrusions and rumination in the prediction of depressive symptoms were tested in students in 2 studies (N = 711): (a) rumination…

  9. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    PubMed

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  10. Perimeter intrusion detection and assessment system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  11. The Ni-Cu-PGE mineralized Brejo Seco mafic-ultramafic layered intrusion, Riacho do Pontal Orogen: Onset of Tonian (ca. 900 Ma) continental rifting in Northeast Brazil

    NASA Astrophysics Data System (ADS)

    Salgado, Silas Santos; Ferreira Filho, Cesar Fonseca; Caxito, Fabrício de Andrade; Uhlein, Alexandre; Dantas, Elton Luiz; Stevenson, Ross

    2016-10-01

    The Brejo Seco mafic-ultramafic Complex (BSC) occurs at the extreme northwest of the Riacho do Pontal Orogen Internal Zone, in the northern margin of the São Francisco Craton in Northeast Brazil. The stratigraphy of this medium size (3.5 km wide and 9 km long) layered intrusion consists of four main zones, from bottom to top: Lower Mafic Zone (LMZ; mainly troctolite), Ultramafic Zone (UZ; mainly dunite and minor troctolite); Transitional Mafic Zone (TMZ; mainly troctolite) and an Upper Mafic Zone (UMZ; gabbro and minor anorthosite, troctolite, and ilmenite magnetitite). Ni-Cu-PGE mineralization occurs at the contact of the UZ with the TMZ, consisting of an up to 50 m thick stratabound zone of disseminated magmatic sulfides. An Mg-tholeiitic affinity to the parental magma is indicated by the geochemical fractionation pattern, by the magmatic crystallization sequence and by the elevated Fo content in olivine. A Smsbnd Nd isochron yielded an age of 903 ± 20 Ma, interpreted as the age of crystallization, with initial εNd = 0.8. Evidence of interaction of the BSC parental magma with sialic crust is given by the Rare Earth and trace element patterns, and by slightly negative and overall low values of εNd(900 Ma) in between -0.2 and +3.3. Contrary to early interpretations that it might constitute an ophiolite complex, based mainly on the geochemistry of the host rocks (Morro Branco metavolcanosedimentary complex), here we interpret the BSC as a typical layered mafic-ultramafic intrusion in continental crust, related to an extensional regime. The BSC is chrono-correlated to mafic dyke swarms, anorogenic granites and thick bimodal volcanics of similar age and tectonic setting in the São Francisco Craton and surrounding areas. Intrusion of the BSC was followed by continued lithospheric thinning, which led to the development of the Paulistana Complex continental rift volcanics around 888 Ma and ultimately to plate separation and the generation of new oceanic crust (Monte

  12. Tetris and Word games lead to fewer intrusive memories when applied several days after analogue trauma.

    PubMed

    Hagenaars, Muriel A; Holmes, Emily A; Klaassen, Fayette; Elzinga, Bernet

    2017-01-01

    Background : Intrusive trauma memories are a key symptom of posttraumatic stress disorder (PTSD), so disrupting their recurrence is highly important. Intrusion development was hindered by visuospatial interventions administered up to 24 hours after analogue trauma. It is unknown whether interventions can be applied later, and whether modality or working-memory load are crucial factors. Objectives : This study tested: (1) whether a visuospatial task would lead to fewer intrusions compared to a reactivation-only group when applied after memory reactivation four days after analogue trauma exposure (extended replication), (2) whether both tasks (i.e. one aimed to be visuospatial, one more verbal) would lead to fewer intrusions than the reactivation-only group (intervention effect), and (3) whether supposed task modality (visuospatial or verbal) is a critical component (modality effect). Method : Fifty-four participants were randomly assigned to reactivation+Tetris (visuospatial), reactivation+Word games (verbal), or reactivation-only (no task). They watched an aversive film (day 0) and recorded intrusive memories of the film in diary A. On day 4, memory was reactivated, after which participants played Tetris, Word games, or had no task for 10 minutes. They then kept a second diary (B). Informative hypotheses were evaluated using Bayes factors. Results : Reactivation+Tetris and reactivation+Word games resulted in relatively fewer intrusions from the last day of diary A to the first day of diary B than reactivation-only (objective 1 and 2). Thus, both tasks were effective even when applied days after analogue trauma. Reactivation-only was not effective. Reactivation+Word games appeared to result in fewer intrusions than reactivation+Tetris (objective 3; modality effect), but this evidence was weak. Explorative analyses showed that Word games were more difficult than Tetris. Conclusions : Applying a task four days after the trauma film (during memory reconsolidation

  13. Petrogenesis of selected A-type granitic intrusions from Central Eastern Desert of Egypt

    NASA Astrophysics Data System (ADS)

    Hassan, Tharwat; Asran, Asran; Amron, Taha; Hauzenberger, Christoph

    2014-05-01

    The Pan-African orogeny in the Arabian-Nubian Shield was terminated by intrusion of A-type granites (~ 595 Ma; Greenberg, 1981) and its volcanic equivalents. Subsequent to the intrusions of these granitic bodies the shield was exhumed. Eroded A-type granite pebbles were found in the molasse sediments that were deposited in intermountain basins. Therefore the A-type granites provide information about the last stage of the Pan-African geochemical system. Preliminary whole-rock geochemical data of three granitic intrusions (Kadabora, Um Naggat and El shiekh Salem) from the Central Eastern Desert of Egypt; indicate that all of them are peraluminous and with A-type characteristics. These intrusions show low CaO content (average 0.43 %wt), high FeOT/MgO ratio (10.46-121.88), high Na2O+K2O (average 8.04 %wt), marked enrichment of high field strength elements (Y, Nb and Ga except Zr), depletion in MgO (0.01-0.11 %wt) and with low concentration of Sr and Ba. The studied granitoids were emplaced in within plate tectonic regime. References: Greenberg, J.K. (1981): Characteristic and origin of Egyptian younger granites. Bull. Geol. Soc. Am. Part 1, v.92: 224-232.

  14. Playing the computer game Tetris prior to viewing traumatic film material and subsequent intrusive memories: Examining proactive interference.

    PubMed

    James, Ella L; Lau-Zhu, Alex; Tickle, Hannah; Horsch, Antje; Holmes, Emily A

    2016-12-01

    Visuospatial working memory (WM) tasks performed concurrently or after an experimental trauma (traumatic film viewing) have been shown to reduce subsequent intrusive memories (concurrent or retroactive interference, respectively). This effect is thought to arise because, during the time window of memory consolidation, the film memory is labile and vulnerable to interference by the WM task. However, it is not known whether tasks before an experimental trauma (i.e. proactive interference) would also be effective. Therefore, we tested if a visuospatial WM task given before a traumatic film reduced intrusions. Findings are relevant to the development of preventative strategies to reduce intrusive memories of trauma for groups who are routinely exposed to trauma (e.g. emergency services personnel) and for whom tasks prior to trauma exposure might be beneficial. Participants were randomly assigned to 1 of 2 conditions. In the Tetris condition (n = 28), participants engaged in the computer game for 11 min immediately before viewing a 12-min traumatic film, whereas those in the Control condition (n = 28) had no task during this period. Intrusive memory frequency was assessed using an intrusion diary over 1-week and an Intrusion Provocation Task at 1-week follow-up. Recognition memory for the film was also assessed at 1-week. Compared to the Control condition, participants in the Tetris condition did not report statistically significant difference in intrusive memories of the trauma film on either measure. There was also no statistically significant difference in recognition memory scores between conditions. The study used an experimental trauma paradigm and findings may not be generalizable to a clinical population. Compared to control, playing Tetris before viewing a trauma film did not lead to a statistically significant reduction in the frequency of later intrusive memories of the film. It is unlikely that proactive interference, at least with this task

  15. Infiltration metasomatism within the Rum layered intrusion (Scotland)

    NASA Astrophysics Data System (ADS)

    Leuthold, J.; Blundy, J.; Holness, M.

    2012-04-01

    The well studied Rum Isle layered intrusion was built up by emplacement of a series of 15 macro-rhythmic units. Magma intruded 60.53±0.08 Ma (Hamilton et al., 1998), at a pressure <0.5 kbar (Holness, 1999). Units are composed of feldspathic peridotite at the base, overlain by troctolite and gabbro. Layering is induced by fractional crystallization from picritic magma (Upton et al., 2002; Holness et al., 2007). Rum magma liquid line of descent is complicated by reactive melt percolation within crystal mushes, either originating from continuous compaction of the cumulate pile or from a newly injected reactive picritic magma. The studied Unit 9 sequence is well known for the injection of a picritic sill within the layered intrusion. Clinopyroxene textures are very diverse above the Unit 9 intrusive picritic sill. (1) Late-stage interstitial crystals occur in the basal intrusive peridotite, corresponding to the picritic sill. The Cr2O3 content varies from 1.2 to 0.6 wt% along core to rim profiles. (2) Within the overlying troctolite, poikilitic crystals (up to 2 cm in diameter) enclose randomly oriented plagioclase and olivine, wrapped by a foliated troctolitic assemblage. Within the first 3 meters, the Cr2O3 composition of the few clinopyroxene crystals is very similar to the underlying peridotite one, but it then drops to lower concentration (0.5 to 0 wt%). The plagioclase-clinopyroxene-plagioclase median dihedral angle also decreases from ~90° to ~80° (Sides, 2008). The Cr2O3 content increases progressively towards the troctolite-gabbro wavy horizon. Gabbroic enclaves occur within the troctolite. (3) Cumulus clinopyroxene grains occur in the summit gabbro. Their Cr2O3 content regularly decreases from 1.2-0.8 to 0.7-0.3 across the gabbro pile. Cr-spinel crystals are rare. Median plagioclase-clinopyroxene-plagioclase dihedral angles evolve from ~85° to ~95°. We propose that troctolites, that contain gabbroic enclaves, result from clinopyroxene primocryst

  16. Genesis of the Permian Kemozibayi sulfide-bearing mafic-ultramafic intrusion in Altay, NW China: Evidence from zircon geochronology, Hf and O isotopes and mineral chemistry

    NASA Astrophysics Data System (ADS)

