Sample records for tatoosh intrusive suite

  1. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    USGS Publications Warehouse

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  2. Isotopic variation in the Tuolumne Intrusive Suite, central Sierra Nevada, California

    USGS Publications Warehouse

    Kistler, R.W.; Chappell, B.W.; Peck, D.L.; Bateman, P.C.

    1986-01-01

    Granitoid rocks of the compositionally zoned Late Cretaceous Toulumne Intrusive Suite in the central Sierra Nevada, California, have initial87Sr/86Sr values (Sri) and143Nd/144Nd values (Ndi) that vary from 0.7057 to 0.7067 and from 0.51239 to 0.51211 respectively. The observed variation of both Sri and Ndi and of chemical composition in rocks of the suite cannot be due to crystal fractionation of magma solely under closed system conditons. The largest variation in chemistry, Ndi, and Sri is present in the outer-most equigranular units of the Tuolumne Intrusive Suite. Sri varies positively with SiO2, Na2O, K2O, and Rb concentrations, and negatively with Ndi, Al2O3, Fe2O3, MgO, FeO, CaO, MnO, P2O5, TiO2, and Sr concentrations. This covariation of Sri, Ndi and chemistry can be modeled by a process of simple mixing of basaltic and granitic magmas having weight percent SiO2 of 48.0 and 73.3 respectively. Isotopic characteristic of the mafic magma are Sri=0.7047, Ndi=0.51269 and ??18O=6.0, and of the felsic magma are Sri=0.7068, Ndi=0.51212 and ??18O=8.9. The rocks sampled contain from 50 to 80% of the felsic component. An aplite in the outer equigranular unit of the Tuolumne Intrusive Suite apparently was derived by fractional crystallization of plagioclase and hornblende from magma with granudiorite composition that was a product of mixing of the magmas described above. Siliceous magmas derived from the lower crust, having a maximum of 15 percent mantle-derived mafic component, are represented by the inner prophyritic units of the Tuolumne Intrusive Suite. ?? 1986 Springer-Verlag.

  3. A new interpretation of the structure of the Sept Iles Intrusive suite, Canada

    NASA Astrophysics Data System (ADS)

    Higgins, Michael D.

    2005-08-01

    The layered mafic intrusion at Sept Iles, Canada, is one of the largest intrusions in the world. A new interpretation of its structure is proposed, based on a review of its geology and a comparison with the Skaergaard intrusion, Greenland. Several different magmatic components are recognized; hence the name Sept Iles Intrusive suite (SIIS) is proposed. Emplacement of the suite may have been preceded by eruption of flood basalts. The first magmas of the suite rose in the crust to accumulate beneath the density filter afforded by the basalts. The largest component is the Sept Iles Mafic intrusion (SIMI). The Lower series of the SIMI is dominated by leucotroctolites and leucogabbros. Above it lie the Layered series, which is largely comprised of gabbro and troctolite. Both these units are unchanged from earlier interpretations. The anorthosites (s.l.), gabbros and monzogabbros, formerly called the Transitional series, are now considered to be the Upper Border series, developed by floatation of plagioclase. Common autoliths in the Layered series are parts of the hydrothermally altered Upper Border series from towards the interior of the intrusion, which have foundered and settled through the magma. The contamination of the magma that accompanied this event oxidised iron in the magma and led to the precipitation of magnetite around the periphery of the intrusion. The subsequent depletion of Fe 3+ and/or increase in SiO 2, CaO and P 2O 5 may have induced apatite saturation and accumulation to form two layers rich in apatite, near the base and at top of the Layered series. Granitic magma was developed by fractional crystallisation and was emplaced along the roof of the chamber, where it acquired large quantities of xenoliths. These were probably derived from the flood basalts, their evolved members and fragments of mafic dykes chilled by the granitic magma. Accumulations of monzonite pillows in this unit testify to another magmatic event and a floor to the granitic magma

  4. Platinum-group element geochemistry of zoned ultramafic intrusive suites, Klamath Mountains, California and Oregon.

    USGS Publications Warehouse

    Gray, F.; Page, N.J.; Carlson, C.A.; Wilson, S.A.; Carlson, R.R.

    1986-01-01

    Analyses for platinum-group elements of the varied rock suites of three Alaskan-type ultramafic to mafic multi-intrusive bodies are reported. Ir and Ru are less than analytical sensitivities of 100 and 20 ppb; Rh is less than or near 1 ppb. Average Pd assays vary among the rocks within intrusive complexes and between the three complexes (6.3, 13.7, 36.4 ppb); average Pt assays vary little among the same samples (27.9, 60.9, 34.0 ppb). Statistically adjusted Pt/(Pt + Pd) ratios increase in each suite from gabbro through clinopyroxenite to olivine-rich rocks, possibly owing to Pd fractionation.-G.J.N.

  5. Geophysical Character and Geochemical Evolution of the Mesoproterozoic Figueira Branca Intrusive Suite, SW Amazon Craton (Brazil)

    NASA Astrophysics Data System (ADS)

    Louro, Vinicius; Cawood, Peter; Mantovani, Marta

    2016-04-01

    The Jauru Terrain hosts the Figueira Branca Intrusive Suite (FBS) in the SW of the Amazon Craton (Brazil). The FBS is a series of 1425 Ma layered mafic intrusions, previously interpreted as anorogenic. The FBS area is located in foreland to the Santa Helena orogen, formed by the subduction of the Rio Alegre Terrain under the Jauru Terrain. Potential field methods (magnetic and gravity), gamma-ray spectrometry, geochemical and isotope data were used to characterize and to model the extent of FBS magmatism, the distribution of faults and shear zones in the area, to evaluate affinities of the magmatic activity, and the relation between the FBS and the Santa Helena orogen. The geophysical methods identified three anomalies corresponding with FBS outcrops. A fourth anomaly with significantly higher amplitude was observed to the north of the three anomalies. From south to north, the anomalies were named Indiavaí, Azteca, Figueira Branca and Jauru. These anomalies were modeled and indicated a northwest-southeast trend, parallel to regional shear zones. The gamma-ray data enabled the collection of 50 samples from the FBS rocks, the Alto Jauru group that hosts the FBS, from nearby intrusive suites, and the Rio Alegre Terrain. The 30 freshest samples were analyzed by X-ray fluorescence for oxides and some trace elements, 20 by ICP-MS for Rare-Earth Elements and 10 for Nd-Sr isotope analyses. The FBS samples were gabbros and gabbro-norites with Nb/Yb-Th/Yb and TiO2/Yb-Nb/Yb ratios indicating varying degrees of crustal interaction. The TiO2/Yb-Nb/Yb data suggested a subduction related component and the ɛNd-ɛSr indicated a juvenile source. Samples from coeval adjacent intermediate magma suites displayed similar characteristics, which suggest derivation from a bimodal source probably related with the subduction of the Rio Alegre Terrain. We interpreted the tectonic setting of the FBS as a result of a roll-back of the subducted slab, which resulted in rejuvenation of the

  6. Zircon U-Pb Ages Chronicle 3 Myr of Episodic Crystallization in the Composite Miocene Tatoosh Pluton, Mount Rainier National Park, Washington Cascades

    NASA Astrophysics Data System (ADS)

    Bacon, C. R.; Du Bray, E. A.; Wooden, J. L.; Mazdab, F. K.

    2007-12-01

    Zircon geochronology of upper crustal plutons can constrain longevities of intermediate to silicic magmatic systems. As part of a larger study of the geochemistry and metallogeny of Tertiary Cascades magmatic arc rocks, we used the USGS-Stanford SHRIMP RG to determine 20 to 28 238U-206Pb ages for zircons from each of 6 quartz monzodiorite (qmd), quartz monzonite (qm), or granodiorite (grd) samples representative of the Tatoosh pluton, and one grd from the nearby Carbon River stock. The 7x12 km composite Tatoosh pluton, discontinuously exposed on the south flank of Mount Rainier, consists of at least 4 petrographic/compositional phases, here termed Pyramid Peak, Nisqually, Reflection Lake, and Tatoosh. These collectively intrude gently folded and weakly metamorphosed basaltic andesite flows and volcaniclastic rocks of the Eocene Ohanapecosh Formation, silicic ignimbrites and sedimentary rocks of the Oligocene Stevens Ridge Formation, and basaltic to intermediate volcanic rocks of the Miocene Fifes Peak Formation. Histograms and relative probability plots of U- Pb ages indicate 2 to 4 age populations within each sample. The weighted mean age of each of the youngest populations (all ±2σ) is interpreted as the time of final solidification: Pyramid Peak qmd (58.5% SiO2) 17.4±0.2 Ma, Nisqually grd (in Paradise Valley; 65.4% SiO2) 16.7±0.2 Ma, Nisqually grd (at Christine Falls; 66.4% SiO2) 17.3±0.2 Ma, Reflection Lake qm (along Pinnacle Peak trail; 66.6% SiO2) 17.1±0.2 Ma, Tatoosh grd (in Stevens Canyon; 67.8% SiO2) 18.2±0.2 Ma, Tatoosh grd (south of Louise Lake; 69.3% SiO2) 19.3±0.1 Ma, and Carbon River grd (68.0% SiO2) 17.4±0.3 Ma. The older Nisqually grd age is indistinguishable from a TIMS zircon age of 17.5±0.1 Ma reported by Mattinson (GSA Bulletin 88:1509-1514, 1977) for grd from a nearby locality. None of the 164 SHRIMP-RG U-Pb ages, including cores, is older than 21 Ma. The relatively small, high-level pluton likely was emplaced and solidified in pulses

  7. Zircon Trace Element Contents and Refined U-Pb Crystallization Ages for the Tatoosh Pluton, Mount Rainier National Park, Washington Cascades

    NASA Astrophysics Data System (ADS)

    Bacon, C. R.; Du Bray, E. A.; John, D. A.; Mazdab, F. K.; Wooden, J. L.

    2008-12-01

    The 7x12 km Tatoosh pluton south of Mount Rainier consists of 4 petrographic/compositional phases, here termed Nisqually, Reflection, Pyramid, and Stevens, that intrude Tertiary volcanic and sedimentary wall and roof rocks; contacts between the 4 intrusive units are rarely exposed. We used the USGS-Stanford SHRIMP- RG to analyze, in a continuous session, zircons from each of 6 quartz monzodiorite (qmd), quartz monzonite (qm), or granodiorite (grd) samples for 206Pb/238U ages and, concurrently, U, Th, Hf, and REE concentrations. A round-robin procedure yielded statistically robust geochronological results. Ages that we reported previously (FM07) were compromised by instrument instability and by calibration differences between analytical sessions. Between 11 and 31 new analyses of zircons from each sample were evaluated using the TuffZirc and Umix Ages routines of Isoplot 3.41 (Ludwig, 2003). TuffZirc solidification ages for the intrusions are: Nisqually grd (Paradise Valley; 65.4% SiO2) 17.29 +0.37/-0.24 Ma, Nisqually grd (Christine Falls; 66.4%) 17.70 +0.30/-0.16 Ma, Reflection qm (Pinnacle Peak trail; 66.6%) 18.38 +0.45/-0.28 Ma, Pyramid qmd (58.5%) 18.58 +0.20/-0.15 Ma, Stevens grd (Stevens Canyon; 67.8%) 19.15 +0.15/-0.12 Ma, and Stevens grd (south of Louise Lake; 69.3%) 19.20 +0.31/-0.26 Ma (U-Th initial-disequilibrium corrected, ±2σ). Precision of the U-Pb data limits rigorous identification of antecrysts to those with ages ~1 Myr > solidification ages. Antecryst ages that produce subsidiary modes in relative probability diagrams for the two Stevens samples give weighted mean values of 20.18 ±0.26 Ma and 20.07 ±0.18 Ma. Wide ranges in trace element concentrations and ratios indicate that many analyzed zircons grew in highly fractionated residual liquids in high-crystallinity environments. Concentrations of Th and U in Tatoosh zircons vary by two orders of magnitude, cores tend to have higher Th, U, and Th/U than rims, and overgrowths that fill reentrants

  8. Orbit Software Suite

    NASA Technical Reports Server (NTRS)

    Osgood, Cathy; Williams, Kevin; Gentry, Philip; Brownfield, Dana; Hallstrom, John; Stuit, Tim

    2012-01-01

    Orbit Software Suite is used to support a variety of NASA/DM (Dependable Multiprocessor) mission planning and analysis activities on the IPS (Intrusion Prevention System) platform. The suite of Orbit software tools (Orbit Design and Orbit Dynamics) resides on IPS/Linux workstations, and is used to perform mission design and analysis tasks corresponding to trajectory/ launch window, rendezvous, and proximity operations flight segments. A list of tools in Orbit Software Suite represents tool versions established during/after the Equipment Rehost-3 Project.

  9. Paleomagnetism of the Miocene intrusive suite of Kidd Creek: Timing of deformation in the Cascade arc, southern Washington

    USGS Publications Warehouse

    Hagstrum, J.T.; Swanson, D.A.; Snee, L.W.

    1998-01-01

    Paleomagnetic study of the intrusive suite of Kidd Creek in the southern Washington Cascades (23 sites in dikes and sills) was undertaken to help determine if these rocks are comagmatic and whether they postdate regional folding of the volcanic arc. Fission track and 40Ar-39Ar age determinations indicate an age of ???12.7 Ma (middle Miocene) for these rocks. The similarity of normal-polarity characteristic directions for most samples corroborate the available geochemical data indicating that these rocks are most likely comagmatic. Reversed-polarity directions for samples from four sites, however, show that emplacement of Kidd Creek intrusions spanned at least one reversal of the geomagnetic field. The paleomagnetic directions for the dikes and sills fail a fold test at the 99% confidence level indicating that the Kidd Creek rocks postdate regional folding. The mean in situ direction also indicates that the Kidd Creek and older rocks have been rotated 22?? ?? 6?? clockwise about a vertical or near-vertical axis from the expected Miocene direction. Compression and regional folding of the Cascade arc in southern Washington therefore had ended by ???12 Ma prior to the onset of deformation resulting in rotation of these rocks.

  10. Isotopic data for Late Cretaceous intrusions and associated altered and mineralized rocks in the Big Belt Mountains, Montana

    USGS Publications Warehouse

    du Bray, Edward A.; Unruh, Daniel M.; Hofstra, Albert H.

    2017-03-07

    The quartz monzodiorite of Mount Edith and the concentrically zoned intrusive suite of Boulder Baldy constitute the principal Late Cretaceous igneous intrusions hosted by Mesoproterozoic sedimentary rocks of the Newland Formation in the Big Belt Mountains, Montana. These calc-alkaline plutonic masses are manifestations of subduction-related magmatism that prevailed along the western edge of North America during the Cretaceous. Radiogenic isotope data for neodymium, strontium, and lead indicate that the petrogenesis of the associated magmas involved a combination of (1) sources that were compositionally heterogeneous at the scale of the geographically restricted intrusive rocks in the Big Belt Mountains and (2) variable contamination by crustal assimilants also having diverse isotopic compositions. Altered and mineralized rocks temporally, spatially, and genetically related to these intrusions manifest at least two isotopically distinct mineralizing events, both of which involve major inputs from spatially associated Late Cretaceous igneous rocks. Alteration and mineralization of rock associated with the intrusive suite of Boulder Baldy requires a component characterized by significantly more radiogenic strontium than that characteristic of the associated igneous rocks. However, the source of such a component was not identified in the Big Belt Mountains. Similarly, altered and mineralized rocks associated with the quartz monzodiorite of Mount Edith include a component characterized by significantly more radiogenic strontium and lead, particularly as defined by 207Pb/204Pb values. The source of this component appears to be fluids that equilibrated with proximal Newland Formation rocks. Oxygen isotope data for rocks of the intrusive suite of Boulder Baldy are similar to those of subduction-related magmatism that include mantle-derived components; oxygen isotope data for altered and mineralized equivalents are slightly lighter.

  11. Linking magnetic fabric and cumulate texture in layered mafic-ultramafic intrusions (Invited)

    NASA Astrophysics Data System (ADS)

    O Driscoll, B.; Stevenson, C.; Magee, C.

    2013-12-01

    Research on the magnetic fabrics of igneous rocks, pioneered by Balsley and Buddington[1] and Khan[2], has greatly contributed to our understanding of magma dynamics in lava flows, sheet intrusions and plutons over the past five decades. However, considerably few magnetic fabric studies have focused on layered mafic-ultramafic intrusions, particularly ';lopolithic' intrusions, despite the fact that such rocks may preserve a large range of small-scale kinematic structures potentially related to important magma chamber processes. This may be partly due to the fact that mafic-ultramafic cumulates commonly exhibit visible planar fabrics (mineral lamination), as well as compositional layering, in contrast to the frequent absence of such features in granite bodies or fine-grained mafic lava flows. Indeed, debates in the 1970s and 1980s on the development of layering and mineral fabrics in mafic-ultramafic intrusions, focused around the crystal settling versus in situ crystallisation paradigms, are classic in the subject of igneous petrology. Central to these debates is the notion that a wide range of magma chamber processes occur in layered mafic-ultramafic intrusions that are not frequently considered to occur in their relatively viscous granitic counterparts; in essence, the latter have historically been viewed as much more likely to ';freeze-in' a primary magma flow fabric whilst mafic-ultramafic intrusions are subjected to a more protracted solidification history. This wide array of potential initial sources for layering and mineral fabrics in layered mafic-ultramafic intrusions, together with the possible modification of textures at the postcumulus stage, demands a cautious application of any fabric analysis and presents a problem well-suited to interrogation by the AMS technique. The purpose of this contribution is to provide specific context on the application of AMS to elucidating the formation of cumulates in layered mafic-ultramafic intrusions. Examples of AMS

  12. Isotopic evolution of the idaho batholith and Challis intrusive province, Northern US Cordillera

    USGS Publications Warehouse

    Gaschnig, Richard M.; Vervoort, J.D.; Lewis, R.S.; Tikoff, B.

    2011-01-01

    The Idaho batholith and spatially overlapping Challis intrusive province in the North American Cordillera have a history of magmatism spanning some 55 Myr. New isotopic data from the ???98 Ma to 54 Ma Idaho batholith and ???51 Ma to 43 Ma Challis intrusions, coupled with recent geochronological work, provide insights into the evolution of magmatism in the Idaho segment of the Cordillera. Nd and Hf isotopes show clear shifts towards more evolved compositions through the batholith's history and Pb isotopes define distinct fields correlative with the different age and compositionally defined suites of the batholith, whereas the Sr isotopic compositions of the various suites largely overlap. The subsequent Challis magmatism shows the full range of isotopic compositions seen in the batholith. These data suggest that the early suites of metaluminous magmatism (98-87 Ma) represent crust-mantle hybrids. Subsequent voluminous Atlanta peraluminous suite magmatism (83-67 Ma) results primarily from melting of different crustal components. This can be attributed to crustal thickening, resulting from either subduction processes or an outboard terrane collision. A later, smaller crustal melting episode, in the northern Idaho batholith, resulted in the Bitterroot peraluminous suite (66-54 Ma) and tapped different crustal sources. Subsequent Challis magmatism was derived from both crust and mantle sources and corresponds to extensional collapse of the over-thickened crust. ?? The Author 2011. Published by Oxford University Press. All rights reserved.

  13. Geochemical Investigation of Saddlebag Lake Roof Pendant and Lee Vining Intrusive Suite Origins

    NASA Astrophysics Data System (ADS)

    Wonderly, A.; Canchola, J.; Putirka, K. D.

    2009-12-01

    Our study is to determine to what extent volcanic rocks from the Saddlebag Lake Roof Pendant (SLRP) represent the erupted complement of the Sierra Nevada Batholith (SNB). SLRP formation is thought to be prior to or synchronous with Sierra Nevada orogeny. Age dates of the SLRP are similar to age dates from the Lee Vining Intrusive Suite (LVIS), so the LVIS may be the plutonic equivalent of the SLRP (Kistler and Fleck 1994). A hypothesized analog between SLRP-LVIS is the Wilson Ridge Pluton (WRP)-River Mountains (RM) complex in southern Nevada, which is a dismembered volcanic complex offset by normal faulting (Honn and Smith, 2008). WRP and RM trace element data from Honn and Smith plot very similar on a Hf-Th-Ta ternary diagram, and Sr and Nd isotope analyses also indicate that the Nevada rocks are co-magmatic. Our goal is to conduct geochemical tests to determine whether the SLRP and LVIS are co-genetic. Our preliminary data support the possibility that the SLRP may provide a window into the magmatic evolutionary processes that led to the development of the LVIS, and the SNB generally. Eighteen samples were collected from the SLRP; major element compositions of whole rocks yield similar weight percents of major oxides for some published data from the LVIS (Bateman et al. 1984). Our SLRP samples, though, trend to higher MgO, Fe2O3, Al2O3, and CaO, lower in SiO2 and Na2O+K2O. If the SLRP and LVIS are indeed related, the SLRP samples may represent some of the less-differentiated liquids from which the LVIS was derived. We were only able to find one basalt (51.2 wgt % SiO2), albeit with very low MgO (2.17 wt %), which may give clues as to the origin of the LVIS. If the mafic enclaves in the LVIS were once liquid, then the SLRP basalts should be comparable to mafic enclaves in composition. We are also analyzing mafic enclaves from the LVIS to explore whether these are liquid precursors to Sierra Nevada Batholith granites.

  14. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena.

  15. How to build a mid-crustal intrusive suite: geologic mapping, U-Pb geo-/thermochronology, and thermal modeling of the Bergell Intrusion, Central Alps

    NASA Astrophysics Data System (ADS)

    Samperton, K. M.; Schoene, B.; Annen, C.

    2015-12-01

    Insights into the characteristic rates and processes of crustal magmatic systems can best be made through the integration of observational, analytical and modeling perspectives. We present such an approach in reconstructing the emplacement, differentiation and cooling history of the Bergell Intrusion (N Italy/SE Switzerland), a normally-zoned pluton preserving a ~10 km mid-crustal transect. U-Pb zircon, titanite and allanite geo-/thermochronology of Bergell granitoids provide key empirical constraints for informing numerical simulations of pulse-wise, incremental assembly. Protracted zircon crystallization histories, representing the time between magma zircon saturation and cooling to the solidus, provide a direct petrologic link to forward models of magma emplacement, both of which can be used to derive quantitative magmatic cooling rates for the middle crust. Titanite and allanite dates provide additional constraints on the timing of solidification. Geochronology and modeling are performed in the context of detailed field and structural observations, including those previously interpreted as evidence of upward, pluton-scale melt migration via floor convergence/roof ballooning. Combined Bergell data and modeling demonstrate that pulsed assembly can lead to the formation of substantial melt reservoirs in the middle crust: this finding is largely in contrast to similar models of shallow crustal plutons, highlighting the importance of factors such as ambient country rock temperature in affecting melt residence timescales. This work emphasizes the importance of implementing joint data/modeling studies to intrusive rocks across the full range of spatial scales, emplacement levels and tectonic settings observed on Earth.

  16. Carbonate-silicate melt immiscibility, REE mineralising fluids, and the evolution of the Lofdal Intrusive Suite, Namibia

    NASA Astrophysics Data System (ADS)

    Bodeving, Sarah; Williams-Jones, Anthony E.; Swinden, Scott

    2017-01-01

    The Lofdal Intrusive Suite, Namibia, consists of calcio-carbonatite and silica-undersaturated alkaline intrusive rocks ranging in composition from phono-tephrite to phonolite (and nepheline syenite). The most primitive of these rocks is the phono-tephrite, which, on the basis of its Y/Ho and Nb/Ta ratios, is interpreted to have formed by partial melting of the mantle. Roughly linear trends in major and trace element contents from phono-tephrite to phonolite and nepheline syenite indicate that the latter two rock types evolved from the phono-tephrite by fractional crystallisation. The nepheline syenite, however, has a lower rare earth element (REE) content than the phonolite. The carbonatite has a primitive mantle-normalised REE profile roughly parallel to that of the silica-undersaturated alkaline igneous rocks, although the absolute REE concentrations are higher. Like the phono-tephrite, it also has a mantle Y/Ho ratio. However, the Nb/Ta and Zr/Hf ratios are significantly higher. Moreover, the carbonatite displays strong negative Ta, Zr and Hf anomalies on spidergrams, whereas the silicate rocks display positive anomalies for these elements. Significantly, this behaviour is predicted by the corresponding carbonatite-silicate melt partition coefficients, as is the behaviour of the REE. Based on these observations, we interpret the carbonatite to represent an immiscible liquid that exsolved from the phono-tephrite or possibly the phonolite melt. The result was a calcio-carbonatite that is enriched in the heavy REE (HREE) relative to most other carbonatites. Fluids released from the corresponding magma are interpreted to have been the source of the REE mineralisation that is currently the target of exploration. 2. The composition of feldspar in nepheline syenite, fenite, calcio-carbonatite and phonolite plotted on the feldspar ternary classification diagram modified after Schairer (1950) in terms of the components albite (Ab), orthoclase (Or) and anorthite (An

  17. Assessment of regional management strategies for controlling seawater intrusion

    USGS Publications Warehouse

    Reichard, E.G.; Johnson, T.A.