    Tang, Dongmei; Qin, Kezhang; Xue, Shengchao; Mao, Yajing; Evans, Noreen J.; Niu, Yanjie; Chen, Junlu

    2017-11-01

    The recently discovered Kemozibayi mafic-ultramafic intrusion and its associated magmatic Cu-Ni sulfide deposits are located at the southern margin of the Chinese Altai Mountain, Central Asian Orogenic Belt in north Xinjiang, NW China. The intrusion is composed of olivine websterite, norite, gabbro and diorite. Disseminated and net-textured Ni-Cu sulfide ores are hosted in the center of the gabbro. In this work, new zircon U-Pb ages, Hf-O isotopic and sulfide S isotopic data, and whole rock and mineral chemical analyses are combined in order to elucidate the characteristics of the mantle source, nature of subduction processes, degree of crustal contamination, geodynamic setting of bimodal magmatism in the region, and the metallogenic potential of economic Cu-Ni sulfide deposit at depth. SIMS zircon U-Pb dating of the gabbro yields Permian ages (278.3 ± 1.9 Ma), coeval with the Kalatongke Cu-Ni deposit and with Cu-Ni deposits in the Eastern Tianshan and Beishan areas. Several lines of evidence (positive εHf(t) from + 7.1 to + 13.3, Al2O3, TiO2 and SiO2 contents in clinopyroxene from olivine websterite, high whole rock TiO2 contents) suggest that the primary magma of the Kemozibayi intrusion was a calc-alkaline basaltic magma derived from depleted mantle, and that the degree of partial melting in the magma source was high. The evolution of the Kemozibayi mafic-ultramafic complex was strongly controlled by fractional crystallization and the crystallization sequence was olivine websterite, norite, and then gabbro. This is evidenced by whole rock Fe2O3 contents that are positively correlated with MgO and negatively correlated with Al2O3, CaO and Na2O, similar LREE enrichment and negative Nb, Ta, Hf anomalies in chondrite and primitive mantle-normalized patterns, and a decrease in total REE and trace elements contents and magnetite content from gabbro through to norite and olivine websterite. Varied and low εHf(t) (+ 7.1 to + 13.3) and high δ18O values (+ 6.4‰ to

  17. Intrusive rocks and plutonic belts of southeastern Alaska, U.S.A.

    USGS Publications Warehouse

    Brew, David A.; Morrell, Robert P.; Roddick, J.A.

    1983-01-01

    About 30 percent of the 175,000-km2 area of southeastern Alaska is underlain by intrusive igneous rocks. Compilation of available information on the distribution, composition, and ages of these rocks indicates the presence of six major and six minor plutonic belts. From west to east, the major belts are: the Fairweather-Baranof belt of early to mid-Tertiary granodiorite; the Muir-Chichagof belt of mid-Cretaceous tonalite and granodiorite; the Admiralty-Revillagigedo belt of porphyritic granodiorite, quartz diorite, and diorite of probable Cretaceous age; the Klukwan-Duke belt of concentrically zoned or Alaskan-type ultramafic-mafic plutons of mid-Cretaceous age within the Admiralty-Revillagigedo belt; the Coast Plutonic Complex sill belt of tonalite of unknown, but perhaps mid-Cretaceous, age; and the Coast Plutonic Complex belt I of early to mid-Tertiary granodiorite and quartz monzonite. The minor belts are distributed as follows: the Glacier Bay belt of Cretaceous and(or) Tertiary granodiorite, tonalite, and quartz diorite lies within the Fair-weather-Baranof belt; layered gabbro complexes of inferred mid-Tertiary age lie within and are probably related to the Fairweather-Baranof belt; the Chilkat-Chichagof belt of Jurassic granodiorite and tonalite lies within the Muir-Chichagof belt; the Sitkoh Bay alkaline, the Kendrick Bay pyroxenite to quartz monzonite, and the Annette and Cape Fox trondhjemite plutons, all interpreted to be of Ordovician(?) age, together form the crude southern southeastern Alaska belt within the Muir-Chichagof belt; the Kuiu-Etolin mid-Tertiary belt of volcanic and plutonic rocks extends from the Muir-Chichagof belt eastward into the Admiralty-Revillagigedo belt; and the Behm Canal belt of mid- to late Tertiary granite lies within and next to Coast Plutonic Complex belt II. In addition, scattered mafic-ultramafic bodies occur within the Fairweather-Baranof, Muir-Chichagof, and Coast Plutonic Complex belts I and II. Palinspastic

  18. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid

    PubMed Central

    Li, Yuancheng; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can’t satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy. PMID:29485990

  19. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

    PubMed

    Li, Yuancheng; Qiu, Rixuan; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  20. Hysteretic behavior in seawater intrusion in response to discontinuous drought periods

    NASA Astrophysics Data System (ADS)

    Salandin, P.; Darvini, G.

    2017-12-01

    The seawater intrusion (SWI) represents a relevant problem for communities living in many coastal regions and in small islands, where the amount of fresh water available for human consumption or irrigation purposes depends on the equilibrium between the natural groundwater recharge from precipitations and the surrounding sea. This issue is exacerbated by climate changes, and, as a consequence, the reduction of natural groundwater recharge and the decrease the seaward flows of fresh water rather than sea level rise, as recently demonstrated by Ketabchi et al. (2016), leads to magnify the seawater intrusion into coastal aquifers. The temporal fluctuation of the fresh water table level are a natural consequence of the interaction of the aquifer with a water body or due to the seasonal replenishment of the water table. The severe and prolonged drought phenomena as that observed in last years in some areas of the Mediterranean, as over the central western Mediterranean basin, Italy and Spain, where a decreasing trend in total precipitation was detected (Alpert et al., 2002) in addition to the rise in temperature, enlarges the variation of the freshwater flux and can magnify the progression of the saline wedge. In the present study we demonstrate that the presence of varying boundary constraints or forcing factors may lead to hysteretic behavior in saltwater intrusion, showing dependence of the saline wedge on historic conditions. Therefore, the dynamic behavior of SWI may depend on both the present and past forcing conditions. To this aim different transient simulations supported by evidences deduced from a physical model are carried out to assess the presence of the hysteretic effects in the SWI phenomenon and to evaluate its influence in the management of the coastal aquifers for both the rational exploitation and the corrected management of water resources. About 70% of the world's population dwells in coastal zones. Therefore the optimal exploitation of fresh

  1. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    PubMed

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  2. Intrusions in story recall: when over-learned information interferes with episodic memory recall. Evidence from Alzheimer's disease.

    PubMed

    De Anna, Francesca; Attali, Eve; Freynet, Laurence; Foubert, Lucie; Laurent, Aurore; Dubois, Bruno; Dalla Barba, Gianfranco

    2008-03-01

    Patients with Alzheimer's disease (AD) suffer from distortions of memory. Among such distortions, intrusions in memory tests are frequently observed. In this study we describe the performance of a group of mild AD patients and a group of normal controls on the recall of three different types of stories: a previously unknown story, a well-known fairy-tale (Cinderella), and a modified well-known fairy-tale (Little Red Riding Hood is not eaten by the wolf). The aim of our study was to test the hypothesis that in patients who tend to produce intrusions, over-learned information interferes with episodic recall, i.e., the retrieval of specific, unique past episodes. AD patients produced significantly more intrusions in the recall of the modified fairy-tale compared to the recall of the two other stories. Intrusions in the recall of the modified fairy-tale always consisted of elements of the original version of the story. We suggest that in AD patients intrusions may be traced back to the interference of strongly represented, over-learned information in episodic memory recall.

  3. Pectin methyl esterase inhibits intrusive and symplastic cell growth in developing wood cells of Populus.

    PubMed

    Siedlecka, Anna; Wiklund, Susanne; Péronne, Marie-Amélie; Micheli, Fabienne; Lesniewska, Joanna; Sethson, Ingmar; Edlund, Ulf; Richard, Luc; Sundberg, Björn; Mellerowicz, Ewa J

    2008-02-01

    Wood cells, unlike most other cells in plants, grow by a unique combination of intrusive and symplastic growth. Fibers grow in diameter by diffuse symplastic growth, but they elongate solely by intrusive apical growth penetrating the pectin-rich middle lamella that cements neighboring cells together. In contrast, vessel elements grow in diameter by a combination of intrusive and symplastic growth. We demonstrate that an abundant pectin methyl esterase (PME; EC 3.1.1.11) from wood-forming tissues of hybrid aspen (Populus tremula x tremuloides) acts as a negative regulator of both symplastic and intrusive growth of developing wood cells. When PttPME1 expression was up- and down-regulated in transgenic aspen trees, the PME activity in wood-forming tissues was correspondingly altered. PME removes methyl ester groups from homogalacturonan (HG) and transgenic trees had modified HG methylesterification patterns, as demonstrated by two-dimensional nuclear magnetic resonance and immunostaining using PAM1 and LM7 antibodies. In situ distributions of PAM1 and LM7 epitopes revealed changes in pectin methylesterification in transgenic trees that were specifically localized in expanding wood cells. The results show that en block deesterification of HG by PttPME1 inhibits both symplastic growth and intrusive growth. PttPME1 is therefore involved in mechanisms determining fiber width and length in the wood of aspen trees.

  4. Magmatic Intrusions and a Hydrothermal Origin for Fluvial Valleys on Mars

    NASA Technical Reports Server (NTRS)

    Gulick, Virginia C

    1998-01-01

    Numerical models of Martian hydrothermal systems demonstrate that systems associated with magmatic intrusions greater than several hundred cubic kilometers can provide sufficient groundwater outflow to form the observed fluvial valleys, if subsurface permeability exceeds about 1.0 darcy. Groundwater outflow increases with increasing intrusion volume and subsurface permeability and is relatively insensitive to intrusion depth and subsurface porosity within the range considered here. Hydrothermally-derived fluids can melt through 1 to 2 km thick ice-rich permafrost layers in several thousand years. Hydrothermal systems thus provide a viable alternative to rainfall for providing surface water for valley formation. This mechanism can form fluvial valleys not only during the postulated early warm, wet climatic epoch, but also during more recent epochs when atmospheric conditions did not favor atmospheric cycling of water. The clustered distribution of the valley networks on a given geologic surface or terrain unit of Mars may also be more compatible with localized, hydrothermally-driven groundwater outflow than regional rainfall. Hydrothermal centers on Mars may have provided appropriate environments for the initiation of life or final oases for the long-term persistence of life.

  5. Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time

    NASA Astrophysics Data System (ADS)

    Pham, Congduc

    This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surveillance application and present a performance study of various cover set construction strategies that take into account cameras with heterogeneous angle of view and those with very small angle of view. We show by simulation how a dynamic criticality management scheme can provide fast event detection for mission-critical surveillance applications by increasing the network lifetime and providing low stealth time of intrusions.

  6. Enrichment of fluoride in groundwater under the impact of saline water intrusion at the salt lake area of Yuncheng basin, northern China

    NASA Astrophysics Data System (ADS)

    Gao, Xubo; Wang, Yanxin; Li, Yilian; Guo, Qinghai

    2007-12-01

    Long-term intake of high-fluoride groundwater causes endemic fluorosis. This study, for the first time, discovered that the salt lake water intrusion into neighboring shallow aquifers might result in elevation of fluoride content of the groundwater. Two cross-sections along the groundwater flow paths were selected to study the geochemical processes controlling fluoride concentration in Yuncheng basin, northern China. There are two major reasons for the observed elevation of fluoride content: one is the direct contribution of the saline water; the other is the undersaturation of the groundwater with respect to fluorite due to salt water intrusion, which appears to be more important reason. The processes of the fluorine activity reduction and the change of Na/Ca ratio in groundwater induced by the intrusion of saline water favor further dissolution of fluorine-bearing mineral, and it was modeled using PHREEQC. With the increase in Na concentration (by adding NaCl or Na2SO4 as Na source, calcium content kept invariable), the increase of NaF concentration was rapid at first and then became slower; and the concentrations of HF, HF{2/-}, CaF+, and MgF+ were continuously decreasing. The geochemical conditions in the study area are advantageous to the complexation of F- with Na+ and the decline of saturation index of CaF2, regardless of the water type (Cl-Na or SO4-Na type water).

  7. Saltwater intrusion coupled with drought accelerates carbon loss from a brackish coastal wetland

    NASA Astrophysics Data System (ADS)

    Wilson, B.; Troxler, T.

    2017-12-01

    Coastal wetlands, such as the Everglades, are critical ecosystems for blue carbon (C) storage, yet this storage capacity is vulnerable to environmental change, such as saltwater intrusion and altered hydrology. Saltwater intrusion can stress vegetation and bring new metabolites for microbial respiration, thereby altering the C cycle. Drought can reduce the depth of water covering the wetland soil, and, in extreme cases, lead to exposed soil surface. This increases oxygen levels, thus speeding up C decomposition and potentially leading to peat collapse. The combined effects of both saltwater intrusion and drought on coastal marshes, however, are still uncertain, but recent evidence suggests that saltwater intrusion accelerates C loss from wetlands when coupled with drought. Our objective was to determine the change in CO2 flux, decomposition, root and shoot production, and elevation in a brackish water marsh under conditions of drought and elevated salinity. During the onset of drought, soil CO2 efflux increased by 124% and 237% in the ambient and elevated salinity treatments, respectively, compared to the control. Within one month, elevated salinity decreased net ecosystem production (NEP) by 40%, while after 6 months it had decreased by 85%. During the onset of the drought, there was no difference in NEP with ambient salinity between the inundated and exposed monoliths (-3.4 ± 0.8 vs. -4.2 ± 2.0 μmol CO2 m-2 s-1, respectively). However, drought conditions in the elevated salinity treatment resulted in more CO2 release in the exposed monoliths than the inundated monoliths (1.5 ± 0.4 vs. -0.5 ± 0.3 μmol CO2 m-2 s-1, respectively). Elevation change collected at the end of the experiment will allow us to test if elevated salinity combined with drought contributes to peat collapse, and what mechanisms of ecosystem C cycling has the greatest influence. While the restoration of water flows to the southern Everglades is hypothesized to mitigate the periods of

  8. Thermal History and Crystallinity of Sheet Intrusions

    NASA Astrophysics Data System (ADS)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  9. Field observations of extended seawater intrusion through subsurface karst conduit networks at Wakulla Spring in the Woodville Karst Plain, Florida

    NASA Astrophysics Data System (ADS)

    Xu, Z.; Bassett, S.; Hu, B. X.; Dyer, S.

    2016-12-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electric conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 14 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This abstract documented the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  10. Fear of cancer progression and cancer-related intrusive cognitions in breast cancer survivors.

    PubMed

    Mehnert, Anja; Berg, Petra; Henrich, Gerhard; Herschbach, Peter

    2009-12-01

    To assess the character and frequency of fear of progression (FoP) and to clarify its relationship with cancer-related intrusive cognitions in breast cancer survivors. A sample of 1083 patients was recruited in this cross-sectional study through a population-based Cancer Registry an average of 47 month following diagnosis (66% response rate). Participants completed self-report measures assessing fear of cancer progression (FoP-Q-SF), posttraumatic stress-disorder symptoms (PCL-C), coping strategies (DWI) and quality of life (QoL) (SF-8). In total, 23.6% of women were classified as having moderate to high FoP. Being nervous prior to doctors' appointments or examinations and being afraid of relying on strangers for activities of daily living were the most frequent fears. FoP was significantly associated with younger age, having children, disease progress, chemotherapy, perceived amount of impairments, physical and mental QoL, but not with time since initial diagnosis. Intrusive cognitions were screened in 37% of the sample. We found significant correlations between FoP and intrusive thoughts (r=0.63), avoidance (r=0.57), hyperarousal (r=0.54) and posttraumatic stress disorder diagnosis (r=0.42). Factors significantly associated with moderate and high FoP included a depressive coping style as well as an active problem-oriented coping style, intrusion, avoidance and hyperarousal symptoms (Nagelkerke's R(2)=0.44). Findings of this study give information regarding the frequency and the character of anxiety in breast cancer survivors and underline the relation of FoP to the reality of living with breast cancer. Results suggest that intrusive cognitions as well as avoidance and hyperarousal symptoms seem to be closely related to future-oriented fears of cancer recurrence.

  11. Simulation of salinity intrusion along the Georgia and South Carolina coasts using climate-change scenarios

    USGS Publications Warehouse

    Conrads, Paul; Roehl, Edwin A.; Daamen, Ruby C.; Cook, John B.

    2013-01-01

    Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. Changes in streamflow patterns in conjunction with sea-level rise may change the salinity-intrusion dynamics of coastal rivers. Several municipal water-supply intakes are located along the Georgia and South Carolina coast that are proximal to the present day saltwater-freshwater interface of tidal rivers. Increases in the extent of salinity intrusion resulting from climate change could threaten the availability of freshwater supplies in the vicinity of these intakes. To effectively manage these supplies, water-resource managers need estimates of potential changes in the frequency, duration, and magnitude of salinity intrusion near their water-supply intakes that may occur as a result of climate change. This study examines potential effects of climate change, including altered streamflow and sea-level rise, on the dynamics of saltwater intrusion near municipal water-supply intakes in two coastal areas. One area consists of the Atlantic Intracoastal Waterway (AIW) and the Waccamaw River near Myrtle Beach along the Grand Strand of the South Carolina Coast, and the second area is on or near the lower Savannah River near Savannah, Georgia. The study evaluated how future sea-level rise and a reduction in streamflows can potentially affect salinity intrusion and threaten municipal water supplies and the biodiversity of freshwater tidal marshes in these two areas. Salinity intrusion occurs as a result of the interaction between three principal forces—streamflow, mean coastal water levels, and tidal range. To analyze and simulate salinity dynamics at critical coastal gaging stations near four municipal water-supply intakes, various data-mining techniques, including artificial neural network (ANN) models, were used to evaluate hourly streamflow, salinity, and coastal water-level data collected

  12. Re-Os isotopic systematics in chromitites from the Stillwater Complex, Montana, USA

    NASA Astrophysics Data System (ADS)

    Marcantonio, Franco; Zindler, Alan; Reisberg, Laurie; Mathez, E. A.

    1993-08-01

    New Re-Os isotopic data on chromitites of the Stillwater Complex demonstrate isotopic equilibrium between cumulate chromite and whole rock. Initial osmium isotopic ratios for the chromitites, chosen for their freshness, are consistent with derivation from a mantle-derived magma that suffered little or no interaction with the continental crust prior to crystallization. Molybdenite, separated from a sample of the G-chromitite, yields a Re-Os age of 2740 Ma, indistinguishable from the age of the intrusion. The presence of molybdenite documents rhenium, and probably osmium, mobilization by hydrothermal fluids that permeated the intrusion shortly after crystallization. Initial osmium isotopic variability observed in chromitites and other rocks from the Stillwater Complex could result from interaction with these fluids. In this context, there is no compelling reason to call on assimilation of crust by mantle-derived magma to explain the osmium or neodymium isotopic variability. Although osmium isotopic systematics have been affected by hydrothermal processes, Re-Os results demonstrate that more than 95 percent of the osmium, and by inference other PGEs in the Stillwater Complex, derive from the mantle.

  13. Carbonatite and alkaline intrusion-related rare earth element deposits–A deposit model

    USGS Publications Warehouse

    Verplanck, Philip L.; Van Gosen, Bradley S.

    2011-01-01

    The rare earth elements are not as rare in nature as their name implies, but economic deposits with these elements are not common and few deposits have been large producers. In the past 25 years, demand for rare earth elements has increased dramatically because of their wide and diverse use in high-technology applications. Yet, presently the global production and supply of rare earth elements come from only a few sources. China produces more than 95 percent of the world's supply of rare earth elements. Because of China's decision to restrict exports of these elements, the price of rare earth elements has increased and industrial countries are concerned about supply shortages. As a result, understanding the distribution and origin of rare earth elements deposits, and identifying and quantifying our nation's rare earth elements resources have become priorities. Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. The general mineral deposit model summarized here is part of an effort by the U.S. Geological Survey's Mineral Resources Program to update existing models and develop new descriptive mineral deposit models to supplement previously published models for use in mineral-resource and mineral-environmental assessments. Carbonatite and alkaline intrusion-related REE deposits are discussed together because of their spatial association, common enrichment in incompatible elements, and similarities in genesis. A wide variety of commodities have been exploited from carbonatites and alkaline igneous rocks, such as rare earth elements, niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other enrichments include manganese, strontium, tantalum, thorium, vanadium, and uranium.