    2005-01-01

    Simulation-optimization methods, applied with adequate sensitivity tests, can provide useful quantitative guidance for controlling seawater intrusion. This is demonstrated in an application to the West Coast Basin of coastal Los Angeles that considers two management options for improving hydraulic control of seawater intrusion: increased injection into barrier wells and in lieu delivery of surface water to replace current pumpage. For the base-case optimization analysis, assuming constant groundwater demand, in lieu delivery was determined to be most cost effective. Reduced-cost information from the optimization provided guidance for prioritizing locations for in lieu delivery. Model sensitivity to a suite of hydrologic, economic, and policy factors was tested. Raising the imposed average water-level constraint at the hydraulic-control locations resulted in nonlinear increases in cost. Systematic varying of the relative costs of injection and in lieu water yielded a trade-off curve between relative costs and injection/in lieu amounts. Changing the assumed future scenario to one of increasing pumpage in the adjacent Central Basin caused a small increase in the computed costs of seawater intrusion control. Changing the assumed boundary condition representing interaction with an adjacent basin did not affect the optimization results. Reducing the assumed hydraulic conductivity of the main productive aquifer resulted in a large increase in the model-computed cost. Journal of Water Resources Planning and Management ?? ASCE.

  18. Non-Intrusive, Distributed Gas Sensing Technology for Advanced Spacesuits

    NASA Technical Reports Server (NTRS)

    Delgado, Jesus; Phillips, Straun; Rubtsov, Vladimir; Chullen, Cinda

    2015-01-01

    Chemical sensors for monitoring gas composition, including oxygen, humidity, carbon dioxide, and trace contaminants are needed to characterize and validate spacesuit design and operating parameters. This paper reports on the first prototypes of a non-intrusive gas sensing technology based on flexible sensitive patches positioned inside spacesuit prototypes and interrogated by optical fibers routed outside the suit, taking advantage of the transparent materials of the suit prototypes. The sensitive patches are based on luminescent materials whose emission parameters vary with the partial pressure of a specific gas. Patches sensitive to carbon dioxide, humidity, oxygen, and ammonia have been developed, and their preliminary characterization in the laboratory using Mark III-like helmet parts is described. The first prototype system consists of a four-channel fiber optic luminescent detector that can be used to monitor any of the selected target gases at four locations. To switch from one gas to another we replace the (disposable) sensor patches and adjust the system settings. Repeatability among sensitive patches and of sensor performance from location to location has been confirmed, assuring that suit engineers will have flexibility in selecting multiple sensing points, fitting the sensor elements into the spacesuit, and easily repositioning the sensor elements as desired. The evaluation of the first prototype for monitoring carbon dioxide during washout studies in a space suit prototype is presented.

  19. Petroleum Vapor Intrusion

    EPA Pesticide Factsheets

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  20. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  1. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  2. The Role of KREEP in the Production of Mg-Suite Magmas and Its Influence on the Extent of Mg-Suite Magmatism in the Lunar Crust

    NASA Technical Reports Server (NTRS)

    Elardo, S. M.; Shearer, C. K.; McCubbin, F. M.

    2017-01-01

    The lunar magnesian-suite, or Mg-suite, is a series of ancient plutonic rocks from the lunar crust. They have received a considerable amount of attention from lunar scientists since their discovery for three primary reasons: 1) their ages and geochemistry indicate they represent pristine magmatic samples that crystallized very soon after the formation of the Moon; 2) their ages often overlap with ages of the ferroan anorthosite (FAN) crust; and 3) planetary-scale processes are needed in formation models to account for their unique geochemical features. Taken as a whole, the Mg-suite samples, as magmatic cumulate rocks, approximate a fractional crystallization sequence in the low-pressure forsterite-anorthite-silica system, and thus these samples are generally thought to be derived from layered mafic intrusions which crystallized very slowly from magmas that intruded the anorthositic crust. However, no direct linkages have been established between different Mg-suite samples based either on field relationships or geochemistry.The model for the origin of the Mg-suite, which best fits the limited available data, is one where Mg-suite magmas form from melting of a hybrid cumulate package consisting of deep mantle dunite, crustal anorthosite, and KREEP (potassium-rare earth elements-phosphorus) at the base of the crust under the Procellarum KREEP Terrane (PKT). In this model, these three LMO (Lunar Magma Ocean) cumulate components are brought into close proximity by the cumulate overturn process. Deep mantle dunitic cumulates with an Mg number of approximately 90 rise to the base of the anorthositic crust due to their buoyancy relative to colder, more dense Fe- and Ti-rich cumulates. This hybridized source rock melts to form Mg-suite magmas, saturated in Mg-rich olivine and anorthitic plagioclase, that have a substantial KREEP component.

  3. Chromite symplectites in Mg-suite troctolite 76535 as evidence for infiltration metasomatism of a lunar layered intrusion

    NASA Astrophysics Data System (ADS)

    Elardo, Stephen M.; McCubbin, Francis M.; Shearer, Charles K.

    2012-06-01

    Despite the very low chromium concentrations in its cumulus olivine (˜140 ppm), lunar troctolite 76535 contains large amounts of Cr sporadically, but highly concentrated, in symplectite assemblages consisting of Mg-Al-chromite and two pyroxenes. Previously proposed symplectite formation mechanisms include crystallization of trapped interstitial melt, diffusion of Cr from cumulus olivine, and/or remobilization of cumulus chromite grains. These mechanisms would imply that the highly Cr-depleted nature of Mg-suite parental magmas and their source materials inferred from cumulus olivine may be illusory. We have conducted a detailed petrologic and textural study of symplectites, as well as chromite veins, intercumulus assemblages, olivine-hosted melt inclusions and clinopyroxene-troilite veins in 76535 with the goals of constraining the origin of the symplectites, and the degree of Cr-depletion in Mg-suite magmas relative to other lunar basalts. Orthopyroxene and clinopyroxene in melt inclusions are depleted in Cr relative to their symplectite counterparts, averaging 900 and 1200 ppm vs. 7400 and 8100 ppm Cr2O3, respectively. Olivine in contact with symplectite assemblages may exhibit a diffusion profile of Cr going into olivine, whereas olivine boundaries away from symplectites show no diffusion profile. There is also a distinct lack of primary chromite as inclusions in cumulus phases and melt inclusions. Multiple textural observations, melt inclusion chemistry, and modeling of chromite-olivine equilibrium rule out previously proposed symplectite formation mechanisms, and strongly suggest that chromite was not a primary crystallization product of the 76535 parental magma. Accordingly, the post-cumulus addition of Cr and Fe is required to produce the symplectites. After considering multiple models, the addition of Cr and Fe to 76535 via infiltration metasomatism by an exogenous chromite-saturated melt is the model most consistent with multiple textural and geochemical

  4. Non-Intrusive, Distributed Gas Sensing Technology for Advanced Spacesuits

    NASA Technical Reports Server (NTRS)

    Delgado, Jesus; Phillips, Straun; Rubtsov, Vladimir; Chullen, Cinda

    2015-01-01

    Chemical sensors for monitoring gas composition, including oxygen, humidity, carbon dioxide, and trace contaminants, are needed to characterize and validate spacesuit design and operating parameters. This paper reports on the first prototypes of a non-intrusive gas sensing technology based on flexible sensitive patches positioned inside spacesuit prototypes and interrogated via optical fibers routed outside the suit, taking advantage of the transparent materials of the suit prototypes. The sensitive patches are based on luminescent materials whose emission parameters vary with the partial pressure of a specific gas. Patches sensitive to carbon dioxide, humidity, and temperature have been developed, and their preliminary laboratory characterization in Mark III-like helmet parts is described. The first prototype system consists of a four-channel fiber optic luminescent detector that can be used to monitor any of the selected target gases at four locations. To switch from one gas to another we replace the (disposable) sensor patches and adjust the system settings. Repeatability among sensitive patches and of sensor performance from location to location has been confirmed, assuring that suit engineers will have flexibility in selecting multiple sensing points, fitting the sensor elements into the spacesuit, and easily repositioning the sensor elements as desired. The evaluation of the first prototype for monitoring carbon dioxide during washout studies in a spacesuit prototype is presented.

  5. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  6. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE must...

  7. Sensitivity analysis of some critical factors affecting simulated intrusion volumes during a low pressure transient event in a full-scale water distribution system.

    PubMed

    Ebacher, G; Besner, M C; Clément, B; Prévost, M

    2012-09-01

    Intrusion events caused by transient low pressures may result in the contamination of a water distribution system (DS). This work aims at estimating the range of potential intrusion volumes that could result from a real downsurge event caused by a momentary pump shutdown. A model calibrated with transient low pressure recordings was used to simulate total intrusion volumes through leakage orifices and submerged air vacuum valves (AVVs). Four critical factors influencing intrusion volumes were varied: the external head of (untreated) water on leakage orifices, the external head of (untreated) water on submerged air vacuum valves, the leakage rate, and the diameter of AVVs' outlet orifice (represented by a multiplicative factor). Leakage orifices' head and AVVs' orifice head levels were assessed through fieldwork. Two sets of runs were generated as part of two statistically designed experiments. A first set of 81 runs was based on a complete factorial design in which each factor was varied over 3 levels. A second set of 40 runs was based on a latin hypercube design, better suited for experimental runs on a computer model. The simulations were conducted using commercially available transient analysis software. Responses, measured by total intrusion volumes, ranged from 10 to 366 L. A second degree polynomial was used to analyze the total intrusion volumes. Sensitivity analyses of both designs revealed that the relationship between the total intrusion volume and the four contributing factors is not monotonic, with the AVVs' orifice head being the most influential factor. When intrusion through both pathways occurs concurrently, interactions between the intrusion flows through leakage orifices and submerged AVVs influence intrusion volumes. When only intrusion through leakage orifices is considered, the total intrusion volume is more largely influenced by the leakage rate than by the leakage orifices' head. The latter mainly impacts the extent of the area affected by

  8. [Analysis of intrusion errors in free recall].

    PubMed

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  9. Post-collisional magmatism in the central East African Orogen: The Maevarano Suite of north Madagascar

    NASA Astrophysics Data System (ADS)

    Goodenough, K. M.; Thomas, R. J.; De Waele, B.; Key, R. M.; Schofield, D. I.; Bauer, W.; Tucker, R. D.; Rafahatelo, J.-M.; Rabarimanana, M.; Ralison, A. V.; Randriamananjara, T.

    2010-04-01

    Late tectonic, post-collisional granite suites are a feature of many parts of the Late Neoproterozoic to Cambrian East African Orogen (EAO), where they are generally attributed to late extensional collapse of the orogen, accompanied by high heat flow and asthenospheric uprise. The Maevarano Suite comprises voluminous plutons which were emplaced in some of the tectonostratigraphic terranes of northern Madagascar, in the central part of the EAO, following collision and assembly during a major orogeny at ca. 550 Ma. The suite comprises three main magmatic phases: a minor early phase of foliated gabbros, quartz diorites, and granodiorites; a main phase of large batholiths of porphyritic granitoids and charnockites; and a late phase of small-scale plutons and sheets of monzonite, syenite, leucogranite and microgranite. The main phase intrusions tend to be massive, but with variably foliated margins. New U-Pb SHRIMP zircon data show that the whole suite was emplaced between ca. 537 and 522 Ma. Geochemically, all the rocks of the suite are enriched in the LILE, especially K, and the LREE, but are relatively depleted in Nb, Ta and the HREE. These characteristics are typical of post-collisional granitoids in the EAO and many other orogenic belts. It is proposed that the Maevarano Suite magmas were derived by melting of sub-continental lithospheric mantle that had been enriched in the LILE during earlier subduction events. The melting occurred during lithospheric delamination, which was associated with extensional collapse of the East African Orogen.

  10. Machine Learning in Intrusion Detection

    DTIC Science & Technology

    2005-07-01

    machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate

  11. Intrusion detection: systems and models

    NASA Technical Reports Server (NTRS)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  12. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  13. Intrusion Detection in Database Systems

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Sohrabi, Mina; Rafsanjani, Marjan Kuchaki

    Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated.

  14. Saltwater intrusion monitoring in Florida

    USGS Publications Warehouse

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  15. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less

  16. Layered intrusions of the Duluth Complex, Minnesota, USA

    USGS Publications Warehouse

    Miller, J.D.; Ripley, E.M.; ,

    1996-01-01

    The Duluth Complex and associated subvolcanic intrusions comprise a large (5000 km2) intrusive complex in northeastern Minnesota that was emplaced into comagmatic volcanics during the development of the 1.1 Ga Midcontinent rift in North America. In addition to anorthositic and felsic intrusions, the Duluth Complex is composed of many individual mafic layered intrusions of tholeiitic affinity. The cumulate stratigraphies and cryptic variations of six of the better exposed and better studied intrusions are described here to demonstrate the variability in their cumulus mineral paragenesis.

  17. A hybrid composite dike suite from the northern Arabian Nubian Shield, southwest Jordan: Implications for magma mixing and partial melting of granite by mafic magma

    NASA Astrophysics Data System (ADS)

    Jarrar, Ghaleb H.; Yaseen, Najel; Theye, Thomas

    2013-03-01

    The Arabian Nubian Shield is an exemplary juvenile continental crust of Neoproterozoic age (1000-542 Ma). The post-collisional rift-related stage (~ 610 to 542 Ma) of its formation is characterized among others by the intrusion of several generations of simple and composite dikes. This study documents a suite of hybrid composite dikes and a natural example of partial melting of granite by a mafic magma from the northernmost extremity of Arabian Nubian Shield in southwest Jordan. The petrogenesis of this suite is discussed on the basis of field, petrographic, geochemical, and Rb/Sr isotopic data. These dikes give spectacular examples of the interaction between basaltic magma and the granitic basement. This interaction ranges from brecciation, partial melting of the host alkali feldspar granite to complete assimilation of the granitic material. Field structures range from intrusive breccia (angular partially melted granitic fragments in a mafic groundmass) to the formation of hybrid composite dikes that are up to 14 m in thickness. The rims of these dikes are trachyandesite (latite) with alkali feldspar ovoids (up to 1 cm in diameter); while the central cores are trachydacite to dacite and again with alkali feldspar ovoids and xenoliths from the dike rims. The granitic xenoliths in the intrusive breccia have been subjected to at least 33% partial melting. A seven-point Rb/Sr isochron from one of these composite dikes yields an age of 561 ± 33 Ma and an initial 87Sr/86Sr ratio of 0.70326 ± 0.0003 (2σ) and MSWD of 0.62. Geochemical modeling using major, trace, rare earth elements and isotopes suggests the generation of the hybrid composite dike suite through the assimilation of 30% to 60% granitic crustal material by a basaltic magma, while the latter was undergoing fractional crystallization at different levels in the continental crust.

  18. From intrusive to oscillating thoughts.

    PubMed

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  19. Vapor Intrusion

    EPA Pesticide Factsheets

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  20. A system for distributed intrusion detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snapp, S.R.; Brentano, J.; Dias, G.V.

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of ourmore » present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.« less

  1. The geochemical nature of the Archean Ancient Gneiss Complex and Granodiorite Suite, Swaziland: a preliminary study

    USGS Publications Warehouse

    Hunter, D.R.; Barker, F.; Millard, H.T.

    1978-01-01

    The Ancient Gneiss Complex (AGC) of Swaziland, an Archean gray gneiss complex, lies southeast and south of the Barberton greenstone belt and includes the most structurally complex and highly metamorphosed portions of the eastern Kaapvaal craton. The AGC is not precisely dated but apparently is older than 3.4 Ga. The AGC consists of three major units: (a) a bimodal suite of closely interlayered siliceous, low-K gneisses and metabasalt; (b) homogeneous tonalite gneiss; and (c) interlayered siliceous microcline gneiss, metabasalt, and minor metasedimentary rocks - termed the metamorphite suite. A geologically younger gabbro-diorite-tonalite-trondhjemite suite, the Granodiorite Suite, is spatially associated with the AGC and intrusive into it. The bimodal suite consists largely of two types of low-K siliceous gneiss: one has SiO2 14%, low Rb/Sr ratios, and depleted heavy rare earth elements (REE's); the other has SiO2 > 75%, Al2O3 < 13%, high Rb/Sr ratios, and relatively abundant REE's except for negative Eu anomalies. The interlayered metabasalt ranges from komatiitic to tholeiitic compositions. Lenses of quartz monzonitic gneiss of K2O/Na2O close to 1 form a minor part of the bimodal suite. Tonalitic to trondhjemitic migmatite locally is abundant and has major-element abundances similar to those of non-migmatitic varieties. The siliceous gneisses of the metamorphic suite show low Al2O, K2O/Na2O ratios of about 1, high Rb/Sr ratios, moderate REE abundances and negative Eu anomalies. K/Rb ratios of siliceous gneisses of the bimodal suite are very low (???130); of the tonalitic gneiss, low (???225); of the siliceous gneiss of the metamorphite suite, moderate (???300); and of the Granodiorite Suite, high (???400). Rocks of the AGC differ geochemically in several ways from the siliceous volcanic and hypabyssal rocks of the Upper Onverwacht Group and from the diapirs of tonalite and trondhjemite that intrude the Swaziland Group. ?? 1978.

  2. 20. NBS SUIT LAB. TABLE WITH MISCELLANEOUS SUIT PARTS AND ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. NBS SUIT LAB. TABLE WITH MISCELLANEOUS SUIT PARTS AND TERRY WEST, A SPACE SUIT ASSEMBLY TECHNICIAN LOGGING SUIT PART DATA. PARTS ON THE TABLE ARE A HARD UPPER TORSO (HUT) (REAR LEFT), FULL HELMET (FRONT LEFT), TWO HELMETS WITHOUT PROTECTIVE VISORS, A PAIR OF GLOVES, AND A BACKPACK WITHOUT VOLUMETRIC COVER (REAR RIGHT). THE BACKPACK ATTACHES TO THE HUT TO MAKE-UP THE UPPER TORSO COMPONENTS OF THE SUIT. - Marshall Space Flight Center, Neutral Buoyancy Simulator Facility, Rideout Road, Huntsville, Madison County, AL

  3. Water Intrusion Problems in Transit Tunnels

    DOT National Transportation Integrated Search

    1986-05-01

    This report presents the findings of five case studies in which an in-depth analysis was made of tunnel water intrusion problems in transit tunnels. Water intrusion parameters of transit systems in Atlanta, Boston, Buffalo, New York and Washington, D...

  4. Z-2 Suit Support Stand and MKIII Suit Center of Gravity Test

    NASA Technical Reports Server (NTRS)

    Nguyen, Tuan Q.

    2014-01-01

    NASA's next generation spacesuits are the Z-Series suits, made for a range of possible exploration missions in the near future. The prototype Z-1 suit has been developed and assembled to incorporate new technologies that has never been utilized before in the Apollo suits and the Extravehicular Mobility Unit (EMU). NASA engineers tested the Z-1 suit extensively in order to developed design requirements for the new Z-2 suit. At the end of 2014, NASA will be receiving the new Z-2 suit to perform more testing and to further develop the new technologies of the suit. In order to do so, a suit support stand will be designed and fabricated to support the Z-2 suit during maintenance, sizing, and structural leakage testing. The Z-2 Suit Support Stand (Z2SSS) will be utilized for these purposes in the early testing stages of the Z-2 suit.

  5. Rapid laccolith intrusion driven by explosive volcanic eruption

    NASA Astrophysics Data System (ADS)

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-11-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ~0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ~20-200 m and overpressures (~1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  6. Rapid laccolith intrusion driven by explosive volcanic eruption.

    PubMed

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  7. Orion ECLSS/Suit System - Ambient Pressure Integrated Suit Test

    NASA Technical Reports Server (NTRS)

    Barido, Richard A.

    2012-01-01

    The Ambient Pressure Integrated Suit Test (APIST) phase of the integrated system testing of the Orion Vehicle Atmosphere Revitalization System (ARS) technology was conducted for the Multipurpose Crew Vehicle (MPCV) Program within the National Aeronautics and Space Administration (NASA) Exploration Systems Mission Directorate. Crew and Thermal Systems Division performed this test in the eleven-foot human-rated vacuum chamber at the NASA Johnson Space Center. This testing is the first phase of suit loop testing to demonstrate the viability of the Environmental Control and Life Support System (ECLSS) being developed for Orion. APIST is the first in a series, which will consist of testing development hardware including the Carbon dioxide and Moisture Removal Amine Swing-bed (CAMRAS) and the air revitalization loop fan with human test subjects in pressure suits at varying suit pressures. Follow-on testing, to be conducted in 2013, will utilize the CAMRAS and a development regulator with human test subjects in pressure suits at varying cabin and suit pressures. This paper will discuss the results and findings of APIST and will also discuss future testing.

  8. Young women's experiences of intrusive behavior in 12 countries.

    PubMed

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  9. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  10. Intrusion-based reasoning and depression: cross-sectional and prospective relationships.

    PubMed

    Berle, David; Moulds, Michelle L

    2014-01-01

    Intrusion-based reasoning refers to the tendency to form interpretations about oneself or a situation based on the occurrence of a negative intrusive autobiographical memory. Intrusion-based reasoning characterises post-traumatic stress disorder, but has not yet been investigated in depression. We report two studies that aimed to investigate this. In Study 1 both high (n = 42) and low (n = 28) dysphoric participants demonstrated intrusion-based reasoning. High-dysphoric individuals engaged in self-referent intrusion-based reasoning to a greater extent than did low-dysphoric participants. In Study 2 there were no significant differences in intrusion-based reasoning between currently depressed (n = 27) and non-depressed (n = 51) participants, and intrusion-based reasoning did not predict depressive symptoms at 6-month follow-up. Interestingly, previously (n = 26) but not currently (n = 27) depressed participants engaged in intrusion-based reasoning to a greater extent than never-depressed participants (n = 25), indicating the possibility that intrusion-based reasoning may serve as a "scar" from previous episodes. The implications of these findings are discussed.

  11. An automatically tuning intrusion detection system.

    PubMed

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  12. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  13. Rapid laccolith intrusion driven by explosive volcanic eruption

    PubMed Central

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-01-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ∼20–200 m and overpressures (∼1–10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards. PMID:27876800

  14. Vapor Intrusion Characterization Report (Revision 1.0)

    EPA Pesticide Factsheets

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  15. Intrusive Memories of Distressing Information: An fMRI Study

    PubMed Central

    Battaglini, Eva; Liddell, Belinda; Das, Pritha; Malhi, Gin; Felmingham, Kim

    2016-01-01

    Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI) to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42) viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13) demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13). Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC) and dorsolateral prefrontal cortex (dlPFC), inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories. PMID:27685784

  16. Geological setting, emplacement mechanism and igneous evolution of the Atchiza mafic-ultramafic layered suite in north-west Mozambique

    NASA Astrophysics Data System (ADS)

    Ibraimo, Daniel Luis; Larsen, Rune B.

    2015-11-01

    The Atchiza mafic and ultramafic-layered suite (hereafter, "Atchiza Suite) crops out in an area 330 km2 west of the Mozambican Tete province. In an early account of the geology of this intrusion, it was considered the continuation of the Great Dyke of Zimbabwe, an idea that was aborted after detailed studies. Nevertheless, the Ni concentrations in the Atchiza outcrop rocks are considerable. Our investigation used field evidence, hand specimens and petrography descriptions, mineral chemistry studies using electron microprobe analysis and tectonic analysis to arrive at a plausible mineralogical composition and understanding of the tectonic setting for the igneous evolution. The mineral composition from the Atchiza Suite indicates that these are cumulates. The magmatic segregation from the petrographic and mineral composition reasoning indicates that dunite-lherzolitic peridotite-olivine gabbro-gabbronorite-gabbro-pegmatitic gabbro is the rock formation sequence. Olivine and chromite were the first phases formed, followed by pyroxene and plagioclase. In addition, it is shown that these minerals are near-liquidus crystallization products of basaltic magma with olivine Fo: 87.06 in dunite, mean values of clinopyroxene are (Wo: 36.4, En: 48.0, Fs: 15.2), orthopyroxene (Wo: 2.95, En: 73.0, Fs: 24.2) and plagioclase An: 71.3, respectively. Opaque minerals comprise Fe-Ti oxides and (Fe, Cr) spinel up to 4.8 vol.%, but chromitite layers are not present. Most of the opaque minerals are interstitial to pyroxene. Sulphides are common in gabbros, with pyrrhotite, pentlandite, chalcopyrite, pyrite and covellite together comprising 0.4-2.0 vol.%. The whole rock Rare Earth Element (REE) concentrations are mainly a result of differentiation, but slight crustal contamination/assimilation contributed to the REE contents. In addition, they also show Eu enrichment, suggesting that plagioclase fractionation was important in the rock. The Atchiza Suite preserves a deep-seated plumbing

  17. Constraints on the Geometries and Compositions of Subvolcanic Conduits from Intrusions of the San Rafael Swell, Utah

    NASA Astrophysics Data System (ADS)

    Wetmore, P. H.; Connor, C.; Wilson, J.