  14. On the Principles of Building a Layered Intrusion

    NASA Astrophysics Data System (ADS)

    Marsh, B. D.

    2009-12-01

    An accurate and realistic understanding of all magmatic processes involves knowing the combined physical and chemical fundamentals governing the overall process. Magmatic processes involve such a vast array of sub-processes (e.g., heat and mass transfer, crystal growth, slurry transport and sorting, annealing, resorbtion, etc.) that rarely is there any single feature or measurement that can be safely inverted to solve the problem. And each event as in the formation of an intrusion must at some level for heuristic purposes be defined as an isolated event. This is commonly done without much forethought, as is the absolutely critical assumption of the initial conditions defining the beginning of the event. Almost without exception, it is the initial conditions that determine the outcome of the entire process in all physical and biological systems. Automobile factories produce motorized vehicles not water melons or chimpanzees. Nucleosynthesis of H and He always gives the same set of elements. The initial conditions of the magma giving rise to the end product for mafic layered systems are especially difficult to discern and must be bounded by observing simpler, real time magmatic and volcanic processes. Initial conditions come from posing a series of questions: What was the style and duration of filling? What was the rate of influx and final volume of each delivery of magma? What was the compositional variation and phenocryst content of the individual magmatic deliveries? If phenocrysts are present, were they sorted prior to injection during ascension? What was the original and ongoing shape of the magmatic reservoir? A failure to appreciate or answer such basic questions leads to vastly untenable evolutionary scenarios. Unrealistic initial conditions necessarily lead to unrealistic magmatic scenarios. There are certain safe starting points. Eruptive and emplacement fluxes are limited. The larger an intrusion is the longer it took to build and the longer to build the

  15. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    PubMed

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  16. Bilingual language intrusions and other speech errors in Alzheimer's disease.

    PubMed

    Gollan, Tamar H; Stasenko, Alena; Li, Chuchu; Salmon, David P

    2017-11-01

    The current study investigated how Alzheimer's disease (AD) affects production of speech errors in reading-aloud. Twelve Spanish-English bilinguals with AD and 19 matched controls read-aloud 8 paragraphs in four conditions (a) English-only, (b) Spanish-only, (c) English-mixed (mostly English with 6 Spanish words), and (d) Spanish-mixed (mostly Spanish with 6 English words). Reading elicited language intrusions (e.g., saying la instead of the), and several types of within-language errors (e.g., saying their instead of the). Patients produced more intrusions (and self-corrected less often) than controls, particularly when reading non-dominant language paragraphs with switches into the dominant language. Patients also produced more within-language errors than controls, but differences between groups for these were not consistently larger with dominant versus non-dominant language targets. These results illustrate the potential utility of speech errors for diagnosis of AD, suggest a variety of linguistic and executive control impairments in AD, and reveal multiple cognitive mechanisms needed to mix languages fluently. The observed pattern of deficits, and unique sensitivity of intrusions to AD in bilinguals, suggests intact ability to select a default language with contextual support, to rapidly translate and switch languages in production of connected speech, but impaired ability to monitor language membership while regulating inhibitory control. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Sources of Intrusions in Children’s Dietary Recalls from a Validation Study of Order Prompts

    PubMed Central

    Baxter, Suzanne Domel; Hardin, James W.; Royer, Julie A.; Smith, Albert F.; Guinn, Caroline H.

    2008-01-01

    Validation-study data and foodservice production records were analyzed to test hypotheses concerning sources of intrusions (reports of uneaten items) in the school-meal parts of children’s dietary recalls. Each child was observed eating school meals on two days, and interviewed the morning after each observation day; one interview used forward-order (morning-to-evening) and one used reverse-order (evening-to-morning) prompts. Lunch intrusions were likelier to have been available in the foodservice environment at lunch as day before the interview came closer, and on days before than after the interview. Temporal dating errors are contributing sources of intrusions in the school-lunch parts of children’s recalls. PMID:18987088

  18. Thought-action fusion as a causal factor in the development of intrusions.

    PubMed

    Rassin, E; Merckelbach, H; Muris, P; Spaan, V

    1999-03-01

    Thought-action fusion refers to the tendency to treat thoughts and actions as equivalents. Some authors (e.g., Rachman, 1997; Behaviour Research and Therapy, 35, 793-802) have suggested that thought-action fusion plays a role in the etiology of obsessive intrusions. The present study sought to test this idea. Subjects (n = 19) in the experimental condition underwent a bogus EEG recording session. They were informed that the apparatus was able to pick up the word 'apple' and that thoughts of that word could result in the administration of electrical shocks to another person. After having spent 15 minutes in the EEG laboratory, experimental subjects and controls (n = 26) completed a short questionnaire containing items about characteristics of the target thought (e.g., frequency, aversiveness). Results indicate that thought-action fusion, indeed, promotes intrusive thinking in that it results in a higher frequency of target thoughts, more discomfort, and more resistance. Thus, the current findings support the idea that thought-action fusion may contribute to the development of obsessive intrusions.

  19. Orthodontic intrusion of maxillary incisors: a 3D finite element method study

    PubMed Central

    Saga, Armando Yukio; Maruo, Hiroshi; Argenta, Marco André; Maruo, Ivan Toshio; Tanaka, Orlando Motohiro

    2016-01-01

    Objective: In orthodontic treatment, intrusion movement of maxillary incisors is often necessary. Therefore, the objective of this investigation is to evaluate the initial distribution patterns and magnitude of compressive stress in the periodontal ligament (PDL) in a simulation of orthodontic intrusion of maxillary incisors, considering the points of force application. Methods: Anatomic 3D models reconstructed from cone-beam computed tomography scans were used to simulate maxillary incisors intrusion loading. The points of force application selected were: centered between central incisors brackets (LOAD 1); bilaterally between the brackets of central and lateral incisors (LOAD 2); bilaterally distal to the brackets of lateral incisors (LOAD 3); bilaterally 7 mm distal to the center of brackets of lateral incisors (LOAD 4). Results and Conclusions: Stress concentrated at the PDL apex region, irrespective of the point of orthodontic force application. The four load models showed distinct contour plots and compressive stress values over the midsagittal reference line. The contour plots of central and lateral incisors were not similar in the same load model. LOAD 3 resulted in more balanced compressive stress distribution. PMID:27007765

  20. Research on intrusion detection based on Kohonen network and support vector machine

    NASA Astrophysics Data System (ADS)

    Shuai, Chunyan; Yang, Hengcheng; Gong, Zeweiyi

    2018-05-01

    In view of the problem of low detection accuracy and the long detection time of support vector machine, which directly applied to the network intrusion detection system. Optimization of SVM parameters can greatly improve the detection accuracy, but it can not be applied to high-speed network because of the long detection time. a method based on Kohonen neural network feature selection is proposed to reduce the optimization time of support vector machine parameters. Firstly, this paper is to calculate the weights of the KDD99 network intrusion data by Kohonen network and select feature by weight. Then, after the feature selection is completed, genetic algorithm (GA) and grid search method are used for parameter optimization to find the appropriate parameters and classify them by support vector machines. By comparing experiments, it is concluded that feature selection can reduce the time of parameter optimization, which has little influence on the accuracy of classification. The experiments suggest that the support vector machine can be used in the network intrusion detection system and reduce the missing rate.

  1. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  2. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  3. Using a time lapse microgravity model for mapping seawater intrusion around Semarang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Supriyadi,, E-mail: supriyadi@mail.unnes.ac.id; Khumaedi; Yusuf, M.

    A modeling of time-lapse microgravity anomaly due to sea water intrusion has been conducted. It used field data of aquifer cross section, aquifer thickness and lithology of research area. Those data were then processed using Grav3D and Surfer. Modeling results indicated that the intrusion of sea water resulting in a time-lapse microgravity anomalies of 0.12 to 0.18 mGal, at soil layer density of 0.15 g/cm{sup 3} to 0.3 g/cm{sup 3} and at depth of 30 to 100 m. These imply that the areas experiencing seawater intrusion were Tanjung Mas, SPBE Bandarharjo, Brass, Old Market Boom and Johar as the microgravity measured there weremore » in the range of 0.12 to 0.18 mGal and the density contrast were at 0.15 g/cm{sup 3} to 0.28 g/cm{sup 3}. Areas that experienced fluid reduction were Puri Anjasmoro, Kenconowungu and Puspowarno with microgravity changes from -0.06 mGal to -0.18 mGal.« less

  4. Petrographic and Geochemical Characterization of Ore-Bearing Intrusions of the Noril'sk type, Siberia; With Discussion of Their Origin, Including Additional Datasets and Core Logs

    USGS Publications Warehouse

    Czamanske, Gerald K.

    2002-01-01

    The Noril'sk I, Talnakh, and Kharaelakh intrusions of the Noril'sk district host one of the outstanding metal concentrations in the world; contained Cu-Ni resources are comparable to the deposits at Sudbury, Ontario and the platinum group element (PGE) resource is second only to that of the Bushveld Complex. Our opportunity to cooperatively sample and study this district in Siberian Russia arose in 1990 through a memorandum of understanding between the U.S. Geological Survey and the former Ministry of Geology of the U.S.S.R. The world-class significance of these deposits and the possibility that understanding their geologic context, including construction of a credible 'ore-deposit model,' will lead to discovery of similar deposits elsewhere, inspired extensive studies of the ores, the mafic-intrusions which host them, and associated flood basalts.

  5. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    NASA Astrophysics Data System (ADS)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    Observations during recent decades show that there is a greater near surface warming occurring in the Arctic, particularly during winter, than at lower latitudes. Understanding the mechanisms controlling surface temperature in the Arctic is therefore an important priority in climate research. The surface energy budget is a key proximate control on Arctic surface temperature. During winter, insolation is low or absent and the atmospheric boundary layer is typically very stable, limiting turbulent hear exchange, so that the surface energy budget is almost entirely governed by longwave radiation. The net surface longwave radiation (NetLW) at this time has a strikingly bimodal distribution: conditions oscillate between a 'radiatively clear' state with rapid surface heat loss and a "moist cloudy" state with NetLW ˜ 0 W m-2. Each state can persist for days or weeks at a time but transitions between them happen in a matter of hours. This distribution of NetLW has important implications for the Arctic climate, as even a small shift in the frequency of occupancy of each state would be enough to significantly affect the overall surface energy budget and thus winter sea ice thickness. The clear and cloudy states typically occur during periods of relatively high and low surface pressure respectively, suggesting a link with synoptic-scale dynamics. This suggestion is consistent with previous studies indicating that the formation of low-level and mid-level clouds over the Arctic Ocean is typically associated with cyclonic activity and passing frontal systems . More recent work has shown that intense filamentary moisture intrusion events are a common feature in the Arctic and can induce large episodic increases of longwave radiation into the surface. The poleward transport of water vapor across 70N during boreal winter is examined in the ERA-Interim reanalysis product and 16 of the Coupled Model Intercomparison Project Phase 5 (CMIP5) models, focusing on intense moisture

  6. Histologic evaluation of human pulp tissue after orthodontic intrusion.

    PubMed

    Lazzaretti, Dieison Nardi; Bortoluzzi, Gianna Steffens; Torres Fernandes, Lauren Fioreze; Rodriguez, Rubens; Grehs, Renésio Armindo; Martins Hartmann, Mateus Silveira

    2014-10-01

    The forces applied during orthodontic treatment bring about effects on the teeth and surrounding tissues. The aim of this study was to evaluate the possible changes in the human pulpal tissue resulting from orthodontic intrusion in a 21-day period using histologic examination. The sample consisted of 17 young individuals of both sexes between the ages of 12 and 19 years. A total of 34 premolars were evaluated with orthodontic indication of extraction. Because it is a split-mouth study, in each patient, intrusion force of 60 g was applied randomly on 1 of the dental elements experimental group for 21 days. The counterpart control group received no force. After extractions, these dental elements were fixed in 10% formaldehyde, processed automatically, submitted to histotechnical preparation, and stained with hematoxylin-eosin for analysis under optical microscope. The paired Fisher exact test (P ≤ .05) showed a significant increase of fibrous tissue in the experimental group. The nonparametric paired Wilcoxon test (P ≤ .05) showed a significant increase in the number of pulpal nodules in the elements of the experimental group and showed no difference in the number of blood vessels between the groups. Large-caliber vessels and congested elements were observed in 8 of the experimental group elements. The orthodontic intrusion force, in these conditions, caused vascular changes in the pulpal tissue and also increased the presence of fibrosis and the number of pulp calcifications in the experimental elements. Copyright © 2014 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  7. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    PubMed

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P < 0.0001), and ATKLH (r = -0.44; P = 0.004), and with higher scores on the BHS (r = 0.58; P < 0.0001) and CES-D (r = 0.48; P < 0.0001). The authors compared IIRS scores from the ABMT survivors with scores from recipients of solid organ transplants. Scores were corrected for age, gender, and time from transplant to evaluation. Corrected mean IIRS scores for the marrow (37.5), kidney (38.9), heart (40.0), lung (30.1), and liver (32.3) transplant recipients differed significantly (P < 0.0001 by analysis of covariance). Higher scores among marrow, kidney, and heart transplant survivors were caused by increased scores in the instrumental domain of the IIRS that measures disruptions in health, work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue

  8. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    NASA Astrophysics Data System (ADS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-12-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.

  9. Non-intrusive methods of characterizing vehicles on the highway.

    DOT National Transportation Integrated Search

    2003-06-01

    Over the past year we have worked on the development of a real-time laser-based non-intrusive field-deployable detection system for delineation of moving vehicles. The primary goal of the project is to develop a roadway detection system that can be u...

  10. Use of behavioral biometrics in intrusion detection and online gaming

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  11. Isotopic variation in the Tuolumne Intrusive Suite, central Sierra Nevada, California

    USGS Publications Warehouse

    Kistler, R.W.; Chappell, B.W.; Peck, D.L.; Bateman, P.C.

    1986-01-01

    Granitoid rocks of the compositionally zoned Late Cretaceous Toulumne Intrusive Suite in the central Sierra Nevada, California, have initial87Sr/86Sr values (Sri) and143Nd/144Nd values (Ndi) that vary from 0.7057 to 0.7067 and from 0.51239 to 0.51211 respectively. The observed variation of both Sri and Ndi and of chemical composition in rocks of the suite cannot be due to crystal fractionation of magma solely under closed system conditons. The largest variation in chemistry, Ndi, and Sri is present in the outer-most equigranular units of the Tuolumne Intrusive Suite. Sri varies positively with SiO2, Na2O, K2O, and Rb concentrations, and negatively with Ndi, Al2O3, Fe2O3, MgO, FeO, CaO, MnO, P2O5, TiO2, and Sr concentrations. This covariation of Sri, Ndi and chemistry can be modeled by a process of simple mixing of basaltic and granitic magmas having weight percent SiO2 of 48.0 and 73.3 respectively. Isotopic characteristic of the mafic magma are Sri=0.7047, Ndi=0.51269 and ??18O=6.0, and of the felsic magma are Sri=0.7068, Ndi=0.51212 and ??18O=8.9. The rocks sampled contain from 50 to 80% of the felsic component. An aplite in the outer equigranular unit of the Tuolumne Intrusive Suite apparently was derived by fractional crystallization of plagioclase and hornblende from magma with granudiorite composition that was a product of mixing of the magmas described above. Siliceous magmas derived from the lower crust, having a maximum of 15 percent mantle-derived mafic component, are represented by the inner prophyritic units of the Tuolumne Intrusive Suite. ?? 1986 Springer-Verlag.

  12. Adaptive top-down suppression of hippocampal activity and the purging of intrusive memories from consciousness.

    PubMed

    Benoit, Roland G; Hulbert, Justin C; Huddleston, Ean; Anderson, Michael C

    2015-01-01

    When reminded of unwanted memories, people often attempt to suppress these experiences from awareness. Prior work indicates that control processes mediated by the dorsolateral prefrontal cortex (DLPFC) modulate hippocampal activity during such retrieval suppression. It remains unknown whether this modulation plays a role in purging an intrusive memory from consciousness. Here, we combined fMRI and effective connectivity analyses with phenomenological reports to scrutinize a role for adaptive top-down suppression of hippocampal retrieval processes in terminating mnemonic awareness of intrusive memories. Participants either suppressed or recalled memories of pictures depicting faces or places. After each trial, they reported their success at regulating awareness of the memory. DLPFC activation was greatest when unwanted memories intruded into consciousness and needed to be purged, and this increased engagement predicted superior control of intrusive memories over time. However, hippocampal activity was decreased during the suppression of place memories only. Importantly, the inhibitory influence of the DLPFC on the hippocampus was linked to the ensuing reduction in intrusions of the suppressed memories. Individuals who exhibited negative top-down coupling during early suppression attempts experienced fewer involuntary memory intrusions later on. Over repeated suppressions, the DLPFC-hippocampus connectivity grew less negative with the degree that they no longer had to purge unwanted memories from awareness. These findings support a role of DLPFC in countermanding the unfolding recollection of an unwanted memory via the suppression of hippocampal processing, a mechanism that may contribute to adaptation in the aftermath of traumatic experiences.

  13. Procrastination as a Self-Regulation Failure: The Role of Impulsivity and Intrusive Thoughts.

    PubMed

    Rebetez, Marie My Lien; Rochat, Lucien; Barsics, Catherine; Van der Linden, Martial

    2018-02-01

    Procrastination has been described as the quintessence of self-regulatory failure. This study examines the relationships between this self-regulatory failure and other manifestations of self-regulation problems, namely impulsivity and intrusive thoughts. One hundred and forty-one participants completed questionnaires assessing procrastination, impulsivity (in particular, the urgency and lack of perseverance dimensions), and intrusive thoughts (i.e., rumination and daydreaming). Main results show that urgency mediated the association between rumination and procrastination, whereas rumination did not mediate the relation between urgency and procrastination. Lack of perseverance mediated the association between daydreaming and procrastination, and daydreaming mediated the relation between lack of perseverance and procrastination. This study highlights the role of impulsivity and intrusive thoughts in procrastination, specifies the links between these self-regulation problems, and provides insights into their (potential) underlying mechanisms. It also opens interesting prospects for management strategies for implementing targeted psychological interventions to reduce impulsive manifestations and/or thought control difficulties accompanying procrastination.

  14. Children’s recalls from five dietary-reporting validation studies: Intrusions in correctly reported and misreported options in school breakfast reports

    PubMed Central

    Baxter, Suzanne Domel; Hardin, James W.; Royer, Julie A.; Guinn, Caroline H.; Smith, Albert F.

    2008-01-01

    For school breakfast each day, many elementary schools offer a choice between a cold option that includes ready-to-eat (RTE) cereal and a hot option that includes a non-RTE-cereal entrée such as waffles. For breakfast reports, intrusions (reports of uneaten items) in correctly reported and misreported breakfast options were examined using data from five dietary-reporting validation studies. In each study, fourth-grade children were observed eating school breakfast and school lunch and then interviewed to obtain a dietary recall. A breakfast option was correctly reported in 240 breakfast reports for 203 intrusions total, and misreported in 97 breakfast reports for 189 intrusions total. Asymmetry was evident in misreported options; specifically, children observed eating a cold option almost never misreported a hot option, but children observed eating a hot option often misreported a cold option. Proportionately more breakfast reports were intrusion-free when a breakfast option was correctly reported than misreported. Linking of intrusions (i.e., multiple intrusions from the same option in a breakfast report) was especially evident with misreported breakfast options. Methodological aspects of dietary recalls such as target period (prior 24 hours; previous day), interview time (morning; afternoon; evening), and interview format (meal; open) had implications for intrusions and misreported breakfast options. PMID:18501992

  15. Passive intrusion detection system

    NASA Technical Reports Server (NTRS)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  16. Characterizing and Improving Distributed Intrusion Detection Systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizingmore » and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.« less

  17. Stratospheric Intrusion Catalog: A 10-year Compilation of Events Identified By Using an Objective Feature Tracking Model With NASA's MERRA-2 Reanalysis

    NASA Astrophysics Data System (ADS)

    Knowland, K. E.; Ott, L. E.; Duncan, B. N.; Wargan, K.; Hodges, K.