    2010-12-01

    Conduit models incorporate varying degrees of complexity (or parsimony) and account for the transport properties of magmas, steady-state or transient behavior, and conduit geometry (e.g., 1- to 1.5 D, variable width and erodable conduit walls). Improvement of these models is important if we are to work toward deployment of eruption models at active volcanoes, link these models to geophysical observations (seismic, deformation, gravity) and eventually forecast eruption magnitude. One conclusion of a recent comparison of many conduit models (Sahagian, 2005 JVGR) is that next generation models need to better account for interaction of the erupting mixture with surrounding wall rocks (accounting for melting, solidification, and erosion) and better account for the effects of conduit shape on flows. In an effort to address these issues our research group has completed mapping of a suite of subvolcanic intrusions (dikes, sills, and conduits) from the west-central San Rafael Swell of central Utah. The results of this study demonstrate that vertical flow of melt through crust in this system of intrusion was dominated by dikes. Conduits form, in nearly all cases, as a result of localized flow along dikes. The conduits are commonly comprised of three distinct lithologic units: brecciated host rock (without any intrusive material), brecciated host rock mixed with brecciated and mechanically contaminated intrusive, and relatively clean (i.e. containing less than ~10% accidental material) intrusive. Contacts between all three of these units are typically discreet and traceable for several tens of meters. In some examples clasts within the unmixed breccia unit exhibit a strong alignment of clasts dipping into the core of the conduit. These observations suggests an evolutionary history that involves an early phase of brecciation and mixing, followed by confined flow with a fluidized mixed unit and an essentially uninvolved outer zone (i.e. the breccia). The final phase likely

  18. Assessment of Mitigation Systems on Vapor Intrusion ...

    EPA Pesticide Factsheets

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor environments are often negatively pressurized with respect to outdoor air and soil gas (for example, from exhaust fans or the stack effect), and this pressure difference allows soil gas containing subsurface vapors to flow into indoor air through advection. In addition, concentration differentials cause VOCs and radon to migrate from areas of higher to lower concentrations through diffusion, which is another cause of vapor intrusion. Current practice for evaluating the vapor intrusion pathway involves a multiple line of evidence approach based on direct measurements in groundwater, external soil gas, subslab soil gas, and/or indoor air. No single line of evidence is considered definitive, and direct measurements of vapor intrusion can be costly, especially where significant spatial and temporal variability require repeated measurements at multiple locations to accurately assess the chronic risks of long-term exposure to volatile organic compounds (VOCs) like chloroform, perchloroethylene (PCE), and trichloroethylene (TCE).

  19. Magmatic intrusions in the lunar crust

    NASA Astrophysics Data System (ADS)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  20. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    PubMed Central

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression. PMID:27069381

  1. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    PubMed

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  2. SAMPLING-BASED APPROACH TO INVESTIGATING VAPOR INTRUSION

    EPA Science Inventory

    Vapor intrusion is defined as the migration of volatile organic compounds (VOCs) into occupied buildings from contaminated soil or ground water. EPA recently developed guidance to facilitate assessment of vapor intrusion at sites regulated by RCRA and CERCLA. The EPA guidance e...

  3. Evidential reasoning research on intrusion detection

    NASA Astrophysics Data System (ADS)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  4. Saltwater intrusion in coastal regions of North America

    USGS Publications Warehouse

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  5. Postemplacement dynamics of basaltic intrusions in the continental crust

    NASA Astrophysics Data System (ADS)

    Roman, A.; Jaupart, C.

    2017-02-01

    Laboratory experiments document the postemplacement behavior of mafic intrusions that spread at a density interface and founder as they become denser than their surroundings due to cooling and crystallization. All else being equal, the larger the intrusion volume, the farther the intrusion can spread and the smaller its aspect ratio is. The final aspect ratio is a function of a single dimensionless number analogous to the Rayleigh number of thermal convection. Once it is denser than its surroundings, the intrusion becomes unstable and may founder in two different regimes. At aspect ratios larger than about 0.4, the "teardrop" regime is such that the intrusion thickens in a central region, developing the shapes of a funnel and a pendant drop. At lower aspect ratios, another regime is observed, with thickening of the intrusion at the leading edge and thinning in a central region. The thick outer ring in turn becomes unstable into a set of teardrops and leads to an irregular horizontal outline. In one variant called the "jellyfish" regime, the thin central region develops a number of downwellings and upwellings in a Rayleigh-Taylor-like pattern. These instabilities may get arrested due to cooling as the intrusion and encasing rocks become too strong to deform. One would then be left with a funnel-shaped residual body or a wide irregular one with thick peripheral lobes and a thinner central region. These different patterns can be recognized in upper crustal mafic intrusions.

  6. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  7. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  8. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  9. 10 CFR 63.322 - Human intrusion scenario.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion...

  10. Vapour Intrusion into Buildings - A Literature Review

    EPA Science Inventory

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  11. Music Education Suites.

    ERIC Educational Resources Information Center

    Kemp, Wayne

    This publication describes options for designing and equipping middle and high school music education suites and suggests means of gaining community support for including full service music suites in new and renovated facilities. It covers the basic music suite, practice rooms, small ensemble rehearsal rooms, recording/MIDI (musical instrument…

  12. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients.

    PubMed

    Bapat, Usha; Kedlya, Prashanth G

    2012-09-01

    To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD) patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients' above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life. Elderly, educated

  13. Music Education Suites

    ERIC Educational Resources Information Center

    Kemp, Wayne

    2009-01-01

    This publication describes options for designing and equipping middle and high school music education suites, and suggests ways of gaining community support for including full service music suites in new and renovated school facilities. In addition to basic music suites, and practice rooms, other options detailed include: (1) small ensemble…

  14. A New Intrusion Detection Method Based on Antibody Concentration

    NASA Astrophysics Data System (ADS)

    Zeng, Jie; Li, Tao; Li, Guiyang; Li, Haibo

    Antibody is one kind of protein that fights against the harmful antigen in human immune system. In modern medical examination, the health status of a human body can be diagnosed by detecting the intrusion intensity of a specific antigen and the concentration indicator of corresponding antibody from human body’s serum. In this paper, inspired by the principle of antigen-antibody reactions, we present a New Intrusion Detection Method Based on Antibody Concentration (NIDMBAC) to reduce false alarm rate without affecting detection rate. In our proposed method, the basic definitions of self, nonself, antigen and detector in the intrusion detection domain are given. Then, according to the antigen intrusion intensity, the change of antibody number is recorded from the process of clone proliferation for detectors based on the antigen classified recognition. Finally, building upon the above works, a probabilistic calculation method for the intrusion alarm production, which is based on the correlation between the antigen intrusion intensity and the antibody concen-tration, is proposed. Our theoretical analysis and experimental results show that our proposed method has a better performance than traditional methods.

  15. A Survey on Anomaly Based Host Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  16. Evolution of Palaeoproterozoic mafic intrusions located within the thermal aureole of the Sudbury Igneous Complex, Canada: Isotopic, geochronological and geochemical evidence

    NASA Astrophysics Data System (ADS)

    Prevec, Stephen A.; Baadsgaard, Halfdan

    2005-07-01

    Impact cratering and their resultant geological phenomena are recognised as significant factors in the lithological and biologic evolution of the earth. Age-dating of impact events is critical in correlating cause and effects for these catastrophic processes. The Falconbridge and Drury Township (Twp) intrusions were emplaced at the contact between Neoarchaean basement and Palaeoproterozoic volcanosedimentary rocks, and also lie at the southeast and southwest edges of the Sudbury Igneous Complex (SIC), within its thermal contact aureole. The Falconbridge Twp intrusion is dated at 2441 ± 3 Ma by U-Pb zircon, with evidence of Archaean inheritance from its host granitoids. Granitoids from the southernmost Abitibi Subprovince are dated here between 2670 ± 11 Ma for an undeformed Algoman granite, and 2696 ± 18 Ma for a foliated granitoid, consistent with existing data from the Abitibi Greenstone Belt and from the Wawa Subprovince. Major and trace element geochemical evidence, common-Pb isotopic compositions, and ɛNd2440 values between 0 and -1 are all consistent with a Palaeoproterozoic origin for the Falconbridge Twp intrusion, and support inclusion in the East Bull Lake-type suite of leucogabbroic plutons and sills. In contrast, the Drury Twp intrusion gives a U-Pb zircon age of 1859 ± 13 Ma, coincident with the date of SIC-emplacement. While the major and trace element compositions are comparable to the Falconbridge data, the Drury displays significant heterogeneity in ɛNd2440, with values ranging from +3.7 to -0.1, and contains more radiogenic Pb isotopic compositions. Field, geochemical and isotopic evidence clearly distinguishes this intrusion from constituents of the SIC itself, and indicates that the Drury too is a Palaeoproterozoic intrusion. This requires that apparently unshocked, undeformed magmatic-looking zircon has been grown or reset in a postmagmatic setting. This has significant implications for the identification of mantle-derived magmas and

  17. EMU Suit Performance Simulation

    NASA Technical Reports Server (NTRS)

    Cowley, Matthew S.; Benson, Elizabeth; Harvill, Lauren; Rajulu, Sudhakar

    2014-01-01

    Introduction: Designing a planetary suit is very complex and often requires difficult trade-offs between performance, cost, mass, and system complexity. To verify that new suit designs meet requirements, full prototypes must be built and tested with human subjects. However, numerous design iterations will occur before the hardware meets those requirements. Traditional draw-prototype-test paradigms for research and development are prohibitively expensive with today's shrinking Government budgets. Personnel at NASA are developing modern simulation techniques that focus on a human-centric design paradigm. These new techniques make use of virtual prototype simulations and fully adjustable physical prototypes of suit hardware. This is extremely advantageous and enables comprehensive design down-selections to be made early in the design process. Objectives: The primary objective was to test modern simulation techniques for evaluating the human performance component of two EMU suit concepts, pivoted and planar style hard upper torso (HUT). Methods: This project simulated variations in EVA suit shoulder joint design and subject anthropometry and then measured the differences in shoulder mobility caused by the modifications. These estimations were compared to human-in-the-loop test data gathered during past suited testing using four subjects (two large males, two small females). Results: Results demonstrated that EVA suit modeling and simulation are feasible design tools for evaluating and optimizing suit design based on simulated performance. The suit simulation model was found to be advantageous in its ability to visually represent complex motions and volumetric reach zones in three dimensions, giving designers a faster and deeper comprehension of suit component performance vs. human performance. Suit models were able to discern differing movement capabilities between EMU HUT configurations, generic suit fit concerns, and specific suit fit concerns for crewmembers based

  18. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    NASA Astrophysics Data System (ADS)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  19. A new intrusion prevention model using planning knowledge graph

    NASA Astrophysics Data System (ADS)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  20. Vapor Intrusion Assessment and Mitigation 2012

    DTIC Science & Technology

    2012-03-26

    1 Geosyntec 0 consultants Vapor Intrusion Assessment and Mitigation 2012 Robert Ettinger, M.S., P.E., Todd McAiary, M.Sc., P.Eng., P.G...REPORT DATE 26 MAR 2012 2. REPORT TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE Vapor Intrusion Assessment and...Updates • Typical Assessment Approaches and Common Challenges • Methods to Distinguish Background Sources (McHugh) • Significance • Compound

  1. Noble gas systematics of the Skaergaard intrusion

    NASA Astrophysics Data System (ADS)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Ra<1) along the margin of the intrusion indicates that noble gases from the Archean host-rock were incorporated into the cooling magma chamber, probably via magmatic assimilation. Noble gases in olivines from the upper portions of the intrusion have atmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  2. Cup-shaped Intrusions, Morphology and Emplacement Mechanism Investigate Through Analogue Modelling

    NASA Astrophysics Data System (ADS)

    Mathieu, L.; van Wyk de Vries, B.

    2007-12-01

    We investigate the morphology of large-scale shallow-depth magma intrusions and sub-volcanic complexes with analogue models. Intrusions of analogue magma are done in a granular material that can contain a ductile layer. The model surface is flat to model the formation of plutonic intrusions and it is overlain by a cone when modelling late sub-volcanic complexes. For flat-top models, we obtain cup-shaped intrusions fed by dykes. Cup-shaped intrusions are inverted-cone like bodies. They are different from saucer-shaped intrusions as they possess neither a well developed sill-base, nor an outer rim. However, like saucers, cups are shallow depth intrusions that dome the country rocks. They initiate from an advancing dyke and first develop an inverted-cone like morphology. Then, the central thickness increases and thrusts form at the edge of the domed country rocks. At this stage, the intrusions progressively involve toward a lopolith shape. By using analogue magma of various viscosities we have been able to constrain key relationships: higher intrusion viscosity causes deeper initiation and the deeper they initiate, the larger is the intrusion diameter. A natural example of such intrusion might by the circles of volcanoes like the Azufre-Lastaria (Peru) that might be overlain be a large-scale cup-shaped intrusion. When adding a cone at the surface of the model and, sometimes, a thin ductile layer in the substratum, the morphology of cup-shaped intrusions vary. Note that the ductile layer of our models is not thick enough to induce the gravitational spreading of the cone. Generally, cup-shaped intrusions are asymmetric in cross section and elliptical in plan view. Their formation creates extension structures in the cone (croissant-shaped rift, straight rift or normal fault) and thrusts in some sectors below the cone. Both types of structures are bordered by strike-slip faults. Cups and saucers share many similarities, but differ probably in the fact that saucers are

  3. Intrusive Memories in Perpetrators of Violent Crime: Emotions and Cognitions

    ERIC Educational Resources Information Center

    Evans, Ceri; Ehlers, Anke; Mezey, Gillian; Clark, David M.

    2007-01-01

    The authors investigated factors that may determine whether perpetrators of violent crime develop intrusive memories of their offense. Of 105 young offenders who were convicted of killing or seriously harming others, 46% reported distressing intrusive memories, and 6% had posttraumatic stress disorder. Intrusions were associated with lower…

  4. Seismic signature of active intrusions in mountain chains.

    PubMed

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  5. Seismic signature of active intrusions in mountain chains

    PubMed Central

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains. PMID:29326978

  6. Wind-forced salt intrusion into a tributary estuary

    NASA Astrophysics Data System (ADS)

    Sanford, Lawrence P.; Boicourt, William C.

    1990-08-01

    Moored measurements and hydrographic surveys were carried out during the summers of 1986 and 1987 to examine interaction between the mainstem of the Chesapeake Bay and the Choptank River, an eastern shore tributary estuary. The data show that an important mode of interaction is through wind-forced intrusion of saline, hypoxic water from below the pycnocline of the Bay into the lower river. Intrusions are driven by lateral tilting of the pycnocline in the Bay, when high salinity water is upwelled on the eastern side of the Bay in response to a southward pulse of wind stress. The resulting internal surges propagate up the relict Choptank entrance channel at a speed of about 20 cm/s and spill onto the broad sill inside the mouth of the river. Intrusion-favorable pycnocline tilts in the Bay do not always result in lower layer intrusion into the Choptank, but may be blocked or choked in the entrance channel on occasion. The data suggest that wind-forced intrusion of salt leads to increased gravitational circulation in the Choptank during the summer months, providing a mechanism through which high frequency energy may be directly translated into lower frequency motion.

  7. Heart rate, startle response, and intrusive trauma memories

    PubMed Central

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  8. Intrusion errors in visuospatial working memory performance.

    PubMed

    Cornoldi, Cesare; Mammarella, Nicola

    2006-02-01

    This study tested the hypothesis that failure in active visuospatial working memory tasks involves a difficulty in avoiding intrusions due to information that is already activated. Two experiments are described, in which participants were required to process several series of locations on a 4 x 4 matrix and then to produce only the final location of each series. Results revealed a higher number of errors due to already activated locations (intrusions) compared with errors due to new locations (inventions). Moreover, when participants were required to pay extra attention to some irrelevant (non-final) locations by tapping on the table, intrusion errors increased. Results are discussed in terms of current models of working memory functioning.

  9. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    DTIC Science & Technology

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  10. Space Suit Thermal Dynamics

    NASA Technical Reports Server (NTRS)

    Campbell, Anthony B.; Nair, Satish S.; Miles, John B.; Iovine, John V.; Lin, Chin H.

    1998-01-01

    The present NASA space suit (the Shuttle EMU) is a self-contained environmental control system, providing life support, environmental protection, earth-like mobility, and communications. This study considers the thermal dynamics of the space suit as they relate to astronaut thermal comfort control. A detailed dynamic lumped capacitance thermal model of the present space suit is used to analyze the thermal dynamics of the suit with observations verified using experimental and flight data. Prior to using the model to define performance characteristics and limitations for the space suit, the model is first evaluated and improved. This evaluation includes determining the effect of various model parameters on model performance and quantifying various temperature prediction errors in terms of heat transfer and heat storage. The observations from this study are being utilized in two future design efforts, automatic thermal comfort control design for the present space suit and design of future space suit systems for Space Station, Lunar, and Martian missions.

  11. Extensive crustal melting during craton destruction: Evidence from the Mesozoic magmatic suite of Junan, eastern North China Craton

    NASA Astrophysics Data System (ADS)

    Yang, Fan; Santosh, M.; Tang, Li

    2018-05-01

    The cratonic destruction associated with the Pacific plate subduction beneath the eastern North China Craton (NCC) shows a close relationship with the widespread magmatism during the Late Mesozoic. Here we investigate a suite of intrusive and extrusive magmatic rocks from the Junan region of the eastern NCC in order to evaluate the role of extensive crustal melting related to decratonization. We present petrological, geochemical, zircon U-Pb geochronological and Lu-Hf isotopic data to evaluate the petrogenesis, timing and tectonic significance of the Early Cretaceous magmatism. Zircon grains in the basalt from the extrusive suite of Junan show multiple populations with Neoproterozoic and Early Paleozoic xenocrystic grains ranging in age from 764 Ma to 495 Ma as well as Jurassic grains with an age range of 189-165 Ma. The dominant population of magmatic zircon grains in the syenite defines three major age peaks of 772 Ma, 132 Ma and 126 Ma. Zircons in the granitoids including alkali syenite, monzonite and granodiorite yield a tightly restricted age range of 124-130 Ma representing their emplacement ages. The Neoproterozoic (841-547 Ma) zircon grains from the basalt and the syenite possess εHf(t) values of -22.9 to -8.4 and from -18.8 to -17.3, respectively. The Early Paleozoic (523-494 Ma) zircons from the basalt and the syenite also show markedly negative εHf(t) values of -22.7 to -18.0. The dominant population of Early Cretaceous (134-121 Ma) zircon grains presented in all the samples also displays negative εHf(t) values range from -31.7 to -21.1, with TDM of 1653-2017 Ma and TDMC in the range of 2193-3187 Ma. Accordingly, the Lu-Hf data suggest that the parent magma was sourced through melting of Mesoarchean to Paleoproterozoic basement rocks. Geochemical data on the Junan magmatic suite display features similar to those associated with the arc magmatic rocks involving subduction-related components, with interaction of fluids and melts in the suprasubduction

  12. Mesoproterozoic rapakivi granites of the Rondonia Tin Province, southwestern border of the Amazonian craton, Brazil-I. Reconnaissance U-Pb geochronology and regional implications

    USGS Publications Warehouse

    Bettencourt, Jorge S.; Tosdal, R.M.; Leite, W.B.; Payolla, B.L.

    1999-01-01

    Rapakivi granites and associated mafic and ultramafic rocks in the Rondonia Tin Province, southwestern Amazonian craton, Brazil were emplaced during six discrete episodes of magmatism between ca 1600 and 970 Ma. The seven rapakivi granite suites emplaced at this time were the Serra da Providencia Intrusive Suite (U-Pb ages between 1606 and 1532 Ma); Santo Antonio Intrusive Suite (U-Pb age 1406 Ma); Teotonio Intrusive Suite (U-Pb age 1387 Ma); Alto Candeias Intrusive Suite (U-Pb ages between 1346 and 1338 Ma); Sao Lourenco-Caripunas Intrusive Suite (U-Pb ages between 1314 and 1309 Ma); Santa Clara Intrusive Suite (U-Pb ages between 1082 and 1074 Ma); and Younger Granites of Rondonia (U-Pb ages between 998 and 974 Ma). The Serra da Providencia Intrusive Suite intruded the Paleoproterozoic (1.80 to 1.70 Ga) Rio Negro-Juruena crust whereas the other suites were emplaced into the 1.50 to 1.30 Ga Rondonia-San Ignacio crust. Their intrusion was contemporaneous with orogenic activity in other parts of the southwestern Amazonian craton, except for the oldest, Serra da Providencia Intrusive Suite. Orogenic events coeval with emplacement of the Serra da Providencia Intrusive Suite are not clearly recognized in the region. The Santo Antonio, Teotonio, Alto Candeias and Sao Lourenco-Caripunas Intrusive Suites are interpreted to represent extensional anorogenic magmatism associated with the terminal stages of the Rondonian-San Ignacio orogeny. At least the Sao Lourenco-Caripunas rapakivi granites and coeval intra-continental rift sedimentary rocks may, in contrast, represent the products of extensional tectonics and rifting preceding the Sunsas/Aguapei orogeny (1.25 to 1.0 Ga). The two youngest rapakivi suites, the Santa Clara Intrusive Suite and Younger Granites of Rondonia, seemingly represent inboard magmatism in the Rondonian-San Ignacio Province during a younger episode of reworking in the Rio Negro-Juruena Province during the waning stages of the collisional 1.1 to 1.0 Ga

  13. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    PubMed

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  14. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.

    2013-11-14

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  15. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    PubMed

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. Hydrogeologic conditions and saline-water intrusion, Cape Coral, Florida, 1978-81

    USGS Publications Warehouse

    Fitzpatrick, D.J.

    1986-01-01

    The upper limestone unit of the intermediate aquifer system, locally called the upper Hawthorn aquifer, is the principal source of freshwater for Cape Coral, Florida. The aquifer has been contaminated with saline water by downward intrusion from the surficial aquifer system and by upward intrusion from the Floridan aquifer system. Much of the intrusion has occurred through open wellbores where steel casings are short or where casings have collapsed because of corrosion. Saline-water contamination of the upper limestone unit due to downward intrusion from the surficial aquifer is most severe in the southern and eastern parts of Cape Coral; contamination due to upward intrusion has occurred in many areas throughout Cape Coral. Intrusion is amplified in areas of heavy water withdrawals and large water-level declines. (USGS)

  17. Paleomagnetic Study of a Reversal of the Earth's Magnetic Field.

    PubMed

    Dunn, J R; Fuller, M; Ito, H; Schmidt, V A

    1971-05-21

    A detailed record of a field reversal has been obtained from the natural remanent magnetization of the Tatoosh intrusion in Mount Rainier National Park, Washington. The reversal took place at 14.7 +/- 1 million years and is interpreted to be from reverse to normal. A decrease in the intensity of the field of about an order of magnitude occurs immediately before the reversal, while its orientation remains substantially unchanged. The onset of the reversal is marked by abrupt swinging of the virtual geomagnetic pole along an arc of a great circle. During the reversal the pole traces a path across the Pacific. In the last stage of the process recorded in the sections, the succession of virtual geomagnetic poles is very similar to those generated by secular variation in the recent past. Although the cooling rate of the intrusion is not sufficiently well known to permit a useful calculation of the duration of the reversal process, an estimate based on the length of the supposed secular variation cycles gives 1 to 4 x 103 years for the reversal of field direction and approximately 1 x 104 years for the time scale of the intensity changes.

  18. Modified Advanced Crew Escape Suit Intravehicular Activity Suit for Extravehicular Activity Mobility Evaluations

    NASA Technical Reports Server (NTRS)

    Watson, Richard D.

    2014-01-01

    The use of an intravehicular activity (IVA) suit for a spacewalk or extravehicular activity (EVA) was evaluated for mobility and usability in the Neutral Buoyancy Laboratory (NBL) environment at the Sonny Carter Training Facility near NASA Johnson Space Center in Houston, Texas. The Space Shuttle Advanced Crew Escape Suit was modified to integrate with the Orion spacecraft. The first several missions of the Orion Multi-Purpose Crew Vehicle will not have mass available to carry an EVA-specific suit; therefore, any EVA required will have to be performed by the Modified Advanced Crew Escape Suit (MACES). Since the MACES was not designed with EVA in mind, it was unknown what mobility the suit would be able to provide for an EVA or whether a person could perform useful tasks for an extended time inside the pressurized suit. The suit was evaluated in multiple NBL runs by a variety of subjects, including crewmembers with significant EVA experience. Various functional mobility tasks performed included: translation, body positioning, tool carrying, body stabilization, equipment handling, and tool usage. Hardware configurations included with and without Thermal Micrometeoroid Garment, suit with IVA gloves and suit with EVA gloves. Most tasks were completed on International Space Station mock-ups with existing EVA tools. Some limited tasks were completed with prototype tools on a simulated rocky surface. Major findings include: demonstrating the ability to weigh-out the suit, understanding the need to have subjects perform multiple runs prior to getting feedback, determining critical sizing factors, and need for adjusting suit work envelope. Early testing demonstrated the feasibility of EVA's limited duration and limited scope. Further testing is required with more flight-like tasking and constraints to validate these early results. If the suit is used for EVA, it will require mission-specific modifications for umbilical management or Primary Life Support System integration

  19. Stuck in the spin cycle: Avoidance and intrusions following breast cancer diagnosis.

    PubMed

    Bauer, Margaret R; Wiley, Joshua F; Weihs, Karen L; Stanton, Annette L

    2017-09-01

    Theories and research regarding cognitive and emotional processing during the experience of profound stressors suggest that the presence of intrusive thoughts and feelings predicts greater use of avoidance and that the use of avoidance paradoxically predicts more intrusions. However, empirical investigations of their purported bidirectional relationship are limited. This study presents a longitudinal investigation of the reciprocal relationship between intrusions and avoidance coping over a 6-month period in the year following breast cancer diagnosis. Breast cancer patients (N = 460) completed measures of cancer-related intrusions and avoidance at study entry, 3 months, and 6 months later (i.e., an average of 2, 5, and 8 months after diagnosis, respectively). Cross-lagged panel analyses revealed that intrusive thoughts, feelings, and images at study entry predicted greater avoidance 3 months later, and avoidance coping at study entry predicted intrusions 3 months later, controlling for the stability of intrusions and avoidance as well as time since diagnosis. Findings were not statistically significant for avoidance predicting intrusions, or vice versa, between the 3-month and the 6-month assessment period, during which they declined. These findings provide empirical support for the theoretical contention that avoidance and intrusive thoughts and emotions reciprocally influence one another following stressful events. Additionally, in the months shortly after breast cancer diagnosis, intrusions and avoidance are positively related. However, the relationships attenuate over time, which could indicate resolved cognitive and emotional processing of the cancer experience. Statement of contribution What is already known on this subject? Following stressful life events, individuals often experience intrusive thoughts and feelings related to the event and they report avoidance of such reminders. Many studies demonstrate that greater intrusions predict more

  20. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  1. Opportunities and Barriers to Address Seawater Intrusion Along California's Coast

    NASA Astrophysics Data System (ADS)

    Langridge, R.