    2017-12-01

    Stratospheric intrusions - the introduction of ozone-rich stratospheric air into the troposphere - have been linked with surface ozone air quality exceedances, especially at the high elevations in the western USA in springtime. However, the impact of stratospheric intrusions in the remaining seasons and over the rest of the USA is less clear. A new approach to the study of stratospheric intrusions uses NASA's Goddard Earth Observing System Model (GEOS) model and assimilation products with an objective feature tracking algorithm to investigate the atmospheric dynamics that generate stratospheric intrusions and the different mechanisms through which stratospheric intrusions may influence tropospheric chemistry and surface air quality seasonally over both the western and the eastern USA. A catalog of stratospheric intrusions identified in the MERRA-2 reanalysis was produced for the period 2005-2014 and validated against surface ozone observations (focusing on those which exceed the national air quality standard) and a recent data set of stratospheric intrusion-influenced air quality exceedance flags from the US Environmental Protection Agency (EPA). Considering not all ozone exceedances have been flagged by the EPA, a collection of stratospheric intrusions can support air quality agencies for more rapid identification of the impact of stratospheric air on surface ozone and demonstrates that future operational analyses may aid in forecasting such events. An analysis of the spatiotemporal variability of stratospheric intrusions over the continental US was performed, and while the spring over the western USA does exhibit the largest number of stratospheric intrusions affecting the lower troposphere, the number of intrusions in the remaining seasons and over the eastern USA is sizable. By focusing on the major modes of variability that influence weather in the USA, such as the Pacific North American (PNA) teleconnection index, predicative meteorological patterns

  18. New Observations of the Gulf of Aden Intermediate Water Intrusion into the Red Sea.

    NASA Astrophysics Data System (ADS)

    Bower, A.; Abualnaja, Y.

    2012-04-01

    The three-layer exchange flow between the Red Sea and the Indian Ocean during summer is characterized by a thick, northward intrusion of relatively cold, low-salinity and low in dissolved oxygen (< 0.5 ml/l); Gulf of Aden Intermediate Water (GAIW), sandwiched between two thin layers of outflow water. The flux of GAIW into the Red Sea is important in the heat, freshwater and nutrient budgets of the Red Sea, but the structure and pathways of the intrusion are not well-known due to a paucity of hydrographic and direct velocity observations. A research cruise was executed at the eastern side of the Red Sea during September-October 2011 to conduct the first large-scale survey of the intrusion. This mission is part of a series of expeditions in the Red Sea designed to investigate the seasonal Red Sea circulation. Surprisingly, the GAIW intrusion was observed to stretch nearly the entire length of the Red Sea (~1500 km) as a narrow eastern boundary current with subsurface velocity maximum of 0.1-0.3 m/s in the depth range 50-100 m. The intruding layer is weakly stratified compared to the background, possibly an indication of strong vertical mixing as it flows through the strait. Some GAIW was observed to enter deep channels in a coral reef bank (Farasan Banks) located in the southeastern Red Sea, and to enter the Red Sea interior, the latter possibly due to interactions between the boundary current and mesoscale eddies. The pathways and erosion of the GAIW intrusion will likely have major implications for the spatial distribution of biological productivity.

  19. Intrusions in children's dietary recalls: the roles of BMI, sex, race, interview protocol, and social desirability.

    PubMed

    Guinn, Caroline H; Baxter, Suzanne D; Hardin, James W; Royer, Julie A; Smith, Albert F

    2008-09-01

    Dietary-reporting validation study data and school foodservice production records were used to examine intrusions (reports of uneaten items) in school meals in 24-h recalls. Fourth-grade children [20 low-BMI (> or = 5th and < 50th percentiles); 20 high-BMI (> or = 85th percentile); 50% boys; 75% black] were each observed eating two school meals (breakfast, lunch) and interviewed about the prior 24h that evening (24E) or the previous day the next morning (PDM). Social desirability was assessed. Intrusions were classified as stretches (on meal tray), internal confabulations (in school foodservice environment but not on meal tray), and external confabulations (not in school foodservice environment). For breakfast, reported items were less likely to be intrusions for black than white children, and for low-BMI boys than the other BMI-x-sex groups, and to be external confabulations for high-BMI girls than high-BMI boys. For lunch, reported items and intrusions were more likely to be stretches for 24E than PDM interviews. As social desirability increased, fewer items were reported for breakfast, and reported items and intrusions were more likely to be internal confabulations for lunch. For breakfast, compared to low-BMI girls, as social desirability increased, intruded amounts were larger for high-BMI boys and smaller for high-BMI girls. For lunch, intruded amounts were smaller for high-BMI girls than the other BMI-x-sex groups. Amounts reported were smaller for stretches than internal confabulations and external confabulations for breakfast, and external confabulations for lunch. To better understand intrusions, dietary-reporting validation studies are needed with larger samples by BMI-group, sex, and race.

  20. Synergy of climate change and local pressures on saltwater intrusion in heterogeneous coastal aquifers

    NASA Astrophysics Data System (ADS)

    Abou Najm, M.; Safi, A.; El-Fadel, M.; Doummar, J.; Alameddine, I.

    2016-12-01

    The relative importance of climate change induced sea level rise on the salinization of a highly urbanized karstified coastal aquifers were compared with non-sustainable pumping. A 3D variable-density groundwater flow and solute transport model was used to predict the displacement of the saltwater-freshwater interface in a pilot aquifer located along the Eastern Mediterranean. The results showed that the influence of sea level rise was marginal when compared with the encroachment of salinity associated with anthropogenic abstraction. Model predictions of salinity mass and volumetric displacement of the interface corresponding to a long-term monthly transient model showed that the saltwater intrusion dynamic is highly sensitive to change in the abstraction rates which were estimated based on combinations of water consumption rates and population growth rates. Salinity encroachment, however, appeared to be more sensitive to water consumption rates in comparison to population growth rates, where a 50% increase in the rate of former led to four times more intrusion as compared to an equivalent increase in population growth rate over 20 years. Coupling both increase in population growth and increased consumption rates had a synergistic effect that aggravated the intrusion beyond the sum of the individual impacts. Adaptation strategies targeting a decrease in groundwater exploitation proved to be effective in retarding the intrusion.

  1. Experimental saltwater intrusion in coastal aquifers using automated image analysis: Applications to homogeneous aquifers

    NASA Astrophysics Data System (ADS)

    Robinson, G.; Ahmed, Ashraf A.; Hamill, G. A.

    2016-07-01

    This paper presents the applications of a novel methodology to quantify saltwater intrusion parameters in laboratory-scale experiments. The methodology uses an automated image analysis procedure, minimising manual inputs and the subsequent systematic errors that can be introduced. This allowed the quantification of the width of the mixing zone which is difficult to measure in experimental methods that are based on visual observations. Glass beads of different grain sizes were tested for both steady-state and transient conditions. The transient results showed good correlation between experimental and numerical intrusion rates. The experimental intrusion rates revealed that the saltwater wedge reached a steady state condition sooner while receding than advancing. The hydrodynamics of the experimental mixing zone exhibited similar traits; a greater increase in the width of the mixing zone was observed in the receding saltwater wedge, which indicates faster fluid velocities and higher dispersion. The angle of intrusion analysis revealed the formation of a volume of diluted saltwater at the toe position when the saltwater wedge is prompted to recede. In addition, results of different physical repeats of the experiment produced an average coefficient of variation less than 0.18 of the measured toe length and width of the mixing zone.

  2. Corporate Mergers in the Publishing Industry: Helpful or Intrusive?

    ERIC Educational Resources Information Center

    Rudman, Herbert C.

    1990-01-01

    Examines the effects of corporate mergers in the publishing industry on the publishing of textbooks and standardized tests. Concludes that restructuring, acquisitions, and mergers have an intrusive effect on established practices of academic publishing and may severely limit the access of scholars to the academic marketplace. (FMW)

  3. The pattern and variability of winter Kuroshio intrusion northeast of Taiwan

    NASA Astrophysics Data System (ADS)

    Liu, Xiaohui; Dong, Changming; Chen, Dake; Su, Jilan

    2014-08-01

    The variations of the Kuroshio path and velocity northeast of Taiwan are analyzed based on along-track satellite altimeter data as well as high-resolution model experiments. Observations reveal that in winter the Kuroshio intrusion into the East China Sea (ECS) at this location is manifested by a secondary maximum current core (SMCC) shoreward of the Kuroshio's main path. The SMCC varies significantly on interannual time scale, and its variability is strikingly out of phase with that of the Kuroshio entering the ECS, meaning that the stronger the Kuroshio, the weaker the SMCC, and vice versa. Model experiments corroborate the observational results and, more importantly, indicate that the Kuroshio intrusion here follows two primary routes, a large anticyclonic loop that separates from the Kuroshio at the northern end of Taiwan and moves forward to form the SMCC, and a straight northward path onto the shelf when the Kuroshio turns sharply eastward along the continental slope of the ECS. The intrusion is controlled by both local forcing and remote effect, with its pattern and variability depending mostly on the local heat flux and the inertia of the Kuroshio Current. This article was corrected on 12 SEP 2014. See the end of the full text for details.

  4. Sensitivity analysis of some critical factors affecting simulated intrusion volumes during a low pressure transient event in a full-scale water distribution system.