    2016-12-01

    In many California coastal areas reliant on groundwater seawater intrusion is a serious problem. This presentation will discuss how particular groundwater management institutions in the state are addressing seawater intrusion issues, how stakeholders are participating in this process, and how scientific information can contribute to policies that support reducing or halting ongoing intrusion. In 2014, the California Legislature passed the Sustainable Groundwater Management Act (SGMA). The Act established requirements for 127 high and medium priority groundwater basins to form groundwater sustainability agencies (GSAs) and develop plans to sustainably manage their basin. Sustainable is defined in SGMA as avoiding specific unacceptable impacts, including significant and unreasonable seawater intrusion. Special Act Districts, created by an act of the legislature, have the option to be the sole GSA in their service area, and they can provide a window into current and potentially future strategies to address seawater intrusion. Additionally, adjudicated basins are often considered one of the best approaches to achieve efficient groundwater management, and these basins are exempt from SGMA and managed pursuant to a court judgment. The strategies utilized to manage seawater intrusion by three special act districts and five adjudicated basins will be discussed. These basins cover significant areas of central and southern California and all have experienced seawater intrusion. Our research team just completed reports for the State Water Resources Control Board on all the adjudicated and special act districts in the state, and this presentation will draw on our findings to better understand the barriers and opportunities to alleviate seawater intrusion and the information required to develop solutions.

  2. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    NASA Astrophysics Data System (ADS)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  3. Body, mother, mind: anorexia, femininity and the intrusive object.

    PubMed

    Lawrence, Marilyn

    2002-08-01

    This paper takes as its starting point the preponderance of female to male patients who suffer from anorexia. The author suggests that there may be something specific about certain experiences of femaleness which predispose towards anxieties of intrusion. Two contemporary theories of the aetiology of anorexia are outlined. Both of these suggest that the problem has its origins in intrusion or invasion of different sorts. The author suggests that many women who suffer from anorexia have an intrusive object instated in their minds, which may not necessarily be the result of actual intrusions in external reality. In the final part of the paper, the author examines the intrusiveness of anorexic patients in the transference and suggests that such patients very often harbour profound phantasies of intruding between the parents, with a wish to regain their special place with mother, untroubled by the presence of father. It is further suggested that the psychopathology underlying certain cases of anorexia leads to a failure in symbolisation. This failure in turn complicates the clinical picture, making such patients particularly difficult to think with about their difficulties.

  4. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  5. The architecture of a network level intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.; Maccabe, A.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  6. Impact of exogenous cortisol on the formation of intrusive memories in healthy women.

    PubMed

    Rombold, Felicitas; Wingenfeld, Katja; Renneberg, Babette; Schwarzkopf, Friederike; Hellmann-Regen, Julian; Otte, Christian; Roepke, Stefan

    2016-12-01

    Stress hormones such as cortisol are involved in modulating emotional memory. However, little is known about the influence of cortisol on the formation of intrusive memories after a traumatic event. The aim of this study was to examine whether cortisol levels during encoding and consolidation of an intrusion-inducing trauma film paradigm would influence subsequent intrusion formation. In an experimental, double-blind, placebo-controlled study a trauma film paradigm was used to induce intrusions in 60 healthy women. Participants received a single dose of either 20 mg hydrocortisone or placebo before watching a trauma film. Salivary cortisol and alpha-amylase as well as blood pressure were measured during the experiment. The consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions resulting from the trauma film were assessed throughout the following seven days. Hydrocortisone administration before the trauma film resulted in increased salivary cortisol levels but did not affect the consecutive number of intrusions, the vividness of intrusions, and the degree of distress evoked by the intrusions throughout the following week. These results indicate that pharmacologically increased cortisol levels during an experimental trauma film paradigm do not influence consecutive intrusive memories. Current data do not support a prominent role of exogenous cortisol on intrusive memories, at least in healthy young women after a relatively mild trauma equivalent. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Ladder Structures and Magnetic Surveys: New Insights into the Near Surface, Three-Dimensional Shape and Orientation of Plutonic Structures in the Tuolumne Intrusive Suite, Yosemite National Park, California

    NASA Astrophysics Data System (ADS)

    Boyd, J. D.

    2017-12-01

    The study of pluton emplacement and growth history offers a window into the evolution of the continental crust. Plutons, however, are often largely homogeneous in outcrop, lacking reliable structural markers for tracking their emplacement and growth through time. The ladder structures exposed on the glacially polished surfaces of the Tuolumne Intrusive Suite (TIS) in Yosemite National Park, California are an exception. Ladder structures (LS) are eye-catching concentrations of alternating mafic and felsic mineral assemblages in dominantly cresent-shaped, meter to sub-meter scale bands in outcrop that locally terminate into a mafic band forming a circular-shaped enclosure. Their geochemistry and modal mineralogy diverge sharply from host rock trends with large quantities of magnetite, titanite, and zircon in the mafic assemblages. The limited exposure of LS in outcrops has led to much debate as to their true geometries and orientations. The high concentration of magnetite in the LS is fortuitous in that it allows these features to be investigated by magnetic techniques. The preliminary results of new high resolution magnetic surveys of these LS are presented here. A grid of total magnetic intensity (TMI) was collected across the ladder structures. The TMI's were then inverted and modeled to determine the orientation of the magnetic bodies with depth using PyGMI freeware. With sufficient contrast in the magnetic susceptibility (Km) between the feature being imaged and the host rock, meter to sub-meter scale features can be resolved. The average Km of the LS mafic bands and the host rock is approximately 200-850 x10-3 and 15-20×10-3 SI units respectively. These measurements along with oriented samples were collected to determine input parameters (e.g. anisotropy and remanence) for the geocellular model used in this study.

  8. Toddler Inhibited Temperament, Maternal Cortisol Reactivity and Embarrassment, and Intrusive Parenting

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2013-01-01

    The relevance of parenting behavior to toddlers’ development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers’ inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multi-method approach would acknowledge that several levels of processes determine mothers’ experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers’ inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-olds toddlers and their mothers. Toddlers’ inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PMID:23750532

  9. Performance Assessment of Network Intrusion-Alert Prediction

    DTIC Science & Technology

    2012-09-01

    the threats. In this thesis, we use Snort to generate the intrusion detection alerts. 2. SNORT Snort is an open source network intrusion...standard for IPS. (Snort, 2012) We choose Snort because it is an open source product that is free to download and can be deployed cross-platform...Learning & prediction in relational time series: A survey. 21st Behavior Representation in Modeling & Simulation ( BRIMS ) Conference 2012, 93–100. Tan

  10. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  11. Space suit bioenergetics: framework and analysis of unsuited and suited activity.

    PubMed

    Carr, Christopher E; Newman, Dava J

    2007-11-01

    Metabolic costs limit the duration and intensity of extravehicular activity (EVA), an essential component of future human missions to the Moon and Mars. Energetics Framework: We present a framework for comparison of energetics data across and between studies. This framework, applied to locomotion, differentiates between muscle efficiency and energy recovery, two concepts often confused in the literature. The human run-walk transition in Earth gravity occurs at the point for which energy recovery is approximately the same for walking and running, suggesting a possible role for recovery in gait transitions. Muscular Energetics: Muscle physiology limits the overall efficiency by which chemical energy is converted through metabolism to useful work. Unsuited Locomotion: Walking and running use different methods of energy storage and release. These differences contribute to the relative changes in the metabolic cost of walking and running as gravity is varied, with the metabolic cost of locomoting at a given velocity changing in proportion to gravity for running and less than in proportion for walking. Space Suits: Major factors affecting the energetic cost of suited movement include suit pressurization, gravity, velocity, surface slope, and space suit configuration. Apollo lunar surface EVA traverse metabolic rates, while unexpectedly low, were higher than other activity categories. The Lunar Roving Vehicle facilitated even lower metabolic rates, thus longer duration EVAs. Muscles and tendons act like springs during running; similarly, longitudinal pressure forces in gas pressure space suits allow spring-like storage and release of energy when suits are self-supporting.

  12. Charnockites and granites of the western Adirondacks, New York, USA: a differentiated A-type suite

    USGS Publications Warehouse

    Whitney, P.R.

    1992-01-01

    Granitic rocks in the west-central Adirondack Highlands of New York State include both relatively homogeneous charnockitic and hornblende granitic gneisses (CG), that occur in thick stratiform bodies and elliptical domes, and heterogeneous leucogneisses (LG), that commonly are interlayered with metasedimentary rocks. Major- and trace-element geochemical analyses were obtained for 115 samples, including both types of granitoids. Data for CG fail to show the presence of more than one distinct group based on composition. Most of the variance within the CG sample population is consistent with magmatic differentiation combined with incomplete separation of early crystals of alkali feldspar, plagioclase, and pyroxenes or amphibole from the residual liquid. Ti, Fe, Mg, Ca, P, Sr, Ba, and Zr decrease with increasing silica, while Rb and K increase. Within CG, the distinction between charnockitic (orthopyroxene-bearing) and granitic gneisses is correlated with bulk chemistry. The charnockites are consistently more mafic than the hornblende granitic gneisses, although forming a continuum with them. The leucogneisses, while generally more felsic than the charnockites and granitic gneisses, are otherwise geochemically similar to them. The data are consistent with the LG suite being an evolved extrusive equivalent of the intrusive CG suite. Both CG and LG suites are metaluminous to mildly peraluminous and display an A-type geochemical signature, enriched in Fe, K, Ce, Y, Nb, Zr, and Ga and depleted in Ca, Mg, and Sr relative to I- and S-type granites. Rare earth element patterns show moderate LREE enrichment and a negative Eu anomaly throughout the suite. The geochemical data suggest an origin by partial melting of biotite- and plagioclase-rich crustal rocks. Emplacement occurred in an anorogenic or post-collisional tectonic setting, probably at relatively shallow depths. Deformation and granulite-facies metamorphism with some partial melting followed during the Ottawan phase

  13. Railway clearance intrusion detection method with binocular stereo vision

    NASA Astrophysics Data System (ADS)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  14. Draped aeromagnetic survey in Transantarctic Mountains over the area of the Butcher Ridge igneous complex showing extent of underlying mafic intrusion

    USGS Publications Warehouse

    Behrendt, John C.; Damaske, D.; Finn, C.A.; Kyle, P.; Wilson, T.J.

    2002-01-01

    A draped aeromagnetic survey over the area surrounding the Butcher Ridge igneous complex (BRIC), Transantarctic Mountains, was acquired in 1997-1998 as part of a larger Transantarctic Mountains Aerogeophysical Research Activity survey. The BRIC is a sill-like hypoabyssal intrusion ranging in composition from tholeiitic basalt to rhyolite. An 40Ar/39 Ar age of 174 Ma and the chemical character of the basaltic rocks show the BRIC to be part of the widespread Jurassic Ferrar suite of continental tholeiitic rocks, that extends for 3500 km across Antarctica. The aeromagnetic survey shows a horseshoe-shaped pattern of anomalies reaching amplitudes as great as 1900 nT generally associated with the bedrock topography where it is exposed. It is apparent that the high-amplitude anomaly pattern is more extensive than the 10-km-long exposed outcrop, first crossed by a single 1990 aeromagnetic profile. The highest-amplitude anomalies appear south of the profile acquired in 1990 and extend out of the survey area. The new aeromagnetic data allow determination of the extent of the interpreted Butcher mafic(?) intrusion beneath exposures of Beacon sedimentary rock and ice in the area covered, as well as beneath the small BRIC exposure. The magnetic anomalies show a minimum area of 3000 km2, a much greater extent than previously inferred. Magnetic models indicate a minimum thickness of ~1-2 km for a horizontal intrusion. However, nonunique models with magnetic layers decreasing in apparent susceptibility with depth are consistent with of a 4- to 8-km-thick layered intrusion. These magnetic models indicate progressively deeper erosion of the interpreted mafic-layered body from the south to north. The erosion has removed more magnetic upper layers that mask the magnetic effects of the lower less magnetic layers. The probable minimum volume of the intrusion in the area of the survey is ~6000 km3. An alternate, but less likely, interpretation of a series of dikes can also fit the

  15. BTSC VAPOR INSTRUSION PRIMER "VAPOR INTRUSION CONSIDERATION FOR REDEVELOPMENT"

    EPA Science Inventory

    This primer is designed for brownfields stakeholders concerned about vapor intrusion, including property owners, real estate developers, and contractors performing environmental site investigations. It provides an overview of the vapor intrusion issue and how it can impact the ap...

  16. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    PubMed

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  17. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    PubMed

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  18. Astronomical Video Suites

    NASA Astrophysics Data System (ADS)

    Francisco Salgado, Jose

    2010-01-01

    Astronomer and visual artist Jose Francisco Salgado has directed two astronomical video suites to accompany live performances of classical music works. The suites feature awe-inspiring images, historical illustrations, and visualizations produced by NASA, ESA, and the Adler Planetarium. By the end of 2009, his video suites Gustav Holst's The Planets and Astronomical Pictures at an Exhibition will have been presented more than 40 times in over 10 countries. Lately Salgado, an avid photographer, has been experimenting with high dynamic range imaging, time-lapse, infrared, and fisheye photography, as well as with stereoscopic photography and video to enhance his multimedia works.

  19. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    NASA Astrophysics Data System (ADS)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  20. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    NASA Astrophysics Data System (ADS)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  1. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  2. Linking precious metal enrichment and halogen cycling in mafic magmatic systems: insights from the Rum layered intrusion, NW Scotland

    NASA Astrophysics Data System (ADS)

    Kelly, A. P.; O'Driscoll, B.; Clay, P. L.; Burgess, R.

    2017-12-01

    Layered intrusions host the world's largest known concentrations of the platinum-group elements (PGE). Emphasis has been attached to the role of halogen-bearing fluids in concentrating the precious metals, but whether this occurs at the magmatic stage, or via subsequent metasomatism, is actively debated. One obstacle to progress has been the analytical difficulty of measuring low abundances of the halogens in the cumulate products of layered intrusions. To elucidate the importance of the halogens in facilitating PGE-mineralisation, as well as fingerprint halogen provenance and assess the importance of halogen cycling in mafic magma systems more generally, a suite of samples encompassing different stages of activity of the Palaeogene Rum layered intrusion was investigated. Halogen abundances were measured by neutron irradiation noble gas mass spectrometric analysis, permitting the detection of relatively low (ppm-ppb) abundances of Cl, Br and I in mg-sized samples. The samples include PGE-enriched chromite seams, various cumulates (e.g., peridotites), picrites (approximating the Rum parental magma), and pegmatites representing volatile-rich melts that circulated the intrusion at a late-stage in its solidification history. The new data reveal that PGE-bearing chromite seams contain relatively low Cl concentrations (2-3 ppm), with high molar ratios of Br/Cl and I/Cl (0.005 and 0.009, respectively). The picrites and cumulates have Br/Cl and I/Cl ratios close to sub-continental lithospheric mantle values of approximately 0.0013 and 0.00002, respectively, and thus likely reflect the Rum magma source region. A positive correlation between Cl and Br signifies comparable partitioning behaviour in all samples. However, I is more variable, displaying a positive correlation with Cl for more primitive samples (e.g. picrite and peridotite), and seemingly decoupling from Br and Cl in chromite seams and pegmatites. The relative enrichment of I over Cl in the chromite seams points

  3. Interfacial Granular Intrusions

    NASA Astrophysics Data System (ADS)

    Linden, Paul; Zheng, Zhong; Huppert, Herbert; Vriend, Nathalie; Neufeld, Jerome

    2017-11-01

    We study experimentally the intrusion of light granular material into an inviscid fluid of greater density. Despite a rich set of related geophysical and environmental phenomena, such as the spreading of calved ice and volcanic ash and debris flows, there are few previous studies on this topic. We conduct a series of lock-release experiments of light spherical beads into a rectangular tank initially filled with either fresh water or salt water, and record the time evolution of the interface shape and the front location of the current of beads. In particular, we find that the front location obeys a power-law behaviour during an intermediate time period following the release of the lock before the nose of beads reaches a maximum runout distance within a finite time. We investigate the dependence of the scaling exponent and runout distance on the total amount of beads, the initial lock length, and the properties of the liquid that fills the tank in the experiments. Appropriate scaling arguments are provided to collapse the raw experimental data into universal curves, which can be used to describe the front dynamics of light granular intrusions with different size and buoyancy effects and initial aspect ratios.

  4. Nutrition systems for pressure suits.

    NASA Technical Reports Server (NTRS)

    Huber, C. S.; Heidelbaugh, N. D.; Rapp, R. M.; Smith, M. C., Jr.

    1973-01-01

    Nutrition systems were successfully developed in the Apollo Program for astronauts wearing pressure suits during emergency decompression situations and during lunar surface explorations. These nutrition systems consisted of unique dispensers, water, flavored beverages, nutrient-fortified beverages, and intermediate moisture food bars. The emergency decompression system dispensed the nutrition from outside the pressure suit by interfacing with a suit helmet penetration port. The lunar exploration system utilized dispensers stowed within the interior layers of the pressure suit. These systems could be adapted for provision of nutrients in other situations requiring the use of pressure suits.

  5. Zone of intrusion study.

    DOT National Transportation Integrated Search

    2010-10-15

    The Midwest Roadside Safety Facility (MwRSF) performed an analysis using LS-DYNA simulation to investigate the zone of intrusion (ZOI) of an NCHRP Report No. 350 2000p pickup truck when impacting a 40-in. high F-shape parapet. : The ZOI for the 40-in...

  6. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    ERIC Educational Resources Information Center

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  7. Suited for Space

    NASA Technical Reports Server (NTRS)

    Kosmo, Joseph J.

    2006-01-01

    This viewgraph presentation describes the basic functions of space suits for EVA astronauts. Space suits are also described from the past, present and future space missions. The contents include: 1) Why Do You Need A Space Suit?; 2) Generic EVA System Requirements; 3) Apollo Lunar Surface Cycling Certification; 4) EVA Operating Cycles for Mars Surface Missions; 5) Mars Surface EVA Mission Cycle Requirements; 6) Robustness Durability Requirements Comparison; 7) Carry-Weight Capabilities; 8) EVA System Challenges (Mars); 9) Human Planetary Surface Exploration Experience; 10) NASA Johnson Space Center Planetary Analog Activities; 11) Why Perform Remote Field Tests; and 12) Other Reasons Why We Perform Remote Field Tests.

  8. Variation of Nb-Ta, Zr-Hf, Th-U and K-Cs in two diabase-granophyre suites

    USGS Publications Warehouse

    Gottfried, D.; Greenland, L.P.; Campbell, E.Y.

    1968-01-01

    Concentrations of Nb, Ta, Zr, Hf, Th, U and Cs have been determined in samples of igneous rocks representing the diabase-granophyre suites from Dillsburg, Pennsylvania, and Great Lake, Tasmania. Niobium and tantalum have a three to fourfold increase with differentiation in each of the suites. The chilled margin of the Great Lake intrusion contains half the niobium and tantalum content (5.3 ppm and 0.4 ppm, respectively) of the chilled basalt from Dillsburg (10 ppm and 0.9 ppm, respectively). The twofold difference between the suites is correlated with differences in their titanium content. The average Nb Ta ratios for each suite are similar: 13.5 for the Great Lake suite, and 14.4 for the Dillsburg suite. The zirconium content of the two suites is essentially the same and increases from 50 to 60 ppm in the chilled margins to 240-300 ppm in the granophyres. Hafnium is low in the early formed rocks (0.5 -1.5 ppm and achieves a maximum in the granophyres (5-8 ppm). The Zr Hfratio decreases from 68 to 33 with progressive differentiation. In the Dillsburg suite thorium and uranium increase from 2.6 ppm and 0.6 ppm, respectively, in the chilled samples to 11.8 ppm and 3.1 ppm in the granophyres. The chilled margin of the Great Lake suite contains 3.2 ppm thorium and 9.8 ppm uranium; the granophyre contains 11.2 ppm thorium and 2.8 ppm uranium. The average Th U ratios of the Dillsburg and Great Lake suites are nearly the same-4.1 and 4.4, respectively. Within each suite the Th U ratio remains quite constant. Cesium and the K Cs ratio do not vary systematically in the Dillsburg suite possibly because of redistribution or loss of cesium by complex geologic processes. Except for the chilled margin of the Great Lake suite, the variation of Cs and the K Cs ratio are in accord with theoretical considerations. Cesium increases from about 0.6 ppm in the lower zone to 3.5 ppm in the granophyre; the K Cs ratio varies from 10 ?? 103 in the lower zone to 6 ?? 103 in the granophyre. A

  9. Intrusion Detection: Generics and State-of-the-Art (la Detection de l’intrusion: Modeles generiques et etat de l’art)

    DTIC Science & Technology

    2002-01-01

    by the user for a number of possible pre-defined intrusions. One of these pre-defined intrusions is the command “get /etc/ passwd ”. If this command is...Application-level firewalls: which check communication at the application level. An example is the string get /etc/ passwd in the ftp protocol

  10. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    PubMed Central

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  11. Cognitive avoidance of intrusive memories: recall vantage perspective and associations with depression.

    PubMed

    Williams, Alishia D; Moulds, Michelle L

    2007-06-01

    Although recent research demonstrates that intrusive memories represent an overlapping cognitive feature of depression and post-traumatic stress disorder (PTSD), there is still a general paucity of research investigating the prevalence and maintenance of intrusive memories in depression. The current study investigated the association between a range of cognitive avoidant mechanisms that characterize PTSD samples (i.e., suppression, rumination, emotional detachment, and an observer vantage perspective) and intrusive memories of negative autobiographical events in relation to dysphoria. Hypotheses were based on the proposition that employment of these cognitive mechanisms would hinder the emotional processing of the negative event, thus contributing to the maintenance of intrusions. Results supported an association between negative intrusive memories, dysphoria, and avoidant mechanisms. Significant differences were also found between field and observer memories and measures of emotional detachment and rumination. Implications relating to intrusive memory maintenance and treatment approaches are discussed.

  12. Scanning Seismic Intrusion Detector

    NASA Technical Reports Server (NTRS)

    Lee, R. D.

    1982-01-01

    Scanning seismic intrusion detector employs array of automatically or manually scanned sensors to determine approximate location of intruder. Automatic-scanning feature enables one operator to tend system of many sensors. Typical sensors used with new system are moving-coil seismic pickups. Detector finds uses in industrial security systems.

  13. 40 CFR 197.26 - What are the circumstances of the human intrusion?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... human intrusion? 197.26 Section 197.26 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... YUCCA MOUNTAIN, NEVADA Public Health and Environmental Standards for Disposal Human-Intrusion Standard § 197.26 What are the circumstances of the human intrusion? For the purposes of the analysis of human...

  14. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  15. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  16. Observed assertive and intrusive maternal feeding behaviors increase child adiposity123

    PubMed Central

    Ozbeki, Tina N; Appugliese, Danielle P; Kaciroti, Niko; Corwyn, Robert F; Bradley, Robert H

    2012-01-01

    Background: Few studies have examined observed maternal feeding behaviors and their potential association with child adiposity. The association between maternal prompting to eat and child adiposity has been inconsistent. Objectives: This study sought to identify factors associated with maternal feeding behaviors and to test the hypothesis that more maternal prompts to eat, more assertive prompts, and more intrusiveness are associated with greater child adiposity. Design: Children (n = 1218) and their mothers were videotaped eating a standardized snack at ages 15, 24, and 36 mo. Maternal prompts to eat, the percentage of prompts that were assertive, and intrusiveness were coded. Adjusted regression analyses evaluated predictors of prompts, the percentage of assertive prompts, and intrusiveness and the relation of each of these factors with child adiposity (weight-for-length z score at 15 mo and BMI z score at 24 and 36 mo) after control for the child's race-ethnicity and sex, family income-to-needs ratio, and maternal education, weight status, and depressive symptoms. Results: At 36 mo, mothers gave an average of 9.3 prompts; 61% of prompts were assertive, and 48% of mothers were intrusive. Lower maternal education and minority race-ethnicity were associated with a greater percentage of assertive prompts and intrusiveness. A greater percentage of assertive prompts and intrusiveness, but not total prompts, was associated with higher child adiposity. Conclusions: Assertive prompting and an intrusive style had small but significant associations with greater child adiposity. Future work should focus on maternal motivations for assertive and intrusive feeding styles and mechanisms through which these feeding styles might increase child adiposity. PMID:22277552

  17. Suited crewmember productivity

    NASA Astrophysics Data System (ADS)

    Barer, A. S.; Filipenkov, S. N.