    PubMed

    Ebacher, G; Besner, M C; Clément, B; Prévost, M

    2012-09-01

    Intrusion events caused by transient low pressures may result in the contamination of a water distribution system (DS). This work aims at estimating the range of potential intrusion volumes that could result from a real downsurge event caused by a momentary pump shutdown. A model calibrated with transient low pressure recordings was used to simulate total intrusion volumes through leakage orifices and submerged air vacuum valves (AVVs). Four critical factors influencing intrusion volumes were varied: the external head of (untreated) water on leakage orifices, the external head of (untreated) water on submerged air vacuum valves, the leakage rate, and the diameter of AVVs' outlet orifice (represented by a multiplicative factor). Leakage orifices' head and AVVs' orifice head levels were assessed through fieldwork. Two sets of runs were generated as part of two statistically designed experiments. A first set of 81 runs was based on a complete factorial design in which each factor was varied over 3 levels. A second set of 40 runs was based on a latin hypercube design, better suited for experimental runs on a computer model. The simulations were conducted using commercially available transient analysis software. Responses, measured by total intrusion volumes, ranged from 10 to 366 L. A second degree polynomial was used to analyze the total intrusion volumes. Sensitivity analyses of both designs revealed that the relationship between the total intrusion volume and the four contributing factors is not monotonic, with the AVVs' orifice head being the most influential factor. When intrusion through both pathways occurs concurrently, interactions between the intrusion flows through leakage orifices and submerged AVVs influence intrusion volumes. When only intrusion through leakage orifices is considered, the total intrusion volume is more largely influenced by the leakage rate than by the leakage orifices' head. The latter mainly impacts the extent of the area affected by

  5. End-Triassic mass extinction started by intrusive CAMP activity.

    PubMed

    Davies, J H F L; Marzoli, A; Bertrand, H; Youbi, N; Ernesto, M; Schaltegger, U

    2017-05-31

    The end-Triassic extinction is one of the Phanerozoic's largest mass extinctions. This extinction is typically attributed to climate change associated with degassing of basalt flows from the central Atlantic magmatic province (CAMP). However, recent work suggests that the earliest known CAMP basalts occur above the extinction horizon and that climatic and biotic changes began before the earliest known CAMP eruptions. Here we present new high-precision U-Pb ages from CAMP mafic intrusive units, showing that magmatic activity was occurring ∼100 Kyr ago before the earliest known eruptions. We correlate the early magmatic activity with the onset of changes to the climatic and biotic records. We also report ages from sills in an organic rich sedimentary basin in Brazil that intrude synchronously with the extinction suggesting that degassing of these organics contributed to the climate change which drove the extinction. Our results indicate that the intrusive record from large igneous provinces may be more important for linking to mass extinctions than the eruptive record.

  6. End-Triassic mass extinction started by intrusive CAMP activity

    NASA Astrophysics Data System (ADS)

    Davies, J. H. F. L.; Marzoli, A.; Bertrand, H.; Youbi, N.; Ernesto, M.; Schaltegger, U.

    2017-05-01

    The end-Triassic extinction is one of the Phanerozoic's largest mass extinctions. This extinction is typically attributed to climate change associated with degassing of basalt flows from the central Atlantic magmatic province (CAMP). However, recent work suggests that the earliest known CAMP basalts occur above the extinction horizon and that climatic and biotic changes began before the earliest known CAMP eruptions. Here we present new high-precision U-Pb ages from CAMP mafic intrusive units, showing that magmatic activity was occurring ~100 Kyr ago before the earliest known eruptions. We correlate the early magmatic activity with the onset of changes to the climatic and biotic records. We also report ages from sills in an organic rich sedimentary basin in Brazil that intrude synchronously with the extinction suggesting that degassing of these organics contributed to the climate change which drove the extinction. Our results indicate that the intrusive record from large igneous provinces may be more important for linking to mass extinctions than the eruptive record.

  7. Effects of climate change on saltwater intrusion at Hilton Head Island, SC. U.S.A.

    USGS Publications Warehouse

    Payne, Dorothy F.

    2010-01-01

    Sea‐level rise and changes in precipitation patterns may contribute to the occurrence and affect the rate of saltwater contamination in the Hilton Head Island, South Carolina area. To address the effects of climate change on saltwater intrusion, a threedimensional, finite‐element, variable‐density, solute‐transport model was developed to simulate different rates of sea‐level rise and variation in onshore freshwater recharge. Model simulation showed that the greatest effect on the existing saltwater plume occurred from reducing recharge, suggesting recharge may be a more important consideration in saltwater intrusion management than estimated rates of sea‐level rise. Saltwater intrusion management would benefit from improved constraints on recharge rates by using model‐independent, local precipitation and evapotranspiration data, and improving estimates of confining unit hydraulic properties.

  8. Illness intrusiveness explains race-related quality-of-life differences among women with systemic lupus erythematosus.

    PubMed

    Devins, G M; Edworthy, S M

    2000-01-01

    Our objective was to investigate whether quality of life in systemic lupus erythematosus (SLE) differs across ethnoracial groups and to identify factors that may explain race-related differences. Self-administered questionnaire data from 335 White, 40 Black, and 30 Asian women with SLE were obtained from a multi-center database. Measures assessed illness intrusiveness, psychological well-being, depressive symptoms, musculoskeletal pain, and learned helplessness. Extent of SLE disease activity was indexed by self-reported functional-system involvement. Educational attainment was indicated by number of years in school. Principal-components analysis reduced the four psychosocial measures to a single factor score. This represented psychosocial well-being In path analysis. Psychosocial well-being differed significantly across the three groups, with Whites reporting the highest, and Blacks the lowest, levels. Path analysis indicated that illness intrusiveness accounted for this race-related difference. Although disease activity was significantly associated with psychosocial well-being, it did not differ across ethnoracial groups. Illness intrusiveness and educational attainment emerged as independent mediators of the race-related difference in psychosocial well-being. We conclude that race-related quality-of-life differences exist among women with SLE and are mediated independently by illness intrusiveness and educational attainment.

  9. Saltwater Intrusion: Climate change mitigation or just water resources management?

    NASA Astrophysics Data System (ADS)

    Ferguson, G. A.; Gleeson, T.

    2011-12-01

    Climate change and population growth are expected to substantially increase the vulnerability of global water resources throughout the 21st century. Coastal groundwater systems are a nexus of the world's changing oceanic and hydrologic systems and a critical resource for the over one billion people living in coastal areas as well as for terrestrial and offshore ecosystems. Synthesis studies and detailed simulations predict that rising sea levels could negatively impact coastal aquifers by causing saltwater to intrude landward within coastal aquifers or by saltwater inundation of coastal regions. Saltwater intrusion caused by excessive extraction is already impacting entire island nations and globally in diverse regions such as Nile River delta in Egypt, Queensland, Australia and Long Island, USA. However, the vulnerability of coastal aquifers to sea level rise and excessive extraction has not been systematically compared. Here we show that coastal aquifers are much more vulnerable to groundwater extraction than predicted sea level rise in wide-ranging hydrogeologic conditions and population densities. Low lying areas with small hydraulic gradients are more sensitive to climate change but a review of existing coastal aquifer indicates that saltwater intrusion problems are more likely to arise where water demand is high. No cases studies were found linking saltwater intrusion to sea level rise during the past century. Humans are a key driver in the hydrology of coastal aquifers and that adapting to sea level rise at the expense of better water management is misguided.

  10. Petrography and petrology of Smoky Butte intrusives, Garfield County, Montana

    USGS Publications Warehouse

    Matson, Robert E.

    1960-01-01

    The Smoky Butte intrusives are located in T. 18 N., R. 36 E. Garfield County, Montana on the extreme eastern edge of the petrographic province of Central Montana. They consist of dikes and plugs arranged in linear, en-echelon pattern with a northeast trend and intrude the Tullock member (Paleocene age) of the Fort Union formation. Extrusive rocks are absent. The rocks are potassium-rich volcanic types showing a disequilibrium mineral assemblage consisting of sanidine, leucite, biotite, olivine, pyroxene, magnetite plus. ilmenite, apatite, calcite, quartz, and a yellowish to dark greenish glassy groundmass. Two chemical analyses of Smoky Butte rocks show high magnesium, potassium, titanium, and phosphorous and low aluminum and sodium content. The two norm calculations show that the rocks are oversaturated with 1.3 and 3.1 per-cent excess silica. Because of the peculiar nature of the Smoky Butte rocks, descriptive names have been applied to them. They are divided into six different types. Three periods of intrusion are proposed for Smoky Butte quarry where three rock types crop out. Other evidence for multiple injection occurs in several multiple dikes. The upper contact of the intrusion is visible on a few plugs and dikes. Smoky Butte rocks show some similarities to the undersaturated potassium-rich rocks of the Highwood and Bearpaw Mountains of Montana, the rocks of the Leucite Hills of Wyoming, and the oversaturated rocks of the West Kimberly District of Australia.

  11. Perimeter intrusion alarm systems - May 1980 (Rev. 2)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1981-01-01

    This guide describes six types of perimeter intrusion alarm systems and sets forth criteria for their performance and use as a means acceptable to the NRC staff for meeting specified portions of the Commission's regulations. It also references a document (SAND 76-0554) that provides additional information in this area, especially on the subject of combining sensors to yield a better overall performance.

  12. Demonstration of non-intrusive traffic data collection devices in Alaska.

    DOT National Transportation Integrated Search

    2010-05-01

    The purpose of this document is to present findings from the Demonstration of Non-Intrusive Traffic Data Collection Devices in Alaska. This project was initiated by the : Alaska Department of Transportation and Public Facilities (DOT&PF) to evaluate ...

  13. Application of interleaving models to describe intrusive layers in the Deep Polar Water of the Arctic Basin

    NASA Astrophysics Data System (ADS)

    Zhurbas, Nataliya; Kuzmina, Natalia; Lyzhkov, Dmitry; Izvekova, Yulia N.