    Analysis of the extravehicular activity (EVA) sortie experience gained in the former Soviet Union and physiologic hygienic aspect of space suit design and development shows that crewmember productivity is related to the following main factors: —space suit microclimate (gas composition, pressure and temperature); —limitation of motion activity and perception, imposed by the space suit; —good crewmember training in the ground training program; —level of crewmember general physical performance capabilities in connection with mission duration and intervals between sorties; —individual EVA experience (with accumulation) at which workmanship improves, while metabolism, physical and emotional stress decreases; —concrete EVA duration and work rate; —EVA bioengineering, including selection of tools, work station, EVA technology and mechanization.

  18. Suited crewmember productivity.

    PubMed

    Barer, A S; Filipenkov, S N

    1994-01-01

    Analysis of the extravehicular activity (EVA) sortie experience gained in the former Soviet Union and physiologic hygienic aspect of space suit design and development shows that crewmember productivity is related to the following main factors: -space suit microclimate (gas composition, pressure and temperature); -limitation of motion activity and perception, imposed by the space suit; -good crewmember training in the ground training program; -level of crewmember general physical performance capabilities in connection with mission duration and intervals between sorties; -individual EVA experience (with accumulation) at which workmanship improves, while metabolism, physical and emotional stress decreases; -concrete EVA duration and work rate; -EVA bioengineering, including selection of tools, work station, EVA technology and mechanization.

  19. Simulating the influence of groundwater table fluctuation on vapor intrusion

    NASA Astrophysics Data System (ADS)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  20. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  1. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  2. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  3. Associations between intrusive thoughts, reality discrimination and hallucination-proneness in healthy young adults.

    PubMed

    Smailes, David; Meins, Elizabeth; Fernyhough, Charles

    2015-01-01

    People who experience intrusive thoughts are at increased risk of developing hallucinatory experiences, as are people who have weak reality discrimination skills. No study has yet examined whether these two factors interact to make a person especially prone to hallucinatory experiences. The present study examined this question in a non-clinical sample. Participants were 160 students, who completed a reality discrimination task, as well as self-report measures of cannabis use, negative affect, intrusive thoughts and auditory hallucination-proneness. The possibility of an interaction between reality discrimination performance and level of intrusive thoughts was assessed using multiple regression. The number of reality discrimination errors and level of intrusive thoughts were independent predictors of hallucination-proneness. The reality discrimination errors × intrusive thoughts interaction term was significant, with participants who made many reality discrimination errors and reported high levels of intrusive thoughts being especially prone to hallucinatory experiences. Hallucinatory experiences are more likely to occur in people who report high levels of intrusive thoughts and have weak reality discrimination skills. If applicable to clinical samples, these findings suggest that improving patients' reality discrimination skills and reducing the number of intrusive thoughts they experience may reduce the frequency of hallucinatory experiences.

  4. Distributed intrusion detection system based on grid security model

    NASA Astrophysics Data System (ADS)

    Su, Jie; Liu, Yahui

    2008-03-01

    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  5. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  6. The importance of context: evidence that contextual representations increase intrusive memories.

    PubMed

    Pearson, David G; Ross, Fiona D C; Webster, Victoria L

    2012-03-01

    Intrusive memories appear to enter consciousness via involuntary rather than deliberate recollection. Some clinical accounts of PTSD seek to explain this phenomenon by making a clear distinction between the encoding of sensory-based and contextual representations. Contextual representations have been claimed to actively reduce intrusions by anchoring encoded perceptual data for an event in memory. The current analogue trauma study examined this hypothesis by manipulating contextual information independently from encoded sensory-perceptual information. Participants' viewed images selected from the International Affective Picture System that depicted scenes of violence and bodily injury. Images were viewed either under neutral conditions or paired with contextual information. Two experiments revealed a significant increase in memory intrusions for images paired with contextual information in comparison to the same images viewed under neutral conditions. In contrast to the observed increase in intrusion frequency there was no effect of contextual representations on voluntary memory for the images. The vividness and emotionality of memory intrusions were also unaffected. The analogue trauma paradigm may fail to replicate the effect of extreme stress on encoding postulated to occur during PTSD. These findings question the assertion that intrusive memories develop from a lack of integration between sensory-based and contextual representations in memory. Instead it is argued contextual representations play a causal role in increasing the frequency of intrusions by increasing the sensitivity of memory to involuntary retrieval by associated internal and external cues. Copyright © 2011 Elsevier Ltd. All rights reserved.

  7. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    NASA Astrophysics Data System (ADS)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  8. Work zone intrusion alarm effectiveness.

    DOT National Transportation Integrated Search

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  9. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes.

    PubMed

    Passarelli, L; Rivalta, E; Shuler, A

    2014-01-28

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process.

  10. Tell me more: Can a memory test reduce analogue traumatic intrusions?

    PubMed

    Krans, Julie; Näring, Gérard; Holmes, Emily A; Becker, Eni S

    2009-05-01

    Information processing theories of post-traumatic stress disorder (PTSD) state that intrusive images emerge due to a lack of integration of perceptual trauma representations in autobiographical memory. To test this hypothesis experimentally, participants were shown an aversive film to elicit intrusive images. After viewing, they received a recognition test for just one part of the film. The test contained neutrally formulated items to rehearse information from the film. Participants reported intrusive images for the film in an intrusion diary during one week after viewing. In line with expectations, the number of intrusive images decreased only for the part of the film for which the recognition test was given. Furthermore, deliberate cued-recall memory after one week was selectively enhanced for the film part that was in the recognition test a week before. The findings provide new evidence supporting information processing models of PTSD and have potential implications for early interventions after trauma.

  11. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    PubMed Central

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  12. Contrasting catastrophic eruptions predicted by different intrusion and collapse scenarios.

    PubMed

    Rincón, M; Márquez, A; Herrera, R; Alonso-Torres, A; Granja-Bruña, J L; van Wyk de Vries, B

    2018-04-18

    Catastrophic volcanic eruptions triggered by landslide collapses can jet upwards or blast sideways. Magma intrusion is related to both landslide-triggered eruptive scenarios (lateral or vertical), but it is not clear how such different responses are produced, nor if any precursor can be used for forecasting them. We approach this problem with physical analogue modelling enhanced with X-ray Multiple Detector Computed Tomography scanning, used to track evolution of internal intrusion, and its related faulting and surface deformation. We find that intrusions produce three different volcano deformation patterns, one of them involving asymmetric intrusion and deformation, with the early development of a listric slump fault producing pronounced slippage of one sector. This previously undescribed early deep potential slip surface provides a unified explanation for the two different eruptive scenarios (lateral vs. vertical). Lateral blast only occurs in flank collapse when the intrusion has risen into the sliding block. Otherwise, vertical rather than lateral expansion of magma is promoted by summit dilatation and flank buttressing. The distinctive surface deformation evolution detected opens the possibility to forecast the possible eruptive scenarios: laterally directed blast should only be expected when surface deformation begins to develop oblique to the first major fault.

  13. Emplacement of the early Miocene Pinto Peak intrusion, Southwest Utah, USA

    NASA Astrophysics Data System (ADS)

    Petronis, Michael S.; O'Driscoll, Brian

    2013-12-01

    In this contribution, we report rock magnetic, petrographic, and anisotropy of magnetic susceptibility (AMS) data from the Pinto Peak intrusion, all of which bear on volcanic construction. Rock magnetic data indicate that the dominant magnetic mineral phase is low-Ti titanomagnetite of multidomain grain size, the composition of which varies spatially across the intrusion. The intrusion is a porphyritic andesite dominated by Ca-rich plagioclase (>60%) as well as biotite, amphibole, olivine, and opaque minerals. Reflected light petrography reveals mostly euhedral-subhedral (titano)magnetite crystals that often form clustered glomerocrysts and stringers of equant crystals, without exhibiting a consistent mineral alignment fabric. Moderate-to-shallow plunging prolate magnetic susceptibility ellipsoids dominate the northern part of the intrusion while steeply dipping/plunging magnetic susceptibility ellipsoids are generally restricted to the southern part of the intrusion. The vent facies rocks yield moderate-to-steep oblate susceptibility ellipsoids. We interpret the flow pattern in the north to reflect subhorizontal flow of magma, filling a tabular sheet-like body associated with propagation of the intrusion to the north. We argue that the southern part of the intrusion represents the ascent site of the magma rising to shallow crustal levels along a steep feeder system. The oblate magnetic fabrics in the vent area plausibly represent flattening against the conduit walls as evidenced by a weak planar flow foliation observed in the vent conduit rocks. On reaching shallow crustal levels, the magma deformed and uplifted the roof rocks leading to gravitational instability. As the slide mass released from the roof, an explosive eruption ensued resulting in the emplacement of the Rocks of Paradise tuff and associated effusive lava flows. Following eruption, magma pressure decreased and the magma drained northward forming the northern intrusive phase.

  14. Modal Composition and Age of Intrusions in North-Central and Northeast Nevada

    USGS Publications Warehouse

    du Bray, Edward A.; Crafford, A. Elizabeth Jones

    2007-01-01

    Introduction Data presented in this report characterize igneous intrusions of north-central and northeast Nevada and were compiled as part of the Metallogeny of the Great Basin project conducted by the U.S. Geological Survey (USGS) between 2001 and 2007. The compilation pertains to the area bounded by lats 38.5 and 42 N., long 118.5 W., and the Nevada-Utah border (fig. 1). The area contains numerous large plutons and smaller stocks but also contains equally numerous smaller, shallowly emplaced intrusions, including dikes, sills, and endogenous dome complexes. Igneous intrusions (hereafter, intrusions) of multiple ages are major constituents of the geologic framework of north-central and northeast Nevada (Stewart and Carlson, 1978). Mesozoic and Cenozoic intrusions are particularly numerous and considered to be related to subduction along the west edge of the North American plate during this time. Henry and Ressel (2000) and Ressel and others (2000) have highlighted the association between magmatism and ore deposits along the Carlin trend. Similarly, Theodore (2000) has demonstrated the association between intrusions and ore deposits in the Battle Mountain area. Decades of geologic investigations in north-central and northeast Nevada (hereafter, the study area) demonstrate that most hydrothermal ore deposits are spatially, and probably temporally and genetically, associated with intrusions. Because of these associations, studies of many individual intrusions have been conducted, including those by a large number of Master's and Doctoral thesis students (particularly University of Nevada at Reno students and associated faculty), economic geologists working on behalf of exploration and mining companies, and USGS earth scientists. Although the volume of study area intrusions is large and many are associated with ore deposits, no synthesis of available data that characterize these rocks has been assembled. Compilations that have been produced for intrusions in Nevada

  15. Efficient cooling of rocky planets by intrusive magmatism

    NASA Astrophysics Data System (ADS)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  16. Sulfide intrusion in the tropical seagrasses Thalassia testudinum and Syringodium filiforme

    NASA Astrophysics Data System (ADS)

    Holmer, Marianne; Pedersen, Ole; Krause-Jensen, Dorte; Olesen, Birgit; Hedegård Petersen, Malene; Schopmeyer, Stephanie; Koch, Marguerite; Lomstein, Bente Aa.; Jensen, Henning S.

    2009-11-01

    Sulfur and oxygen dynamics in the seagrasses Thalassia testudinum and Syringodium filiforme and their sediments were studied in the US Virgin Islands (USVI) in order to explore sulfide intrusion into tropical seagrasses. Four study sites were selected based on the iron concentration in sediments and on proximity to anthropogenic nutrient sources. Meadow characteristics (shoot density, above- and below-ground biomass, nutrient content) were sampled along with sediment biogeochemistry. Sulfide intrusion was high in T. testudinum, as up to 96% of total sulfur in the plant was derived from sediment-derived sulfides. The sulfide intrusion was negatively correlated to the turnover of sulfides in the sediments regulated by both plant parameters and sediment sulfur pools. Sediment iron content played an indirect role by affecting sulfide turnover rates. Leaf production was negatively correlated with sulfide intrusion suggesting that active growth reduced sulfide intrusion. Sulfide intrusion was lower in S. filiforme (up to 44%) compared to T. testudinum consistent with a higher internal nighttime oxygen concentrations found for S. filiforme. When S. filiforme can take advantage of its ability to maintain high internal oxygen concentrations, as was the case on the USVI, it could increase its success in colonizing unvegetated disturbed sediments with potentially high sulfide concentrations.

  17. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    PubMed Central

    Chapman, Helen R.; Kirby-Turner, Nick

    2018-01-01

    Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised) evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists. PMID:29719519

  18. Inducing and modulating intrusive emotional memories: a review of the trauma film paradigm.

    PubMed

    Holmes, Emily A; Bourne, Corin

    2008-03-01

    Highly affect-laden memory intrusions are a feature of several psychological disorders with intrusive images of trauma especially associated with post-traumatic stress disorder (PTSD). The trauma film paradigm provides a prospective experimental tool for investigating analogue peri-traumatic cognitive mechanisms underlying intrusion development. We review several historical papers and some more recent key studies that have used the trauma film paradigm. A heuristic diagram is presented, designed to simplify predictions about analogue peri-traumatic processing and intrusion development, which can also be related to the processing elements of recent cognitive models of PTSD. Results show intrusions can be induced in the laboratory and their frequency amplified/attenuated in line with predictions. Successful manipulations include competing task type (visuospatial vs. verbal) and use of a cognitive coping strategy. Studies show that spontaneous peri-traumatic dissociation also affects intrusion frequency although attempts to manipulate dissociation have failed. It is hoped that further use of this paradigm may lead to prophylactic training for at risk groups and an improved understanding of intrusions across psychopathologies.

  19. Deep intrusions, lateral magma transport and related uplift at ocean island volcanoes

    NASA Astrophysics Data System (ADS)

    Klügel, Andreas; Longpré, Marc-Antoine; García-Cañada, Laura; Stix, John

    2015-12-01

    Oceanic intraplate volcanoes grow by accumulation of erupted material as well as by coeval or discrete magmatic intrusions. Dykes and other intrusive bodies within volcanic edifices are comparatively well studied, but intrusive processes deep beneath the volcanoes remain elusive. Although there is geological evidence for deep magmatic intrusions contributing to volcano growth through uplift, this has rarely been demonstrated by real-time monitoring. Here we use geophysical and petrological data from El Hierro, Canary Islands, to show that intrusions from the mantle and subhorizontal transport of magma within the oceanic crust result in rapid endogenous island growth. Seismicity and ground deformation associated with a submarine eruption in 2011-2012 reveal deep subhorizontal intrusive sheets (sills), which have caused island-scale uplift of tens of centimetres. The pre-eruptive intrusions migrated 15-20 km laterally within the lower oceanic crust, opening pathways that were subsequently used by the erupted magmas to ascend from the mantle to the surface. During six post-eruptive episodes between 2012 and 2014, further sill intrusions into the lower crust and upper mantle have caused magma to migrate up to 20 km laterally, resulting in magma accumulation exceeding that of the pre-eruptive phase. A comparison of geobarometric data for the 2011-2012 El Hierro eruption with data for other Atlantic intraplate volcanoes shows similar bimodal pressure distributions, suggesting that eruptive phases are commonly accompanied by deep intrusions of sills and lateral magma transport. These processes add significant material to the oceanic crust, cause uplift, and are thus fundamentally important for the growth and evolution of volcanic islands. We suggest that the development of such a magma accumulation zone in the lower oceanic crust begins early during volcano evolution, and is a consequence of increasing size and complexity of the mantle reservoir system, and potentially

  20. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  1. State of the Practice of Intrusion Detection Technologies

    DTIC Science & Technology

    2000-01-01

    security incident response teams ) - the role of IDS in threat management, such as defining alarm severity, monitoring, alerting, and policy-based...attacks in an effort to sneak under the radar of security specialists and intrusion detection software, a U.S. Navy network security team said today...to get the smoking gun," said Stephen Northcutt, head of the Shadow intrusion detection team at the Naval Surface Warfare Center. "To know what’s

  2. Replacing intrusive thoughts: investigating thought control in relation to OCD symptoms.

    PubMed

    Ólafsson, Ragnar P; Snorrason, Ívar; Bjarnason, Reynar K; Emmelkamp, Paul M G; Ólason, Daníel Þ; Kristjánsson, Árni

    2014-12-01

    Control of obsessive thoughts in Obsessive Compulsive Disorder (OCD) involves both avoidance and removal of undesirable intrusive thoughts. Thought suppression tasks tap both of these processes but experimental results have been inconsistent. Experimental tasks allowing more focused study of the processes involved in controlling intrusive thoughts may be needed. In two experiments, control over neutral, standardized intrusive and personal intrusive thoughts was investigated as participants attempted to replace them with neutral thoughts. Non-selected university students (Experiment 1: N = 61) and university students scoring high and low on self-report measure of OC symptoms (Experiment 2: N = 40) performed a computerized thought replacement task. In experiment 1 replacing personal intrusive thoughts took longer than replacing neutral thoughts. Self-reports showed that intrusive thoughts were rated more difficult to replace and were associated with greater thought reoccurrence during replacement, larger emotional reaction and more discomfort. These results were largely replicated in experiment 2. Furthermore, the high OC symptom group experienced greater overall difficulty controlling thoughts on the replacement task, experienced more reoccurrences of personal intrusive thoughts, larger emotional reactions and discomfort associated with them, and felt a greater urge to remove them. All participants were non-clinical university students, and older adults with OCD should be tested. The findings are in line with cognitive behavioural theories of OCD. They support the usefulness of thought replacement as a research paradigm to study thought control in OCD and possibly other psychological conditions characterized by repetitive thoughts. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Stratospheric Intrusion-Influenced Ozone Air Quality Exceedences Investigated in MERRA-2

    NASA Technical Reports Server (NTRS)

    Knowland, K. Emma; Ott, Lesley; Duncan, Bryan; Wargan, Krzysztof

    2017-01-01

    Ozone near the surface is harmful to human health and is a result of the photochemical reaction with both man-made and natural precursor pollutant sources. Therefore, in order to reduce near surface ozone concentrations, communities must reduce anthropogenic pollution sources. However, the injection of stratospheric ozone into the troposphere, known as a stratospheric intrusion, can also lead to concentrations of ground-level ozone exceeding air quality standards. Stratospheric intrusions are dynamical atmospheric features, however, these intrusions have been misrepresented in models and reanalyses until recently, as the features of a stratospheric intrusion are best identified in horizontal resolutions of approximately 50 km or smaller. NASA's Modern-Era Retrospective Analysis for Research and Applications Version-2 (MERRA-2) reanalysis is a publicly-available high-resolution dataset (50 km) with assimilated ozone that characterizes stratospheric ozone on the same spatiotemporal resolution as the meteorology. We show that stratospheric intrusions that impact surface air quality are well represented in the MERRA-2 reanalysis. This is demonstrated through a case study analysis of stratospheric intrusion events which were identified by the United States Environmental Protection Agency (EPA) to impact surface ozone air quality in spring 2012 in Colorado. The stratospheric intrusions are identified in MERRA-2 by the folding of the dynamical tropopause under the jet stream and subsequent isentropic descent of dry, O3-rich stratospheric air towards the surface where ozone air quality exceedences were observed. The MERRA-2 reanalysis can support air quality agencies for more rapid identification of the impact of stratospheric air on ground-level ozone.

  4. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    USGS Publications Warehouse

    duBray, E.A.

    2007-01-01

    Importantly, modal composition, age, and geochemical characteristics of intrusions associated with large mineral deposits along the trends, are indistinguishable from non-mineralized intrusions in northern Nevada and thus do not identify intrusions associated with significant deposits. Moreover, intrusion age and composition show little correlation with mineral-deposit type, abundance, and size. Given the lack of diagnostic characteristics for intrusions associated with deposits, it is uncertain whether age, modal composition, and geochemical data can identify intrusions associated with mineral deposits. These findings suggest that associations between northern Nevada intrusions and mineral deposits reflect superimposition of many geologic factors, none of which was solely responsible for mineral-deposit formation. These factors might include intrusion size, efficiency of fluid and metal extraction from magma, prevailing redox and sulfidation conditions, or derivation of metals and ligands from host rocks and groundwater. The abundance and diversity of mineral deposits in northern Nevada may partly reflect geochemical inheritance, for example, along the mineral trends rather than the influence of petrologically unique magma or associated fluids.

  5. Magnetic fabric constraints of the emplacement of igneous intrusions

    NASA Astrophysics Data System (ADS)

    Maes, Stephanie M.

    Fabric analysis is critical to evaluating the history, kinematics, and dynamics of geological deformation. This is particularly true of igneous intrusions, where the development of fabric is used to constrain magmatic flow and emplacement mechanisms. Fabric analysis was applied to three mafic intrusions, with different tectonic and petrogenetic histories, to study emplacement and magma flow: the Insizwa sill (Mesozoic Karoo Large Igneous Province, South Africa), Sonju Lake intrusion (Proterozoic Midcontinent Rift, Minnesota, USA), and Palisades sill (Mesozoic rift basin, New Jersey, USA). Multiple fabric analysis techniques were used to define the fabric in each intrusive body. Using digital image analysis techniques on multiple thin sections, the three-dimensional shape-preferred orientation (SPO) of populations of mineral phases were calculated. Low-field anisotropy of magnetic susceptibility (AMS) measurements were used as a proxy for the mineral fabric of the ferromagnetic phases (e.g., magnetite). In addition, a new technique---high-field AMS---was used to isolate the paramagnetic component of the fabric (e.g., silicate fabric). Each fabric analysis technique was then compared to observable field fabrics as a framework for interpretation. In the Insizwa sill, magnetic properties were used to corroborate vertical petrologic zonation and distinguish sub-units within lithologically defined units. Abrupt variation in magnetic properties provides evidence supporting the formation of the Insizwa sill by separate magma intrusions. Low-field AMS fabrics in the Sonju Lake intrusion exhibit consistent SW-plunging lineations and SW-dipping foliations. These fabric orientations provide evidence that the cumulate layers in the intrusion were deposited in a dynamic environment, and indicate magma flowed from southwest to northeast, parallel to the pre-existing rift structures. In the Palisades sill, the magnetite SPO and low-field AMS lineation have developed orthogonal to

  6. Revisiting Mesozoic felsic intrusions in eastern South China: spatial and temporal variations and tectonic significance

    NASA Astrophysics Data System (ADS)

    Zhu, Kong-Yang; Li, Zheng-Xiang; Xia, Qun-Ke; Xu, Xi-Sheng; Wilde, Simon A.; Chen, Han-Lin

    2017-12-01

    Whole-rock and mineral geochemical data are used to place new constraints on the petrogenesis and tectonic setting of Mesozoic granitoids (including syenites) in eastern South China. In the Early Mesozoic, granitoids of variable compositions were intruded in the Cathaysia Block which by this time had developed a thickened and highly differentiated Paleoproterozoic crust through the influence of subduction. Late Triassic ( 225 Ma) syenites are significantly different from Jurassic-Cretaceous syenites in South China and from most trachytes (GEOROC database) in terms of their high Th/U, La/Nb and Gd/Yb ratios. Their low Rb contents, coupled with their high K/Rb and Nb/Ta, and low 87Sr/86Sr and 206Pb/204Pb ratios suggest a source that had undergone granulite-facies metamorphism at the base of thickened (> 45 km thick) continental crust where garnet and rutile are stable. The Late Triassic alkaline intrusions thus appear not to be related to continental rifting. Compared with the Late Triassic syenites, contemporaneous syenogranites have higher Ga/Al and Rb/K ratios and ISr values. Their Ga/Al ratios are positively correlated with ISr values, and their higher Ga/Al ratios likewise do not appear to be related to a rift setting but reflect the composition of the source. New Pb isotopic data from Cretaceous magmatic rocks reveal that 120-100 Ma I-type granitoids in Zhejiang Province were likely derived from mixing of three components: contemporaneous basaltic magma, an enriched crustal component and a depleted crustal component. Pb isotopes of both the I-type granitoids and the basalts become more radiogenic towards the coast, where the ca. 100 Ma intrusions dominate. Furthermore, zircon-melt partition of Ce and hornblende oxygen barometries indicate that the Early Cretaceous intrusions also became more oxidized towards the coast. In addition, the ca. 100 Ma granitoids have higher Gd/Yb and lower Fe/Mg ratios than those of the 120-110 Ma suite, implying crustal thickening

  7. High precision ages from the Torres del Paine Intrusion, Chile

    NASA Astrophysics Data System (ADS)

    Michel, J.; Baumgartner, L.; Cosca, M.; Ovtcharova, M.; Putlitz, B.; Schaltegger, U.