    2016-04-01

    Interleaving models of pure thermohaline and baroclinic frontal zones of finite width are applied to describe intrusions at the fronts found in the upper part of the Deep Polar Water, the Eurasian basin, under stable-stable thermohaline stratification. It is assumed that differential mixing is the main mechanism of the intrusion formation. Different parameterizations of differential mixing (Merrryfield, 2002; Kuzmina et al., 2011) are used in the models. Important parameters of interleaving such as the growth rate, vertical scale, and slope of the most unstable modes are calculated. It is found that the interleaving model of a pure thermohaline front can satisfactory describe the important parameters of intrusions observed at a thermohaline, very low baroclinicity front in the Eurasian basin, just in accordance to Merryfield (2002) findings. In the case of baroclinic front, satisfactory agreement over all the interleaving parameters is found between the model calculations and observations provided that the vertical momentum diffusivity significantly exceeds the corresponding mass diffusivity. Under specific (reasonable) constraints of the vertical momentum diffusivity, the most unstable mode has a vertical scale approximately two-three times smaller than the vertical scale of the observed intrusions. A thorough discussion of the results is presented. References Kuzmina N., Rudels B., Zhurbas V., Stipa T. On the structure and dynamical features of intrusive layering in the Eurasian Basin in the Arctic Ocean. J. Geophys. Res., 2011, 116, C00D11, doi:10.1029/2010JC006920. Merryfield W. J. Intrusions in Double-Diffusively Stable Arctic Waters: Evidence for Differential mixing? J. Phys. Oceanogr., 2002, 32, 1452-1439.

  14. Relationship between vapor intrusion and human exposure to trichloroethylene.

    PubMed

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  15. Relationship between vapor intrusion and human exposure to trichloroethylene

    PubMed Central

    ARCHER, NATALIE P.; BRADFORD, CARRIE M.; VILLANACCI, JOHN F.; CRAIN, NEIL E.; CORSI, RICHARD L.; CHAMBERS, DAVID M.; BURK, TONIA; BLOUNT, BENJAMIN C.

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥0.012 μg/L) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (p=0.0002 and p=0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 μg/m3 were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (p<.0001; 95% CI 10.4 – 236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting. PMID:26259926

  16. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    USGS Publications Warehouse

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    The conterminous United States hosts numerous volumetrically significant and geographically dispersed granitoid intrusions that range in age from 1.50 to 1.32 billion years before present (Ga). Although previously referred to as A-type granites, most are better described as ferroan granites. These granitoid intrusions are distributed in the northern and central Rocky Mountains, the Southwest, the northern midcontinent, and a swath largely buried beneath Phanerozoic cover across the Great Plains and into the southern midcontinent. These intrusions, with ages that are bimodally distributed between about 1.455–1.405 Ga and 1.405–1.320 Ga, are dispersed nonsystematically with respect to age across their spatial extents. Globally, although A-type or ferroan granites are genetically associated with rare-metal deposits, most U.S. 1.4 Ga granitoid intrusions do not contain significant deposits. Exceptions are the light rare-earth element deposit at Mountain Pass, California, and the iron oxide-apatite and iron oxide-copper-gold deposits in southeast Missouri.Most of the U.S. 1.4 Ga granitoid intrusions are composed of hornblende ± biotite or biotite ± muscovite monzogranite, commonly with prominent alkali feldspar megacrysts; however, modal compositions vary widely. These intrusions include six of the eight commonly identified subtypes of ferroan granite: alkali-calcic and calc-alkalic peraluminous subtypes; alkalic, alkali-calcic, and calc-alkalic metaluminous subtypes; and the alkalic peralkaline subtype. The U.S. 1.4 Ga granitoid intrusions also include variants of these subtypes that have weakly magnesian compositions. Extreme large-ion lithophile element enrichments typical of ferroan granites elsewhere are absent among these intrusions. Chondrite-normalized rare-earth element patterns for these intrusions have modest negative slopes and moderately developed negative europium anomalies. Their radiogenic isotopic compositions are consistent with mixing involving

  17. Magmatic structure and geochemistry of the Luanga Mafic-Ultramafic Complex: Further constraints for the PGE-mineralized magmatism in Carajás, Brazil

    NASA Astrophysics Data System (ADS)

    Mansur, Eduardo Teixeira; Ferreira Filho, Cesar Fonseca

    2016-12-01

    The Luanga Complex is part of the Serra Leste Magmatic Suite, a cluster of PGE-mineralized mafic-ultramafic intrusions located in the northeastern portion of the Carajás Mineral Province. The Luanga Complex is a medium-sized layered intrusion consisting of three main zones: i. the lower Ultramafic Zone comprising ultramafic adcumulates (peridotite), ii. the Transition Zone comprising interlayered ultramafic and mafic cumulates (harzburgite, orthopyroxenite and norite) and iii. the upper Mafic Zone comprising a monotonous sequence of mafic cumulates (norite) with minor orthopyroxenite layers. Several PGE-mineralized zones occur in the Transition Zone but the bulk of the PGE resources are hosted within a 10-50 meter thick interval of disseminated sulfides at the contact of the Ultramafic and Transition Zones. The compositional range of cumulus olivine (Fo78.9-86.4) is comparable to those reported for layered intrusions originated from moderate primitive parental magmas. Mantle normalized alteration-resistant trace element patterns of noritic rocks are fractionated, as indicated by relative enrichment in LREE and Th, with negative Nb and Ta anomalies, suggesting assimilation of older continental crust. Ni contents in olivine in the Luanga Complex (up to 7500 ppm) stand among the highest values reported in layered intrusions globally. The highest Ni contents in olivine in the Luanga Complex occur in distinctively PGE enriched (Pt + Pd > 1 ppm) intervals of the Transition Zone, in both sulfide-poor and sulfide bearing (1-3 vol.%) rocks. The origin of the PGE- and Ni-rich parental magma of the Luanga Complex is discussed considering the upgrading of magmas through dissolution of previously formed Ni-rich sulfide melts. Our results suggest that high Ni contents in olivine and/or orthopyroxene provide an additional exploration tool for Ni-PGE deposits, particularly useful for target selection in large magmatic provinces.

  18. Numerical simulations of hydrothermal circulation resulting from basalt intrusions in a buried spreading center

    USGS Publications Warehouse

    Fisher, A.T.; Narasimhan, T.N.

    1991-01-01

    A two-dimensional, one by two-kilometer section through the seafloor was simulated with a numerical model to investigate coupled fluid and heat flow resulting from basalt intrusions in a buried spreading center. Boundary and initial conditions and physical properties of both sediments and basalt were constrained by field surveys and drilling in the Guaymas Basin, central Gulf of California. Parametric variations in these studies included sediment and basalt permeability, anisotropy in sediment permeability, and the size of heat sources. Faults were introduced through new intrusions both before and after cooling.Background heat input caused fluid convection at velocities ≤ 3 cm a−1 through shallow sediments. Eighty to ninety percent of the heat introduced at the base of the simulations exited through the upper, horizontal surface, even when the vertical boundaries were made permeable to fluid flow. The simulated injection of a 25–50 m thick basalt intrusion at a depth of 250 m resulted in about 10 yr of pore-fluid expulsion through the sea-floor in all cases, leaving the sediments above the intrusions strongly underpressured. A longer period of fluid recharge followed, sometimes accompanied by reductions in total seafloor heat output of 10% in comparison to pre-intrusion values. Additional discharge-recharge events were dispersed chaotically through the duration of the cooling period. These cycles in heat and fluid flow resulted from the response of the simulated system to a thermodynamic shock, the sudden emplacement of a large heat source, and not from mechanical displacement of sediments and pore fluids, which was not simulated.Water/rock mass ratios calculated from numerical simulations are in good agreement with geochemical estimates from materials recovered from the Guaymas Basin, assuming a bulk basalt permeability value of at least 10−17 m2/(10−2 mD). The addition of faults through intrusions and sediments in these simulations did not facilitate

  19. Trends in intrusive and eruptive activity during Kilauea's long-lived east rift zone eruption

    NASA Astrophysics Data System (ADS)

    Orr, T. R.; Patrick, M. R.; Heliker, C.

    2011-12-01

    Kilauea Volcano's Pu`u `O`o eruption, continuing for nearly three decades, offers a unique opportunity to study trends in eruptive behavior. One such trend, that of uprift intrusion ± eruption, accompanied by crater floor collapse and eruptive hiatus, has been repeated several times at Pu`u `O`o. This includes the February 7, 1993, intrusion; the January 29, 1997, intrusion and eruption; the September 12, 1999, intrusion; and the June 17, 2007, intrusion and eruption. Activity resumed within Pu`u `O`o following each of these events, and crater refilling culminated eventually in the outbreak of lava from new vents on the flank of the Pu`u `O`o cone. The pattern was repeated again in 2011, when a brief fissure eruption uprift from Pu`u `O`o started on March 5. The Pu`u `O`o crater floor dropped about 115 m in response to the eruption, which ceased on March 9. After a short hiatus, lava reappeared in Pu`u `O`o on March 26, and the crater began to fill slowly thereafter by overflow from a central lava lake. Starting in late June 2011, however, the crater floor began to uplift in a wholesale fashion, suggesting an increase in the pressure beneath the Pu`u `O`o edifice. By late July, the lava within the crater had reached its highest level since early 2004, and lava had begun to overflow from the southwestern side of the crater. On August 3, the west side of the Pu`u `O`o cone was abruptly thrust upward as a sill was injected beneath that portion of the cone. Within minutes, lava began to erupt from a crack on the west flank of Pu`u `O`o, completing the pattern of intrusion, crater collapse, refilling, and breakout. During a long-lived eruption, maintaining a detailed observational and geophysical record is essential for recognizing patterns that may emerge. Recognizing such a pattern allowed Hawaiian Volcano Observatory scientists to prepare a response well in advance of the August 3, 2011 event, and provides guidance for responding to future eruption crises at Pu`u `O

  20. A hypnotically mediated guided imagery intervention for intrusive imagery: creating ground for figure.

    PubMed

    Appel, P R

    1999-04-01

    Intrusive imagery can be seen as a cognitive dysfunction in the assimilation and accommodation of the psychological material represented by those images. From a gestalt psychological perspective, the intrusive image represents a figure without a ground that can provide meaning and context. Hypnotically mediated guided imagery interventions can be used to create a ground for the rogue image that metaphorically is an unassimilated figure; and thus allow for the creation of a new cognitive scheme. Four case examples are presented as well as a model for the intervention.