    2006-12-01

    complex by the granite and we conclude that some parts of the mafic complex were emplaced before the granite. The well defined 206/238U-age for zircons and the slightly younger 40Ar/39Ar -ages for biotites of both rock suites show that emplacement and cooling of the Torres del Paine Intrusion took place in a relatively short time-frame. Halpern, 1973, Geological Society of America Bulletin, 84/7: 2407-2422. Sanchez et.al., 2006. V SSAGI, Punta del Este, April 2006.

  8. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  9. Space suit

    NASA Technical Reports Server (NTRS)

    Shepard, L. F.; Durney, G. P.; Case, M. C.; Kenneway, A. J., III; Wise, R. C.; Rinehart, D.; Bessette, R. J.; Pulling, R. C. (Inventor)

    1973-01-01

    A pressure suit for high altitude flights, particularly space missions is reported. The suit is designed for astronauts in the Apollo space program and may be worn both inside and outside a space vehicle, as well as on the lunar surface. It comprises an integrated assembly of inner comfort liner, intermediate pressure garment, and outer thermal protective garment with removable helmet, and gloves. The pressure garment comprises an inner convoluted sealing bladder and outer fabric restraint to which are attached a plurality of cable restraint assemblies. It provides versitility in combination with improved sealing and increased mobility for internal pressures suitable for life support in the near vacuum of outer space.

  10. Influence of Age, Thought Content, and Anxiety on Suppression of Intrusive Thoughts

    PubMed Central

    Beadel, Jessica R.; Green, Jennifer S.; Hosseinbor, Shahrzad; Teachman, Bethany A.

    2013-01-01

    Understanding differences in responses following attempts to suppress versus simply monitor intrusive thoughts is important given the established relationship between intrusive thinking and numerous forms of psychopathology. Moreover, these differences may vary as a function of age. Because of the links between aging and both enhancement in emotion regulation skills and decline in inhibition skills, older and younger adults were expected to differ in their responses (e.g., experience of negative affect and thought recurrence) to attempts at suppressing intrusive thoughts. This study examined whether efforts to suppress thought content that varied in valence and age-relevance differentially affected older (N = 40, aged 66–92) and younger (N = 42, aged 16–25) adults’ ability to inhibit intrusive thought recurrence and their resulting negative affect. Interestingly, older adults experienced less recurrence for most thoughts than younger adults. Also, for several dependent variables (negative affect and perceived difficulty suppressing intrusive thoughts), older adults showed less decline in their magnitude of response across thinking periods (i.e., from suppression to monitoring) than did younger adults. These age effects were not generally moderated by level of trait anxiety, though higher anxiety did predict intrusive thought responding in expected directions, such as greater negative affect. These findings point to independent influences of age and anxiety, and suggest a complex mix of risk and protective factors for older adults’ responses to intrusive thoughts. PMID:23395408

  11. Petrogenesis of the Ni-Cu-PGE sulfide-bearing Tamarack Intrusive Complex, Midcontinent Rift System, Minnesota

    NASA Astrophysics Data System (ADS)

    Taranovic, Valentina; Ripley, Edward M.; Li, Chusi; Rossell, Dean

    2015-01-01

    The Tamarack Intrusive Complex (TIC, 1105.6 ± 1.2 Ma) in NE Minnesota, was emplaced during the early stages of the development of the Midcontinent Rift System (MRS, "Early Stage": 1110-1106 Ma). Country rocks of the TIC are those of the Paleoproterozoic Thomson Formation, part of the Animikie Group including sulfide-bearing metasedimentary black shale. The magmatic system is composed of at least two principal mafic-ultramafic intrusive sequences: the sulfide-barren Bowl Intrusion in the south and the "dike" area intrusions in the north which host Ni-Cu-Platinum Group Elements (PGE) mineralization with up to 2.33% Ni, 1.24% Cu, 0.34 g/t Pt, 0.23 g/t Pd and 0.18 g/t Au. Two distinct intrusive units in the "dike" area are the CGO (coarse-grained olivine-bearing) Intrusion, a sub-vertical dike-like body, and the overlying sub-horizontal FGO (fine-grained olivine-bearing) Intrusion. Both intrusions comprise peridotite, feldspathic peridotite, feldspathic pyroxenite, melatroctolite and melagabbro. Massive sulfides are volumetrically minor and mainly occur as lenses emplaced into the country rocks associated with both intrusions. Semi-massive (net-textured) sulfides are distributed at the core of the CGO Intrusion, surrounded by a halo of the disseminated sulfides. Disseminated sulfides also occur in lenses along the base of the FGO Intrusion. Olivine compositions in the CGO Intrusion are between Fo89 and Fo82 and in the FGO Intrusion from Fo84 to Fo82. TIC intrusions have more primitive olivine compositions than that of olivine in the sheet-like intrusions in the Duluth Complex (below Fo70), as well as olivine from the smaller, conduit-related, Eagle and East Eagle Intrusions in Northern Michigan (Fo86 to Fo75). The FeO/MgO ratios of the CGO and FGO Intrusion parental magmas, inferred from olivine compositions, are similar to those of picritic basalts erupted during the early stages of the MRS formation. Trace element ratios differ slightly from other intrusions in the

  12. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    PubMed Central

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  13. Final OSWER Vapor Intrusion Guidance

    EPA Science Inventory

    EPA is preparing to finalize its guidance on assessing and addressing vapor intrusion, which is defined as migration of volatile constituents from contaminated media in the subsurface (soil or groundwater) into the indoor environment. In November 2002, EPA issued draft guidance o...

  14. Implementing and testing a fiber-optic polarization-based intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hajj, Rasha El; MacDonald, Gregory; Verma, Pramode; Huck, Robert

    2015-09-01

    We describe a layer-1-based intrusion detection system for fiber-optic-based networks. Layer-1-based intrusion detection represents a significant elevation in security as it prohibits an adversary from obtaining information in the first place (no cryptanalysis is possible). We describe the experimental setup of the intrusion detection system, which is based on monitoring the behavior of certain attributes of light both in unperturbed and perturbed optical fiber links. The system was tested with optical fiber links of various lengths and types, under different environmental conditions, and under changes in fiber geometry similar to what is experienced during tapping activity. Comparison of the results for perturbed and unperturbed links has shown that the state of polarization is more sensitive to intrusion activity than the degree of polarization or power of the received light. The testing was conducted in a simulated telecommunication network environment that included both underground and aerial links. The links were monitored for intrusion activity. Attempts to tap the link were easily detected with no apparent degradation in the visual quality of the real-time surveillance video.

  15. Durable Suit Bladder with Improved Water Permeability for Pressure and Environment Suits

    NASA Technical Reports Server (NTRS)

    Bue, Grant C.; Kuznetz, Larry; Orndoff, Evelyne; Tang, Henry; Aitchison, Lindsay; Ross, Amy

    2009-01-01

    Water vapor permeability is shown to be useful in rejecting heat and managing moisture accumulation in launch-and-entry pressure suits. Currently this is accomplished through a porous Gortex layer in the Advanced Crew and Escape Suit (ACES) and in the baseline design of the Constellation Suit System Element (CSSE) Suit 1. Non-porous dense monolithic membranes (DMM) that are available offer potential improvements for water vapor permeability with reduced gas leak. Accordingly, three different pressure bladder materials were investigated for water vapor permeability and oxygen leak: ElasthaneTM 80A (thermoplastic polyether urethane) provided from stock polymer material and two custom thermoplastic polyether urethanes. Water vapor, carbon dioxide and oxygen permeability of the DMM's was measured in a 0.13 mm thick stand-alone layer, a 0.08 mm and 0.05 mm thick layer each bonded to two different nylon and polyester woven reinforcing materials. Additional water vapor permeability and mechanical compression measurements were made with the reinforced 0.05 mm thick layers, further bonded with a polyester wicking and overlaid with moistened polyester fleece thermal underwear .This simulated the pressure from a supine crew person. The 0.05 mm thick nylon reinforced sample with polyester wicking layer was further mechanically tested for wear and abrasion. Concepts for incorporating these materials in launch/entry and Extravehicular Activity pressure suits are presented.

  16. Maxillary molar intrusion with micro-implant anchorage (MIA).

    PubMed

    Park, Hyo-Sang; Jang, Bong-Kyu; Kyung, Hee-Moon

    2005-11-01

    Intrusion of the maxillary molars is difficult to accomplish using traditional methods of anchorage. To describe methods of maxillary molar intrusion with the aid of micro-implants. Micro-implants provide stable intra-oral anchorage and enable the maxillary molars to be intruded without the usual side effects. Three adult patients are presented showing how micro-implants can be used to intrude the maxillary molars. In the first patient micro-implants were placed in the alveolar process between the second premolar and first molar, in the second patient micro-implants were placed in the palatal alveolar process between the first and second molars, and in the third patient a micro-implant was placed in the palate paramedially. A transpalatal bar was used to prevent bucco- or linguoversion of the molars during intrusion. The maxillary molars can be intruded with intra-oral anchorage derived from microscrew implants.

  17. Design of an Evolutionary Approach for Intrusion Detection

    PubMed Central

    2013-01-01

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The proposed approach can generate a pool of noninferior solutions and ensembles thereof having optimized trade-offs values of multiple conflicting objectives. In this paper, a three-phase, approach is proposed to generate solutions to a simple chromosome design in the first phase. In the first phase, a Pareto front of noninferior individual solutions is approximated. In the second phase of the proposed approach, the entire solution set is further refined to determine effective ensemble solutions considering solution interaction. In this phase, another improved Pareto front of ensemble solutions over that of individual solutions is approximated. The ensemble solutions in improved Pareto front reported improved detection results based on benchmark datasets for intrusion detection. In the third phase, a combination method like majority voting method is used to fuse the predictions of individual solutions for determining prediction of ensemble solution. Benchmark datasets, namely, KDD cup 1999 and ISCX 2012 dataset, are used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover individual solutions and ensemble solutions thereof with a good support and a detection rate from benchmark datasets (in comparison with well-known ensemble methods like bagging and boosting). In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting

  18. Teaching contact metamorphism, isograds, and mixed-volatile reactions: A suite-based approach

    NASA Astrophysics Data System (ADS)

    Peck, W. H.

    2003-12-01

    An important goal of teaching Introductory Petrology is to demonstrate how different kinds of approaches are integrated in studying petrologic problems. Depending on the goals of the study data used can be from the field, hand-sample, microscope, electron beam instrument, or mass spectrometer. A suite of samples with a known geographical and geological context can help students in drawing connections between different petrologic approaches, as the `geologic story' of the samples becomes a unifying theme. For teaching a unit on calc-silicates I use a suite of siliceous dolomite samples collected from the Ubehebe contact aureole (Death Valley, NV) as well as published data (Roselle et al., 1997; 1999) in a linked series of laboratory exercises and problem sets. The geology of the contact aureole is introduced in a three-hour laboratory exercise, where students identify the appearance of tremolite, forsterite, and periclase/brucite and the disappearance of quartz as the intrusion is approached. A concurrent problem set uses simplified mineral assemblage maps from the aureole. In the problem set students delineate isograds and determine the balanced metamorphic reactions by which the metamorphic minerals formed. Lecture material during this unit focuses on the physical properties of fluids in the crust and the mineralogical evidence for fluid-flow (with an emphasis on mixed-volatile reactions and T-XCO2 diagrams). A concrete field example helps focus student attention on the interrelation of disparate approaches by which petrologic problems addressed. The Ubehebe suite then becomes a unifying theme throughout the course: the specimens or regional geology are used in subsequent laboratories and lectures when introducing concepts such as grain nucleation and growth, reaction overstepping, and replacement textures. A virtual field trip of the Alta aureole, UT (using field photographs, maps, and photomicrographs) concludes the unit. The geology of the Alta aureole is

  19. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    PubMed

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  20. Pre-stressor cognitive control is related to intrusive cognition of a stressful film.

    PubMed

    Wessel, Ineke; Overwijk, Sippie; Verwoerd, Johan; de Vrieze, Nienke

    2008-04-01

    It has been suggested that relatively weak cognitive control existing prior to a stressful event may be associated with intrusive memories of that stressor afterwards. We explored this in two analog studies employing unselected participants who saw an emotional film fragment and completed behavioral (i.e., color-naming interference [CNI]) and self-report indices of intrusions. Prior to film presentation, several cognitive control tests were administered. Study 1 showed that better updating/monitoring was linked to less CNI from negative film-related words. However, better updating/monitoring was associated with more diary reports of intrusive memories. Study 2 showed that a better resistance to pro-active interference (PI) predicted less self-reported film-related intrusive cognition after 24h. However, after this delay, both self-reported intrusions and CNI were not related to updating/monitoring. Taken together, the results suggest that a specific pre-existing cognitive control function (i.e., resistance to PI) may be involved in the regulation of post-stressor intrusive memory phenomena.

  1. Layered intrusion formation by top down thermal migration zone refining (Invited)

    NASA Astrophysics Data System (ADS)

    Lundstrom, C.

    2009-12-01

    The formation of layered mafic intrusions by crystallization from cooling magmas represents the textbook example of igneous differentiation, often attributed to fractional crystallization through gravitational settling. Yet in detail, such interpretations have significant problems such that it remains unclear how these important features form. Put in the Earth perspective that no km scale blob of >50% melt has ever been imaged geophysically and that geochronological studies repeatedly indicate age inconsistencies with “big tank” magma chambers, it may be questioned if km scale magma chambers have ever existed. I will present the case for forming layered intrusions by a top down process whereby arriving basaltic magma reaches a permeability barrier, begins to underplate and forms the intrusion incrementally by sill injection with the body growing downward at ~1 mm/yr rate or less. A temperature gradient zone occurs in the overlying previously emplaced sills, leading to chemical components migrating by diffusion. As long as the rate of diffusion can keep up with rate of sill addition, the body will differentiate along a path similar to a liquid line of descent. In this talk, I will integrate data from 3 areas: 1) laboratory experiments examining the behavior of partially molten silicates in a temperature gradient (thermal migration); 2) numerical modeling of the moving temperature gradient zone process using IRIDIUM (Boudreau, 2003); 3) measurements of Fe isotope ratios and geochronology from the Sonju Lake Intrusion in the Duluth Complex. This model provides the ability to form km scale intrusions by a seismically invisible means, can explain million year offsets in chronology, and has implications for reef development and PGE concentration. Most importantly, this model of top down layered intrusion formation, following a similar recent proposal for granitoid formation (Lundstrom, 2009), represents a testable hypothesis: because temperature gradient driven

  2. In-situ trainable intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such thatmore » the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.« less

  3. Predicting The Intrusion Layer From Deep Ocean Oil Spills

    NASA Astrophysics Data System (ADS)

    Wang, Dayang; Chow, Aaron; Adams, E. Eric

    2015-11-01

    Oil spills from deep ocean blowout events motivate our study of multiphase plumes in a water column. Key to understanding the long-term fate of these plumes is the ability to predict the depth and persistence of intrusion layers. While intrusion layers from multiphase plumes have been studied under stagnant conditions, their behavior in the presence of crossflow, especially in mild crossflow, remains poorly understood. The classical classification of plume behavior identifies two regimes: crossflow-dominant and stratification-dominant--but it does not account for the interplay between the two effects, leaving the transition region unexplored. We conduct laboratory tank experiments to investigate the behavior of intrusion layers under the simultaneous action of crossflow and stratification. Our experiments use an inverted frame of reference, using glass beads with a range of sizes to simulate oil droplets. We find that crossflow creates enhanced mixing, which in turn leads to a shallower intrusion layer of the released fluid (correspondingly, a deeper layer in the case of a deep ocean blowout). We develop a mathematical formulation that extends previous models to account for crossflow effects, and use field observations to validate the analytical and experimental findings.

  4. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  5. Indoor Air Vapor Intrusion Mitigation Approaches

    EPA Pesticide Factsheets

    The National Risk Management Research Laboratory has developed a technology transfer document regarding management and treatment of vapor intrusion into building structures. This document describes the range of mitigation technologies available.

  6. Geochemistry and stratigraphic relations of middle Proterozoic rocks of the New Jersey Highlands

    USGS Publications Warehouse

    Volkert, Richard A.; Drake, Avery Ala

    1999-01-01

    Middle Proterozoic rocks of the New Jersey Highlands consist of a basement of dacitic, tonalitic, trondhjemitic, and charnockitic rocks that constitute the Losee metamorphic suite. These rocks are unconformably overlain by a layered supracrustal sequence of quartzo-feldspathic and calcareous rocks. Abundant sheets of hornblende- and biotite-bearing rocks of the Byram intrusive suite and clinopyroxene-bearing rocks of the Lake Hopatcong intrusive suite were synkinematically emplaced at about 1,090 Ma. These intrusive suites constitute the Vernon Supersuite. The postorogenic Mount Eve Granite has been dated at 1,020?4 Ma and is confined to the extreme northern Highlands.

  7. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    NASA Astrophysics Data System (ADS)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  8. A new physical barrier system for seawater intrusion control

    NASA Astrophysics Data System (ADS)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  9. The vernon supersuite: Mesoproterozoic A-type granitoid rocks in the New Jersey highlands

    USGS Publications Warehouse

    Volkert, R.A.; Drake, Avery A.

    1998-01-01

    Abundant Mesoproterozoic A-type granitoid rocks of two intrusive suites underlie approximately 50 percent of the New Jersey Highlands. These rocks, the Byram Intrusive and Lake Hopatcong Intrusive Suites, consist of granite, alaskite, quartz monzonite, monzonite, and minor pegmatite. Byram and Lake Hopatcong rocks, although different mineralogically, are similar geochemically and contain overlapping abundances of most major and trace elements. Petrographic relationships, geochronology, field relationships, and geochemical similarities support a comagmatic origin for both suites. They constitute the here named Vernon Supersuite.

  10. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    NASA Astrophysics Data System (ADS)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  11. Evaluating Suit Fit Using Performance Degradation

    NASA Technical Reports Server (NTRS)

    Margerum, Sarah E.; Cowley, Matthew; Harvill, Lauren; Benson, Elizabeth; Rajulu, Sudhakar

    2012-01-01

    The Mark III planetary technology demonstrator space suit can be tailored to an individual by swapping the modular components of the suit, such as the arms, legs, and gloves, as well as adding or removing sizing inserts in key areas. A method was sought to identify the transition from an ideal suit fit to a bad fit and how to quantify this breakdown using a metric of mobility-based human performance data. To this end, the degradation of the range of motion of the elbow and wrist of the suit as a function of suit sizing modifications was investigated to attempt to improve suit fit. The sizing range tested spanned optimal and poor fit and was adjusted incrementally in order to compare each joint angle across five different sizing configurations. Suited range of motion data were collected using a motion capture system for nine isolated and functional tasks utilizing the elbow and wrist joints. A total of four subjects were tested with motions involving both arms simultaneously as well as the right arm by itself. Findings indicated that no single joint drives the performance of the arm as a function of suit size; instead it is based on the interaction of multiple joints along a limb. To determine a size adjustment range where an individual can operate the suit at an acceptable level, a performance detriment limit was set. This user-selected limit reveals the task-dependent tolerance of the suit fit around optimal size. For example, the isolated joint motion indicated that the suit can deviate from optimal by as little as -0.6 in to -2.6 in before experiencing a 10% performance drop in the wrist or elbow joint. The study identified a preliminary method to quantify the impact of size on performance and developed a new way to gauge tolerances around optimal size.

  12. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  13. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    PubMed

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  14. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  15. EVA Suits Arrival

    NASA Image and Video Library

    2002-01-01

    Extravehicular Activity (EVA) suits packed inside containers arrive at the Space Station Processing Facility from Johnson Space Center in Texas. The suits will be used by STS-117 crew members to perform several spacewalks during the mission. The mission payload aboard Space Shuttle Atlantis is the S3/S4 integrated truss structure, along with a third set of solar arrays and batteries. The crew of six astronauts will install the truss to continue assembly of the International Space Station.

  16. Effect of winds and waves on salt intrusion in the Pearl River estuary

    NASA Astrophysics Data System (ADS)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  17. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    PubMed

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  18. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    PubMed Central

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  19. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    PubMed

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  20. Intrusions and provoked and spontaneous confabulations on memory tests in Korsakoff's syndrome.

    PubMed

    Rensen, Yvonne C M; Oosterman, Joukje M; Walvoort, Serge J W; Eling, Paul A T M; Kessels, Roy P C

    2017-03-01

    Intrusions on verbal memory tests have been used as an index for clinical confabulation. Severe memory impairments in combination with executive dysfunction have been suggested to be the underlying mechanism of confabulation, but to date, this relation is unclear. The aim of this study was (a) to examine the relation between (different types of) intrusions and confabulations in a large sample of confabulating patients with Korsakoff's syndrome (KS) and (b) to investigate whether different measures of executive functioning and memory performance are related to provoked and spontaneous confabulation. The Dutch version of the California Verbal Learning Test (CVLT) and various executive function and memory tests were administered to a group of 51 confabulating patients with KS. Professional caregivers rated the severity of provoked and spontaneous confabulation behavior of the patients using the Nijmegen-Venray Confabulation List-20 (NVCL-20). The total number of intrusions on the CVLT was not related to either provoked or spontaneous confabulation scores. None of the CVLT intrusion scores correlated significantly with any of the confabulation scores, but we did find small-to-medium, positive correlations between unrelated intrusions and both provoked confabulations and spontaneous confabulation. Provoked confabulation behavior was associated with executive dysfunction and poorer memory performances. Spontaneous confabulation was not related to performance on measures of executive function and memory. The total number of intrusions on verbal memory tests and clinical confabulations appear to be different phenomena. Only unrelated intrusions produced on the CVLT might possibly be related to confabulations. The production of provoked, but not spontaneous, confabulation is associated with executive dysfunction and memory deficits.

  1. Heat exchanges in wet suits.

    PubMed

    Wolff, A H; Coleshaw, S R; Newstead, C G; Keatinge, W R

    1985-03-01

    Flow of water under foam neoprene wet suits could halve insulation that the suits provided, even at rest in cold water. On the trunk conductance of this flow was approximately 6.6 at rest and 11.4 W . m-2 . C-1 exercising; on the limbs, it was only 3.4 at rest and 5.8 W . m-2 . degrees C-1 exercising; but during vasoconstriction in the cold, skin temperatures on distal parts of limbs were lower than were those of the trunk, allowing adequate metabolic responses. In warm water, minor postural changes and movement made flow under suits much higher, approximately 60 on trunk and 30 W . m-2 . degrees C-1 on limbs, both at rest and at work. These changes in flow allowed for a wide range of water temperatures at which people could stabilize body temperature in any given suit, neither overheating when exercising nor cooling below 35 degrees C when still. Even thin people with 4- or 7- mm suits covering the whole body could stabilize their body temperatures in water near 10 degrees C in spite of cold vasodilatation. Equations to predict limits of water temperature for stability with various suits and fat thicknesses are given.

  2. Space Suit Joint Torque Testing

    NASA Technical Reports Server (NTRS)

    Valish, Dana J.

    2011-01-01

    In 2009 and early 2010, a test was performed to quantify the torque required to manipulate joints in several existing operational and prototype space suits in an effort to develop joint torque requirements appropriate for a new Constellation Program space suit system. The same test method was levied on the Constellation space suit contractors to verify that their suit design meets the requirements. However, because the original test was set up and conducted by a single test operator there was some question as to whether this method was repeatable enough to be considered a standard verification method for Constellation or other future space suits. In order to validate the method itself, a representative subset of the previous test was repeated, using the same information that would be available to space suit contractors, but set up and conducted by someone not familiar with the previous test. The resultant data was compared using graphical and statistical analysis and a variance in torque values for some of the tested joints was apparent. Potential variables that could have affected the data were identified and re-testing was conducted in an attempt to eliminate these variables. The results of the retest will be used to determine if further testing and modification is necessary before the method can be validated.

  3. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    PubMed

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  4. Perimeter intrusion detection and assessment system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  5. JOHNSON AND ETTINGER (1991) VAPOR INTRUSION MODEL WITH SUB-SLAB CONCENTRATION

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is known as vapor intrusion (VI). Under certain circumstances, people living in homes above contaminated soil or ground water may be exposed to harmful levels of these vapors. Vapor intrusion is a part...

  6. Igneous intrusion models for floor fracturing in lunar craters

    NASA Technical Reports Server (NTRS)

    Wichman, R. W.; Schultz, P. H.

    1991-01-01

    Lunar floor-fractured craters are primarily located near the maria and frequently contain ponded mare units and dark mantling deposits. Fracturing is confined to the crater interior, often producing a moat-like feature near the floor edge, and crater depth is commonly reduced by uplift of the crater floor. Although viscous relaxation of crater topography can produce such uplift, the close association of modification with surface volcanism supports a model linking floor fracture to crater-centered igneous intrusions. The consequences of two intrusion models for the lunar interior are quantitatively explored. The first model is based on terrestrial laccoliths and describes a shallow intrusion beneath the crater. The second model is based on cone sheet complexes where surface deformation results from a deeper magma chamber. Both models, their fit to observed crater modifications and possible implications for local volcanism are described.

  7. Reducing depressive intrusions via a computerized cognitive bias modification of appraisals task: developing a cognitive vaccine.

    PubMed

    Lang, Tamara J; Moulds, Michelle L; Holmes, Emily A

    2009-02-01

    A feature of depression is the distressing experience of intrusive, negative memories. The maladaptive appraisals of such intrusions have been associated with symptom persistence. This study aimed to experimentally manipulate appraisals about depressive intrusions via a novel computerized cognitive bias modification (CBM) of appraisals paradigm, and to test the impact on depressive intrusion frequency for a standardized event (a depressive film). Forty-eight participants were randomly assigned to either a session of positive or negative CBM. Participants then watched a depressing film (including scenes of bereavement and bullying) and subsequently monitored the occurrence of depressive intrusions related to the film in a diary for one week. At one-week follow-up, participants completed additional measures of intrusions--the Impact of Event Scale (IES) and an intrusion provocation task. As predicted, compared to the negative condition, participants who underwent positive CBM showed a more positive appraisal bias. Further, one week later, positive CBM participants reported fewer intrusions of the film and had lower IES scores. Our findings demonstrate that it is possible to manipulate maladaptive appraisals about depressive intrusions via a computerized CBM task. Further, this effect transfers to reducing intrusive symptomatology related to a standardized event (a depressive film) over one week, suggesting novel clinical implications.

  8. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    PubMed

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  9. Evaluating Suit Fit Using Performance Degradation

    NASA Technical Reports Server (NTRS)

    Margerum, Sarah E.; Cowley, Matthew; Harvill, Lauren; Benson, Elizabeth; Rajulu, Sudhakar

    2011-01-01

    The Mark III suit has multiple sizes of suit components (arm, leg, and gloves) as well as sizing inserts to tailor the fit of the suit to an individual. This study sought to determine a way to identify the point an ideal suit fit transforms into a bad fit and how to quantify this breakdown using mobility-based physical performance data. This study examined the changes in human physical performance via degradation of the elbow and wrist range of motion of the planetary suit prototype (Mark III) with respect to changes in sizing and as well as how to apply that knowledge to suit sizing options and improvements in suit fit. The methods implemented in this study focused on changes in elbow and wrist mobility due to incremental suit sizing modifications. This incremental sizing was within a range that included both optimum and poor fit. Suited range of motion data was collected using a motion analysis system for nine isolated and functional tasks encompassing the elbow and wrist joints. A total of four subjects were tested with motions involving both arms simultaneously as well as the right arm only. The results were then compared across sizing configurations. The results of this study indicate that range of motion may be used as a viable parameter to quantify at what stage suit sizing causes a detriment in performance; however the human performance decrement appeared to be based on the interaction of multiple joints along a limb, not a single joint angle. The study was able to identify a preliminary method to quantify the impact of size on performance and to develop a means to gauge tolerances around optimal size. More work is needed to improve the assessment of optimal fit and to compensate for multiple joint interactions.

  10. Evaporation-Cooled Protective Suits for Firefighters

    NASA Technical Reports Server (NTRS)

    Weinstein, Leonard Murray

    2007-01-01

    Suits cooled by evaporation of water have been proposed as improved means of temporary protection against high temperatures near fires. When air temperature exceeds 600 F (316 C) or in the presence of radiative heating from nearby sources at temperatures of 1,200 F (649 C) or more, outer suits now used by firefighters afford protection for only a few seconds. The proposed suits would exploit the high latent heat of vaporization of water to satisfy a need to protect against higher air temperatures and against radiant heating for significantly longer times. These suits would be fabricated and operated in conjunction with breathing and cooling systems like those with which firefighting suits are now equipped

  11. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    DOE PAGES

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-flymore » during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.« less

  12. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  13. Extravehicular activity space suit interoperability.

    PubMed

    Skoog, A I; McBarron JW 2nd; Severin, G I

    1995-10-01

    The European Agency (ESA) and the Russian Space Agency (RKA) are jointly developing a new space suit system for improved extravehicular activity (EVA) capabilities in support of the MIR Space Station Programme, the EVA Suit 2000. Recent national policy agreements between the U.S. and Russia on planned cooperations in manned space also include joint extravehicular activity (EVA). With an increased number of space suit systems and a higher operational frequency towards the end of this century an improved interoperability for both routine and emergency operations is of eminent importance. It is thus timely to report the current status of ongoing work on international EVA interoperability being conducted by the Committee on EVA Protocols and Operations of the International Academy of Astronauts initiated in 1991. This paper summarises the current EVA interoperability issues to be harmonised and presents quantified vehicle interface requirements for the current U.S. Shuttle EMU and Russian MIR Orlan DMA and the new European/Russian EVA Suit 2000 extravehicular systems. Major critical/incompatible interfaces for suits/mother-craft of different combinations are discussed, and recommendations for standardisations given.

  14. Non-Intrusive Techniques of Inspections During the Pre-Launch Phase of Space Vehicle

    NASA Technical Reports Server (NTRS)

    Thirumalainambi, Rejkumar; Bardina, Jorge E.

    2005-01-01

    This paper addresses a method of non-intrusive local inspection of surface and sub-surface conditions, interfaces, laminations and seals in both space vehicle and ground operations with an integrated suite of imaging sensors during pre-launch operations. It employs an advanced Raman spectrophotometer with additional spectrophotometers and lidar mounted on a flying robot to constantly monitor the space hardware as well as inner surface of the vehicle and ground operations hardware. This paper addresses a team of micro flying robots with necessary sensors and photometers to monitor the entire space vehicle internally and externally. The micro flying robots can reach altitude with least amount of energy, where astronauts have difficulty in reaching and monitoring the materials and subsurface faults. The micro flying robot has an embedded fault detection system which acts as an advisory system and in many cases micro flying robots act as a Supervisor to fix the problems. As missions expand to a sustainable presence in the Moon, and extend for durations longer than one year in lunar outpost, the effectiveness of the instrumentation and hardware has to be revolutionized if NASA is to meet high levels of mission safety, reliability, and overall success. The micro flying robot uses contra-rotating propellers powered by an ultra-thin, ultrasonic motor with currently the world's highest power weight ratio, and is balanced in mid-air by means of the world's first stabilizing mechanism using a linear actuator. The essence of micromechatronics has been brought together in high-density mounting technology to minimize the size and weight. The robot can take suitable payloads of photometers, embedded chips for image analysis and micro pumps for sealing cracks or fixing other material problems. This paper also highlights advantages that this type of non-intrusive techniques offer over costly and monolithic traditional techniques.

  15. Understanding Skill in EVA Mass Handling. Volume 4; An Integrated Methodology for Evaluating Space Suit Mobility and Stability

    NASA Technical Reports Server (NTRS)

    McDonald, P. Vernon; Newman, Dava

    1999-01-01

    The empirical investigation of extravehicular activity (EVA) mass handling conducted on NASA's Precision Air-Bearing Floor led to a Phase I SBIR from JSC. The purpose of the SBIR was to design an innovative system for evaluating space suit mobility and stability in conditions that simulate EVA on the surface of the Moon or Mars. The approach we used to satisfy the Phase I objectives was based on a structured methodology for the development of human-systems technology. Accordingly the project was broken down into a number of tasks and subtasks. In sequence, the major tasks were: 1) Identify missions and tasks that will involve EVA and resulting mobility requirements in the near and long term; 2) Assess possible methods for evaluating mobility of space suits during field-based EVA tests; 3) Identify requirements for behavioral evaluation by interacting with NASA stakeholders;.4) Identify necessary and sufficient technology for implementation of a mobility evaluation system; and 5) Prioritize and select technology solutions. The work conducted in these tasks is described in this final volume of the series on EVA mass handling. While prior volumes in the series focus on novel data-analytic techniques, this volume addresses technology that is necessary for minimally intrusive data collection and near-real-time data analysis and display.

  16. Effects of intrusions on grades and contents of gold and other metals in volcanogenic massive sulfide deposits

    USGS Publications Warehouse

    Singer, Donald A.; Berger, Vladimir; Mosier, Dan L.

    2011-01-01

    The reason some VMS deposits contain more gold or other metals than others might be due to the influence of intrusions. A new approach examining this possibility is based on examining the information about many VMS deposits to test statistically if those with associated intrusions have significantly different grades or amounts of metals. A set of 632 VMS deposits with reported grades, tonnages, and information about the observed presence or absence of subvolcanic or plutonic intrusive bodies emplaced at or after VMS mineralization is statistically analyzed.Deposits with syn-mineralization or post-mineralization intrusions nearby have higher tonnages than deposits without reported intrusions, but the differences are not statistically significant. When both kinds of intrusions are reported, VMS deposit sizes are significantly higher than in the deposits without any intrusions. Gold, silver, zinc, lead, and copper average grades are not significantly different in the VMS deposits with nearby intrusions compared to deposits without regardless of relative age of intrusive. Only zinc and copper contents are significantly higher in VMS deposits with both kinds of intrusive reported. These differences in overall metal content are due to significantly larger deposit sizes of VMS deposits where both intrusive kinds are observed and reported, rather than any difference in metal grades.

  17. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  18. Constellation Space Suit System Development Status

    NASA Technical Reports Server (NTRS)

    Ross, Amy; Aitchison, Lindsay; Daniel, Brian

    2007-01-01

    The Constellation Program has initiated the first new flight suit development project since the Extravehicular Mobility Unit (EMU) was developed for the Space Shuttle Program in the 1970s. The Constellation suit system represents a significant challenge to designers in that the system is required to address all space suit functions needed through all missions and mission phases. This is in marked contrast to the EMU, which was designed specifically for micro-gravity space walks. The Constellation suit system must serve in all of the following scenarios: launch, entry and abort crew survival; micro-gravity extravehicular activity (EVA); and lunar (1/6th-gravity) surface EVA. This paper discusses technical efforts performed from May 2006 through February 2007 for the Constellation space suit system pressure garment.

  19. Alerts Visualization and Clustering in Network-based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administratormore » with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.« less

  20. The Effects of Saltwater Intrusion to Flood Mitigation Project

    NASA Astrophysics Data System (ADS)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  1. Quantification of the Intrusion Process at Kïlauea Volcano, Hawai'I

    NASA Astrophysics Data System (ADS)

    Wright, T. L.; Marsh, B. D.

    2014-12-01

    Knowing the time between initial intrusion and later eruption of a given volume of differentiated magma is key to evaluating the connections among magma transport and emplacement, solidification and differentiation, and melt extraction and eruption. Cooling rates for two Kïlauea lava lakes as well as known parent composition and residence times for intrusions that resulted in fractionated lavas later erupted on the East Rift Zone in 1955 (34 years) and 1977 (22 years) allow intrusion dimensions to be calculated. We model intrusions beneath Kïlauea's East Rift Zone near their point of separation from the magma transport path at ~ 5 km depth using Jaeger's (1957) method calibrated against Alae and Makaopuhi lava lakes with wallrock temperatures above the curie point at 450-550°C. Minimum thicknesses of 50-70 meters are found for intrusions that fed the two fractionated lavas, as well as for long-lived magma bodies identified from geodetic monitoring during many East Rift eruptions. These intrusions began as dikes, but probably became sills or laccolithic bodies that remained near the transport path. Short-lived intrusions also arrested near the magma transport path, but that retain a dike geometry, are hypothesized to serve as a trigger for the small but discrete increments of seaward movement on Kïlauea's south flank that characterize slow-slip earthquakes. Two additional thoughts arise from the quantitative modeling of magma cooling. First, long-term heating of the wallrock surrounding the horizontal East Rift Zone transport path slows the rate of cooling within the conduit, possibly contributing to the longevity of the East Rift eruption that began in 1983. Second, the combined effects of heating of the wall rock and ever-increasing magma supply rate from the mantle may have forced breakdown and widening of the vertical transport conduit, which could explain the 5-15-km deep long-period earthquake swarms beneath Kīlauea's summit between 1987 and 1992.

  2. Reactive and multiphase modelling for the identification of monitoring parameters to detect CO2 intrusion into freshwater aquifers

    NASA Astrophysics Data System (ADS)

    Fahrner, S.; Schaefer, D.; Wiegers, C.; Köber, R.; Dahmke, A.

    2011-12-01

    A monitoring at geological CO2 storage sites has to meet environmental, regulative, financial and public demands and thus has to enable the detection of CO2 leakages. Current monitoring concepts for the detection of CO2 intrusion into freshwater aquifers located above saline storage formations in course of leakage events lack the identification of monitoring parameters. Their response to CO2 intrusion still has to be enlightened. Scenario simulations of CO2 intrusion in virtual synthetic aquifers are performed using the simulators PhreeqC and TOUGH2 to reveal relevant CO2-water-mineral interactions and multiphase behaviour on potential monitoring parameters. The focus is set on pH, total dissolved inorganic carbon (TIC) and the hydroelectric conductivity (EC). The study aims at identifying at which conditions the parameters react rapidly, durable and in a measurable degree. The depth of the aquifer, the mineralogy, the intrusion rates, the sorption specification and capacities, and groundwater flow velocities are varied in the course of the scenario modelling. All three parameters have been found suited in most scenarios. However, in case of a lack of calcite combined with low saturation of the water with respect to CO2 and shallow conditions, changes are close to the measurement resolution. Predicted changes in EC result from the interplay between carbonic acid production and its dissociation, and pH buffering by mineral dissolution. The formation of a discrete gas phase in cases of full saturation of the groundwater in confined aquifers illustrates the potential bipartite resistivity response: An increased hydroelectric conductivity at locations with dissolved CO2, and a high resistivity where the gas phase dominates the pore volume occupation. Increased hydrostatic pressure with depth and enhanced groundwater flow velocities enforce gas dissolution and diminish the formation of a discrete gas phase. Based on the results, a monitoring strategy is proposed which

  3. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    NASA Astrophysics Data System (ADS)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  4. ON-LINE CALCULATOR: VAPOR INTRUSION MODELING

    EPA Science Inventory

    Migration of volatile chemicals from the subsurface into overlying buildings is called vapor intrusion (VI). Volatile organic chemicals in contaminated soils or groundwater can emit vapors, which may migrate through subsurface soils and may enter the indoor air of overlying build...

  5. Work Zone Intrusion Report Interface Design

    DOT National Transportation Integrated Search

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  6. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  7. ASSESSMENT OF VAPOR INTRUSION USING INDOOR AND SUB-SLAB AIR SAMPLING

    EPA Science Inventory

    The objective of this investigation was to develop a method for evaluating vapor intrusion using indoor and sub-slab air measurement and at the same time directly assist EPA’s New England Regional Office in evaluating vapor intrusion in 15 homes and one business near the former R...

  8. Accounting for intrusive thoughts in PTSD: Contributions of cognitive control and deliberate regulation strategies.

    PubMed

    Bomyea, Jessica; Lang, Ariel J

    2016-03-01

    Persistent, trauma-related intrusive thoughts are common in individuals with posttraumatic stress disorder (PTSD). Automatic aspects of cognitive functioning (including executive functioning) and maladaptive deliberate attempts at cognitive regulation have been proposed as individual difference factors that may perpetuate intrusive thoughts. The current study sought to examine the joint contribution of these two factors on intrusive thoughts in PTSD. Forty-two women with PTSD completed an executive functioning assessment followed by a thought suppression task. Intrusive thoughts (frequency and duration), as well as participants' use of specific cognitive regulation strategies (avoidance-based thought regulation strategies; TRS), were measured during the task. Hierarchical linear regression was used to examine the interaction of executive functioning and TRS on intrusive thoughts. Greater use of TRS was associated with greater intrusive thought persistence for those with low executive functioning, but not those with high executive functioning. Data was collected cross-sectionally and the laboratory thought suppression task may not correspond to naturalistic thought regulation. Results are consistent with prior literature suggesting that certain responses deployed by individuals to control intrusive thoughts may be unhelpful, but that a higher level of cognitive capacity may mitigate this effect. Implications of these findings for recent models of cognition in PTSD are discussed. Published by Elsevier B.V.

  9. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is crediblemore » as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required.« less

  10. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  11. Attenuating fearful memories: effect of cued extinction on intrusions.

    PubMed

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  12. Ratio of Major Ions in Groundwater to Determine Saltwater Intrusion in Coastal Areas

    NASA Astrophysics Data System (ADS)

    Sudaryanto; Naily, Wilda

    2018-02-01

    Saltwater or seawater intrusion into groundwater aquifers occurs mostly in big cities and developing coastal cities. Coastal hydrology is associated with complex and highly dynamic environmental characteristics of interactions between groundwater, surface water, and water from the estuary. The rise of sea levels and excessive use of groundwater for clean water source trigger saltwater intrusion. Identification of saltwater intrusion into groundwater can be done by groundwater sampling and major ion analysis. The major ions dissolved in water are Ca, Mg, Na, K, Cl, HCO3, and SO4; the major ion ratios are Cl/Br, Ca/Mg, Ca/ (HCO3 and SO4), and Na/Cl. By knowing whether groundwater quality has been or has not been influenced by saltwater, groundwater zones can be determined in every coastal area. In addition, by analyzing and reviewing some concepts about the intrusion or contamination of saltwater into groundwater, there will be sufficient results for the identification of saltwater intrusion.

  13. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    PubMed

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  14. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms

    PubMed Central

    James, Ella L.; Bonsall, Michael B.; Hoppitt, Laura; Tunbridge, Elizabeth M.; Geddes, John R.; Milton, Amy L.

    2015-01-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind’s eye and cause distress. We investigated whether reconsolidation—the process during which memories become malleable when recalled—can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. PMID:26133572

  15. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    NASA Astrophysics Data System (ADS)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  16. Lithologic mapping of mafic intrusions in East Greenland using Landsat Thematic Mapper data

    NASA Technical Reports Server (NTRS)

    Naslund, H. Richard; Birnie, R. W.; Parr, J. T.

    1989-01-01

    The East Greenland Tertiary Igneous Province contains a variety of intrusive and extrusive rock types. The Skaergaard complex is the most well known of the intrusive centers. Landsat thematic mapping (TM) was used in conjunction with field spectrometer data to map these mafic intrusions. These intrusions are of interest as possible precious metal ore deposits. They are spectrally distinct from the surrounding Precambrian gneisses. However, subpixel contamination by snow, oxide surface coatings, lichen cover and severe topography limit the discrimination of lithologic units within the gabbro. Imagery of the Skaergaard and surrounding vicinity, and image processing and enhancement techniques are presented. Student theses and other publications resulting from this work are also listed.

  17. Comparison of air exhausts for surgical body suits (space suits) and the potential for periprosthetic joint infection.

    PubMed

    Ling, F; Halabi, S; Jones, C

    2018-07-01

    Periprosthetic joint infection is a major complication of total joint replacement surgery and is associated with significant morbidity, mortality and financial burden. Surgical body suits (space suits), originally designed to reduce the incidence of infection, have paradoxically been implicated in increased periprosthetic joint infection rates recently. Air exhausted from space suits may contribute to this increased rate of periprosthetic joint infection. To investigate the flow of air exhausted from space suits commonly used in modern operating theatres. The exhaust airflow patterns of four commercially available space suit systems were compared using a fog machine and serial still photographs. The space suit systems tested all air exhausted into the operating room. The single fan systems with a standard surgical gown exhausted air laterally from the posterior gown fold at approximately the level of the surgical field. The single fan system with a dedicated zippered suit exhausted air at a level below the surgical field. The dual fan system exhausted air out of the top of the helmet at a level above the surgical field. Space suit systems currently in use in joint replacement surgery differ significantly from traditional body exhaust systems; rather than removing contaminated air from the operating environment, modern systems exhaust this air into the operating room, in some cases potentially towards the sterile instrument tray and the surgical field. Copyright © 2018 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.

  18. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    PubMed

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  19. The role of intrusions in the formation of Irish-type mineralisation

    NASA Astrophysics Data System (ADS)

    McCusker, Jim; Reed, Christopher

    2013-08-01

    The Stonepark Prospect is located in County Limerick, south-central Ireland. Multiple zones of Zn-Pb mineralisation have been identified at Stonepark and these are approximately 5 km west of the Pallas Green Prospect. At Stonepark, the sulphide bodies are hosted within the Waulsortian Limestone and closely resemble other Irish-type deposits. The mineralisation is composed of pyrite-marcasite, sphalerite and galena with gangue Fe-dolomite and calcite cements. A key difference at Stonepark is the presence of Chadian-aged volcanic rocks (Knockroe Volcanics) that intrude into and overlie the Waulsortian Limestone. Subsequent hydrothermal brecciation of the Waulsortian Limestone and Knockroe intrusions resulted in the formation of tabular polymict breccia bodies containing mixed carbonate and clasts of intrusive rocks. These have then been overprinted by massive sulphide mineralisation. Further syn-mineralisation brecciation has overprinted the earlier breccias. Drilling has demonstrated a spatial relationship between the volume of intrusive rocks (dykes and polymict breccias) and Zn-Pb mineralisation. This association suggests that the intrusive rocks provided a mechanism for the introduction of the mineralising fluids into the breccia bodies. This is significant as to date no large controlling fault has been identified, as is seen at other Irish-type deposits. Further work is required to understand the alteration process of the intrusive rocks and how this may relate to the mineralising process.

  20. Sill intrusion in volcanic calderas: implications for vent opening probability

    NASA Astrophysics Data System (ADS)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  1. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    PubMed

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. A Citizen's Guide to Vapor Intrusion Mitigation

    EPA Pesticide Factsheets

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  3. Celebrating 50 years of SWIMs (Salt Water Intrusion Meetings)

    NASA Astrophysics Data System (ADS)

    Post, Vincent E. A.; Essink, Gualbert Oude; Szymkiewicz, Adam; Bakker, Mark; Houben, Georg; Custodio, Emilio; Voss, Clifford

    2018-06-01

    The Salt Water Intrusion Meetings, or SWIMs, are a series of meetings that focus on seawater intrusion in coastal aquifers and other salinisation processes. 2018 marks the 50th year of the SWIM and the 25th biennial meeting. The SWIM proceedings record half a century of research progress on site characterisation, geophysical and geochemical techniques, variable-density flow, modelling, and water management. The SWIM is positioning itself to remain a viable platform for discussing the coastal aquifer management challenges of the next 50 years.

  4. Hybrid Enhanced Epidermal SpaceSuit Design Approaches

    NASA Astrophysics Data System (ADS)

    Jessup, Joseph M.

    A Space suit that does not rely on gas pressurization is a multi-faceted problem that requires major stability controls to be incorporated during design and construction. The concept of Hybrid Epidermal Enhancement space suit integrates evolved human anthropomorphic and physiological adaptations into its functionality, using commercially available bio-medical technologies to address shortcomings of conventional gas pressure suits, and the impracticalities of MCP suits. The prototype HEE Space Suit explored integumentary homeostasis, thermal control and mobility using advanced bio-medical materials technology and construction concepts. The goal was a space suit that functions as an enhanced, multi-functional bio-mimic of the human epidermal layer that works in attunement with the wearer rather than as a separate system. In addressing human physiological requirements for design and construction of the HEE suit, testing regimes were devised and integrated into the prototype which was then subject to a series of detailed tests using both anatomical reproduction methods and human subject.

  5. Z-1 Prototype Space Suit Testing Summary

    NASA Technical Reports Server (NTRS)

    Ross, Amy

    2013-01-01

    The Advanced Space Suit team of the NASA-Johnson Space Center performed a series of test with the Z-1 prototype space suit in 2012. This paper discusses, at a summary level, the tests performed and results from those tests. The purpose of the tests were two-fold: 1) characterize the suit performance so that the data could be used in the downselection of components for the Z-2 Space Suit and 2) develop interfaces with the suitport and exploration vehicles through pressurized suit evaluations. Tests performed included isolated and functional range of motion data capture, Z-1 waist and hip testing, joint torque testing, CO2 washout testing, fit checks and subject familiarizations, an exploration vehicle aft deck and suitport controls interface evaluation, delta pressure suitport tests including pressurized suit don and doff, and gross mobility and suitport ingress and egress demonstrations in reduced gravity. Lessons learned specific to the Z-1 prototype and to suit testing techniques will be presented.

  6. Z-1 Prototype Space Suit Testing Summary

    NASA Technical Reports Server (NTRS)

    Ross, Amy J.

    2012-01-01

    The Advanced Space Suit team of the NASA-Johnson Space Center performed a series of test with the Z-1 prototype space suit in 2012. This paper discusses, at a summary level, the tests performed and results from those tests. The purpose of the tests were two -fold: 1) characterize the suit performance so that the data could be used in the downselection of components for the Z -2 Space Suit and 2) develop interfaces with the suitport and exploration vehicles through pressurized suit evaluations. Tests performed included isolated and functional range of motion data capture, Z-1 waist and hip testing, joint torque testing, CO2 washout testing, fit checks and subject familiarizations, an exploration vehicle aft deck and suitport controls interface evaluation, delta pressure suitport tests including pressurized suit don and doff, and gross mobility and suitport ingress and egress demonstrations in reduced gravity. Lessons learned specific to the Z -1 prototype and to suit testing techniques will be presented.

  7. Posttraumatic Intrusion, Avoidance, and Social Functioning: A 20-Year Longitudinal Study

    ERIC Educational Resources Information Center

    Solomon, Zahava; Mikulincer, Mario

    2007-01-01

    The study assesses posttraumatic intrusion, avoidance, and social functioning among 214 Israeli combat veterans from the first Lebanon War with and without combat stress reaction (CSR) 1, 2, 3, and 20 years after the war. CSR veterans reported higher intrusion and avoidance than did non-CSR veterans. With time, there was a decline in these…

  8. Obsessive relational intrusion: incidence, perceived severity, and coping.

    PubMed

    Cupach, W R; Spitzberg, B H

    2000-01-01

    Two studies investigated the phenomenon of obsessive relational intrusion (ORI), defined as repeated and unwanted pursuit and invasion of one's sense of physical or symbolic privacy by another person, either stranger or acquaintance, who desires and/or presumes an intimate relationship. In Study 1, we sought to identify the incidence of a broad range of relationally intrusive behaviors, to identify the coping responses employed by victims of ORI, and to assess the associations between coping responses and ORI behaviors. Study 2 assessed the perceived degree of severity of ORI behaviors. Results revealed that each of 63 ORI behaviors was experienced by 3-78% of respondents in three different samples. Factor analysis revealed four types of ORI behavior: pursuit, violation, threat, and hyper-intimacy. Responses for coping with ORI consisted of interaction, protection, retaliation, and evasion. Virtually all intrusive behaviors were perceived to be annoying. Some types of ORI behaviors were perceived to be relatively more threatening, upsetting and privacy-invading than others. Although sex differences were not observed for the incidence of ORI or coping, women consistently perceived ORI behaviors to be more annoying, upsetting, threatening, and privacy-invading than did men.

  9. AdaBoost-based algorithm for network intrusion detection.

    PubMed

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  10. Using Unix system auditing for detecting network intrusions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators knowmore » what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.« less

  11. Highly differentiated magmas linked with polymetallic mineralization: A case study from the Cuihongshan granitic intrusions, Lesser Xing'an Range, NE China

    NASA Astrophysics Data System (ADS)

    Fei, Xianghui; Zhang, Zhaochong; Cheng, Zhiguo; Santosh, M.; Jin, Ziliang; Wen, Bingbing; Li, Zixi; Xu, Lijuan

    2018-03-01

    The genetic link between granitoids and polymetallic skarn mineralization has remained equivocal. The Cuihongshan skarn-porphyry W-Mo-Pb-Zn-(Fe-Cu) deposit in the eastern part of the Central Asian Orogenic Belt provides a unique example to address this issue. The major rock types in the mine area are Early Paleozoic intrusions composed of biotite syenogranite and biotite porphyritic granite and Early Mesozoic intrusions represented by porphyritic quartz monzonite, biotite monzogranite, and porphyritic granite. The diagnostic mineralogical and geochemical features indicate that the rocks belong to A2-type granites. The Early Paleozoic suite shows zircon U-Pb ages of 501 Ma, and εHf(t) values of - 4.4 to + 2.7 and + 2.4 to + 7.6, respectively. In combination with their coherent geochemical trends, these rocks are inferred to be products of in-situ differentiation. Although the Mesozoic suite shows crystallization ages of 194-196 Ma, εHf(t) values are in the range of - 2.5 to + 7.5 for the porphyritic quartz monzonite, the - 1.8 to + 4.5 values for the monzogranite and the + 2.3 to + 8.0 range for the porphyritic granite. The porphyritic quartz monzonite displays distinct mineral assemblage and shows significant compositional gap with the other two lithofacies. In contrast, the monzogranite and porphyritic granite have similar geochemical features, and are thus inferred to be co-magmatic. Considering the high SiO2 contents, variable εHf(t) (- 4.4 to + 8.0) and εNd(t) values (- 8.4 to + 0.28) for the two suites, we infer that both episodes of granitoid magmatism resulted from partial melting of crustal materials with a mixed source containing varying proportions of juvenile and Precambrian crustal components. The Early Mesozoic porphyritic granite shows a highly evolved F-rich geochemical affinity, and experienced magma-fluid interaction. Cassiterite from the calcic skarn and the magnesian skarn that coexists with magnetite orebodies shows a mean U-Pb age of 195

  12. Anthropometric Accommodation in Space Suit Design

    NASA Technical Reports Server (NTRS)

    Rajulu, Sudhakar; Thaxton, Sherry

    2007-01-01

    Design requirements for next generation hardware are in process at NASA. Anthropometry requirements are given in terms of minimum and maximum sizes for critical dimensions that hardware must accommodate. These dimensions drive vehicle design and suit design, and implicitly have an effect on crew selection and participation. At this stage in the process, stakeholders such as cockpit and suit designers were asked to provide lists of dimensions that will be critical for their design. In addition, they were asked to provide technically feasible minimum and maximum ranges for these dimensions. Using an adjusted 1988 Anthropometric Survey of U.S. Army (ANSUR) database to represent a future astronaut population, the accommodation ranges provided by the suit critical dimensions were calculated. This project involved participation from the Anthropometry and Biomechanics facility (ABF) as well as suit designers, with suit designers providing expertise about feasible hardware dimensions and the ABF providing accommodation analysis. The initial analysis provided the suit design team with the accommodation levels associated with the critical dimensions provided early in the study. Additional outcomes will include a comparison of principal components analysis as an alternate method for anthropometric analysis.

  13. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability

    PubMed Central

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A.

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals. PMID:25814962

  14. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    PubMed

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  15. Climate variability modulates western US ozone air quality in spring via deep stratospheric intrusions

    PubMed Central

    Lin, Meiyun; Fiore, Arlene M.; Horowitz, Larry W.; Langford, Andrew O.; Oltmans, Samuel J.; Tarasick, David; Rieder, Harald E.

    2015-01-01

    Evidence suggests deep stratospheric intrusions can elevate western US surface ozone to unhealthy levels during spring. These intrusions can be classified as ‘exceptional events', which are not counted towards non-attainment determinations. Understanding the factors driving the year-to-year variability of these intrusions is thus relevant for effective implementation of the US ozone air quality standard. Here we use observations and model simulations to link these events to modes of climate variability. We show more frequent late spring stratospheric intrusions when the polar jet meanders towards the western United States, such as occurs following strong La Niña winters (Niño3.4<−1.0 °C). While El Niño leads to enhancements of upper tropospheric ozone, we find this influence does not reach surface air. Fewer and weaker intrusion events follow in the two springs after the 1991 volcanic eruption of Mt. Pinatubo. The linkage between La Niña and western US stratospheric intrusions can be exploited to provide a few months of lead time during which preparations could be made to deploy targeted measurements aimed at identifying these exceptional events. PMID:25964012

  16. Fronts and intrusions in the upper Deep Polar Water of the Eurasian and Makarov basins

    NASA Astrophysics Data System (ADS)

    Kuzmina, Natalia; Rudels, Bert; Zhurbas, Natalia; Lyzhkov, Dmitry

    2013-04-01

    CTD data obtained in the Arctic Basin are analyzed to describe structural features of intrusive layers and fronts encountered in the upper Deep Polar Water. This work is an extension of Arctic intrusions studies by Rudels et al. (1999) and Kuzmina et al. (2011). Numerous examples of fronts and intrusions observed in a deep layer (depth range of 600-1300 m) in the Eurasian and Makarov basins where salinity is increasing, and temperature is decreasing with depth (stable-stable thermohaline stratification), are described. The data are used to estimate hydrological parameters capable of determining different types of fronts and characterizing intrusive layers depending on the front structure. Coherence of intrusive layers is shown to get broken with the change of front structure. An evidence is found that enhanced turbulent mixing above local bottom elevations can prevent from intrusive layering. A linear stability model description of the observed intrusions is developed based on the Merryfield's (2000) assumption that interleaving is caused by differential mixing. Theoretical analysis is focused on prediction of the slopes of unstable modes at baroclinic and thermohaline fronts. Apparent vertical diffusivity due to turbulent mixing at baroclinic and thermohaline fronts is estimated on the basis of comparison of observed intrusion slopes with modeled slopes of the most unstable modes. Apparent lateral diffusivity is estimated too, based on Joyce (1980) approach. These estimates show that intrusive instability of fronts caused by differential mixing can result in sizable values of apparent lateral heat diffusivity in the deep Arctic layer that are quite comparable with those of the upper and intermediate Arctic layers (Walsh, Carmack, 2003; Kuzmina et al., 2011).

  17. The impact of dissociation on perceptual priming and intrusions after listening to auditory narratives.

    PubMed

    Dorahy, Martin J; Peck, Rowan K; Huntjens, Rafaele J C

    2016-01-01

    This study investigates the causal role of dissociation in intrusive memory development and possible underlying aberrant memory processes (e.g., increased perceptual priming). Using an audio-only adaption of the trauma film paradigm, we divided 60 participants into 3 conditions and presented them with different visual tasks-mirror staring, dot staring, or neutral images. The former 2 conditions were hypothesized to induce dissociation. Postaudio, a number of factors were assessed, including state dissociation, perceptual priming and conceptual priming, as well as intrusions over 3 days. Participants in the dissociation conditions displayed an increase in perceptual priming compared to those in the control condition and reported more distressing intrusions. No differences were found in conceptual priming and the overall number of intrusions between conditions. Findings contribute to the growing knowledge on the impact of dissociation and cognitive processing in the etiology of posttraumatic stress disorder intrusions.

  18. Comparison of intrusion effects on maxillary incisors among mini implant anchorage, j-hook headgear and utility arch.

    PubMed

    Jain, Ravindra Kumar; Kumar, Sridhar Prem; Manjula, W S

    2014-07-01

    Intrusion of maxillary incisors is one of the most important and difficult tooth movements to achieve as a part of orthodontic therapy. A variety of techniques were used in the past to intrude the maxillary incisors before the emergence of mini implants in Orthodontics. Mini implants are temporary anchorage devices used to produce various tooth movements. The research was carried out to evaluate and compare the efficiency of producing intrusion of maxillary incisors using mini implants, utility arch and j- hook headgear. The study was conducted on 30 subjects divided into 3 Groups equally. Group 1- mini implant anchorage, Group 2 - j- hooks headgear and Group 3- utility arch were used for intrusion of the maxillary incisors. Conventional lateral cephalograms were taken before treatment and at the end of intrusion. Five cephalometric parameters were used to measure the amount of intrusion attained in each Group. Intra Group comparisons were done using student t-test and inter Group comparisons were done using ANOVA The duration of intrusion was four months in all the three Groups. In Group 1 the mean average intrusion attained was 2.1 mm, the mean average intrusion attained in Group 2 was 0.7 mm, and the mean average intrusion achieved in Group 3 was 1.4 mm with a side effect of 0.75 mm of molar extrusion. Although, both mini implants and utility arch can be used to attain significant amounts of incisor intrusion but using mini implants will produce true intrusion without any other side effects.

  19. Geochemistry and field geology of shoshonitic magmas in the Late Cretaceous foreland fold and thrust belt of southwestern Montana: Results from the North Doherty Mountain Intrusive Complex

    NASA Astrophysics Data System (ADS)

    Beranek, L. P.; Burton, B. R.; Ihinger, P. D.

    2002-12-01

    The North Doherty Mountain Intrusive Complex (NDMIC) is one of several satellite plutons related to the areally extensive Boulder batholith of southwestern Montana. The Boulder batholith comprises multiple plutons and intrusive phases, and the magmatism has long been thought to be the result of subduction due to its calc-alkaline granodioritic composition. The batholith is situated in the Helena salient, which differs from other parts of the North American Cordilleran foreland because there, magmatism spatially and temporally overlaps with deformation in the foreland fold and thrust belt. The North Doherty Mountain Intrusive Complex (NDMIC) is one of several satellite plutons related to the Boulder batholith and represents an ideal microcosm of the batholith for petrogenetic and structural studies because it exposes both mafic and felsic units and was emplaced in the limb of a major thrust related fold. We present new geologic mapping and detailed trace element geochemical analyses to show that the entire mafic-to-felsic suite of rocks in the NDMIC are cogenetic and shoshonitic in character. Shoshonites are unusual magmas that are distinguished by their high concentrations of K, Rb, Sr, Ba, Zr, and Th contents, and are thought to represent partial melting at great depths within the mantle wedge above a subducting slab. The presence of shoshonitic magma in the Cordilleran foreland fold and thrust belt provides important clues into the nature of the formation of this unusual magma type and can provide insights into our understanding of magmatism in foreland structural settings.

  20. Water intrusion in thin-skinned composite honeycomb sandwich structures

    NASA Technical Reports Server (NTRS)

    Jackson, Wade C.; O'Brien, T. Kevin

    1988-01-01

    Thin-skinned composite honeycomb sandwich structures from the trailing edge of the U.S. Army's Apache and Chinook helicopters have been tested to ascertain their susceptibility to water intrusion as well as such intrusions' effects on impact damage and cyclic loading. Minimum-impact and fatigue conditions were determined which would create microcracks sufficiently large to allow the passage of water through the skins; damage sufficient for this to occur was for some skins undetectable under a 40X-magnification optical microscope. Flow rate was a function of moisture content, damage, applied strain, and pressure differences.

  1. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  2. Platinum-group element geochemistry used to determine Cu and Au fertility in the Northparkes igneous suites, New South Wales, Australia

    NASA Astrophysics Data System (ADS)

    Hao, Hongda; Campbell, Ian H.; Park, Jung-Woo; Cooke, David R.

    2017-11-01

    Recent studies have shown that platinum-group elements (PGE) can be used to constrain the timing of sulfide saturation in evolving felsic systems. In this study, we report trace-element, PGE, Re and Au data for the barren and ore-associated suites of intermediate to felsic rocks from the Northparkes Cu-Au porphyry region, emphasizing the timing of sulfide saturation and its influence on the tenor of the associated hydrothermal mineralization. Two barren suites, the Goonumbla and Wombin Volcanics and associate intrusive rocks, are found in the region. Geochemical modelling shows that the barren suites are dominated by plagioclase-pyroxene fractionation, whereas the ore-associated Northparkes Cu-Au porphyry suite is characterized by plagioclase-amphibole fractionation, which requires the ore-bearing suite to have crystallized from a wetter magma than barren suites. The concentrations of PGE, Re and Au in the barren suites decrease continuously during fractional crystallization. This is attributed to early sulfide saturation with the fraction of immiscible sulfide precipitation required to produce the observed trend, being 0.13 and 0.16 wt.% for the Goonumbla and Wombin suites, respectively. The calculated partition coefficients for Au and Pd required to model the observed change in these elements with MgO are well below published values, indicating that R, the mass ratio of silicate to sulfide melt, played a significant role in controlling the rate of decline of these elements with fractionation. Palladium in the ore-associated suite, in contrast, first increases with fractionation then decreases abruptly at 1.2 wt.% MgO. The sharp decrease is attributed to the onset of sulfide precipitation. Platinum on the other hand shows a moderate decrease, starting from the highest MgO sample analysed, but then decreasing strongly from 1.2 wt.% MgO. The initial Pt decrease is attributed to precipitation of a platinum-group mineral (PGM), probably a Pt-Fe alloy, and the sharp

  3. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    NASA Astrophysics Data System (ADS)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  4. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  5. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  6. Development and Application of a Three-Dimensional Finite Element Vapor Intrusion Model

    PubMed Central

    Pennell, Kelly G.; Bozkurt, Ozgur; Suuberg, Eric M.

    2010-01-01

    Details of a three-dimensional finite element model of soil vapor intrusion, including the overall modeling process and the stepwise approach, are provided. The model is a quantitative modeling tool that can help guide vapor intrusion characterization efforts. It solves the soil gas continuity equation coupled with the chemical transport equation, allowing for both advective and diffusive transport. Three-dimensional pressure, velocity, and chemical concentration fields are produced from the model. Results from simulations involving common site features, such as impervious surfaces, porous foundation sub-base material, and adjacent structures are summarized herein. The results suggest that site-specific features are important to consider when characterizing vapor intrusion risks. More importantly, the results suggest that soil gas or subslab gas samples taken without proper regard for particular site features may not be suitable for evaluating vapor intrusion risks; rather, careful attention needs to be given to the many factors that affect chemical transport into and around buildings. PMID:19418819

  7. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    NASA Astrophysics Data System (ADS)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  8. Mechanical response of the south flank of kilauea volcano, hawaii, to intrusive events along the rift systems

    USGS Publications Warehouse

    Dvorak, J.J.; Okamura, A.T.; English, T.T.; Koyanagi, R.Y.; Nakata, J.S.; Sako, M.K.; Tanigawa, W.T.; Yamashita, K.M.

    1986-01-01

    Increased earthquake activity and compression of the south flank of Kilauea volcano, Hawaii, have been recognized by previous investigators to accompany rift intrusions. We further detail the temporal and spatial changes in earthquake rates and ground strain along the south flank induced by six major rift intrusions which occurred between December 1971 and January 1981. The seismic response of the south flank to individual rift intrusions is immediate; the increased rate of earthquake activity lasts from 1 to 4 weeks. Horizontal strain measurements indicate that compression of the south flank usually accompanies rift intrusions and eruptions. Emplacement of an intrusion at a depth greater than about 4 km, such as the June 1982 southwest rift intrusion, however, results in a slight extension of the subaerial portion of the south flank. Horizontal strain measurements along the south flank are used to locate the January 1983 east-rift intrusion, which resulted in eruptive activity. The intrusion is modeled as a vertical rectangular sheet with constant displacement perpendicular to the plane of the sheet. This model suggests that the intrusive body that compressed the south flank in January 1983 extended from the surface to about 2.4 km depth, and was aligned along a strike of N66??E. The intrusion is approximately 11 km in length, extended beyond the January 1983 eruptive fissures, which are 8 km in length and is contained within the 14-km-long region of shallow rift earthquakes. ?? 1986.

  9. Mellin Transform-Based Correction Method for Linear Scale Inconsistency of Intrusion Events Identification in OFPS

    NASA Astrophysics Data System (ADS)

    Wang, Baocheng; Qu, Dandan; Tian, Qing; Pang, Liping

    2018-05-01

    For the problem that the linear scale of intrusion signals in the optical fiber pre-warning system (OFPS) is inconsistent, this paper presents a method to correct the scale. Firstly, the intrusion signals are intercepted, and an aggregate of the segments with equal length is obtained. Then, the Mellin transform (MT) is applied to convert them into the same scale. The spectral characteristics are obtained by the Fourier transform. Finally, we adopt back-propagation (BP) neural network to identify intrusion types, which takes the spectral characteristics as input. We carried out the field experiments and collected the optical fiber intrusion signals which contain the picking signal, shoveling signal, and running signal. The experimental results show that the proposed algorithm can effectively improve the recognition accuracy of the intrusion signals.

  10. Advanced Crew Escape Suit.

    PubMed

    1995-09-01

    Design of the S1032 Launch Entry Suit (LES) began following the Challenger loss and NASA's decision to incorporate a Shuttle crew escape system. The LES (see Figure 1) has successfully supported Shuttle missions since NASA's Return to Flight with STS-26 in September 1988. In 1990, engineers began developing the S1035 Advanced Crew Escape Suit (ACES) to serve as a replacement for the LES. The ACES was designed to be a simplified, lightweight, low-bulk pressure suit which aided self donning/doffing, provided improved comfort, and enhanced overall performance to reduce crew member stress and fatigue. Favorable crew member evaluations of a prototype led to full-scale development and qualification of the S1035 ACES between 1990 and 1992. Production of the S1035 ACES began in February 1993, with the first unit delivered to NASA in May 1994. The S1035 ACES first flew aboard STS-68 in August 1994 and will become the primary crew escape suit when the S1032 LES ends its service life in late 1995. The primary goal of the S1035 development program was to provide improved performance over that of the S1032 to minimize the stress and fatigue typically experienced by crew members. To achieve this, five fundamental design objectives were established, resulting in various material/configuration changes.

  11. Springtime high surface ozone events over the western United States: Quantifying the role of stratospheric intrusions

    NASA Astrophysics Data System (ADS)

    Fiore, A. M.; Lin, M.; Cooper, O. R.; Horowitz, L. W.; Naik, V.; Levy, H.; Langford, A. O.; Johnson, B. J.; Oltmans, S. J.; Senff, C. J.

    2011-12-01

    As the National Ambient Air Quality (NAAQS) standard for ozone (O_{3}) is lowered, it pushes closer to policy-relevant background levels (O_{3} concentrations that would exist in the absence of North American anthropogenic emissions), making attainment more difficult with local controls. We quantify the Asian and stratospheric components of this North American background, with a primary focus on the western United States. Prior work has identified this region as a hotspot for deep stratospheric intrusions in spring. We conduct global simulations at 200 km and 50 km horizontal resolution with the GFDL AM3 model, including a stratospheric O_{3} tracer and two sensitivity simulations with anthropogenic emissions from Asia and North America turned off. The model is evaluated with a suite of in situ and satellite measurements during the NOAA CalNex campaign (May-June 2010). The model reproduces the principle features in the observed surface to near tropopause distribution of O_{3} along the California coast, including its latitudinal variation and the development of regional high-O_{3} episodes. Four deep tropopause folds are diagnosed and we find that the remnants of these stratospheric intrusions are transported to the surface of Southern California and Western U.S. Rocky Mountains, contributing 10-30 ppbv positive anomalies relative to the simulated campaign mean stratospheric component in the model surface layer. We further examine the contribution of North American background, including its stratospheric and Asian components, to the entire distribution of observed MDA8 O_{3} at 12 high-elevation CASTNet sites in the Mountain West. We find that the stratospheric O_{3} tracer constitutes 50% of the North American background, and can enhance surface maximum daily 8-hour average (MDA8) O_{3} by 20 ppb when observed surface O_{3} is in the range of 60-80 ppbv. Our analysis highlights the potential for natural sources such as deep stratospheric intrusions to contribute

  12. Les intrusions de Wirgane (Haut Atlas occidental, Maroc): témoins d'un magmatisme syn- à tardi-cinématique hercynien? (Intrusions of Wirgane [western High Atlas, Morocco]: evidence for a syn- to late kinematic magmatism of Variscan age?)

    NASA Astrophysics Data System (ADS)

    Eddif, A.; Gasquet, D.; Hoepffner, C.; Ayad, N. Ait

    2000-11-01

    The Wirgane intrusives were emplaced into the Late Neoproterozoic to Palæozoic series of the northeast of the Moroccan western High Atlas. The intrusions exhibit a large compositional range from monzogabbro to granite, and they have suffered, together with the country rocks, part of the Variscan tectonic evolution. In the immediate vicinity of the intrusions, thermal metamorphism developed in the country rocks. According to the mineral chemistry of igneous amphibole compositions of diorites and metamorphic minerals, the depth of intrusives was estimated to be less than 11 km. Strain patterns, mapped in both the plutons and the country rocks, and microtectonic data indicate that the intrusions were emplaced in a dextral transcurrent shearing context during the Variscan Orogen. When compared with other intrusions of the western High Atlas (Tichka, Azegour), the Wirgane intrusives are considered to be related to the late stages of the Variscan Belt of Morocco.

  13. Intrusive Thoughts and Young Children's Knowledge about Thinking following a Natural Disaster

    ERIC Educational Resources Information Center

    Sprung, Manuel; Harris, Paul L.

    2010-01-01

    Background: "Hurricane Katrina" devastated the Mississippi Gulf Coast in August 2005. Intrusive re-experiencing is a common posttraumatic stress symptom. However, young children with limited introspection skills might have difficulties identifying their intrusive thoughts. Method: A sample of 165 5- to 9-year-old children were surveyed about their…

  14. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    PubMed Central

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field with scanning electron microscopy coupled to energy dispersive X-ray spectroscopy, chromatographic and spectrophotometric methods, and stable isotope tracing coupled with a mass balance of sulfur compounds. We found that Z. marina detoxified gaseous sediment-derived sulfide through incorporation and that most of the detoxification occurred in underground tissues, where sulfide intrusion was greatest. Elemental sulfur was a major detoxification compound, precipitating on the inner wall of the aerenchyma of underground tissues. Sulfide was metabolized into thiols and entered the plant sulfur metabolism as well as being stored as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments. PMID:26030258

  15. Lithospheric delamination in post-collisional setting: Evidence from intrusive magmatism from the North Qilian orogen to southern margin of the Alxa block, NW China

    NASA Astrophysics Data System (ADS)

    Zhang, Liqi; Zhang, Hongfei; Zhang, Shasha; Xiong, Ziliang; Luo, Biji; Yang, He; Pan, Fabin; Zhou, Xiaochun; Xu, Wangchun; Guo, Liang

    2017-09-01

    Post-collisional granitoids are widespread in the North Qilian and southern margin of the Alxa block and their petrogenesis can provide important insights into the lithospheric processes in a post-collisional setting. This paper carries out an integrated study of U-Pb zircon dating, geochemical and Sr-Nd-Hf isotopic compositions for five early Paleozoic intrusive plutons from the North Qilian to southern margin of the Alxa block. The geochronological and geochemical results show that their magmatism can be divided into three periods with distinct geochemical features. The early-period intrusive rocks ( 440 Ma) include the Lianhuashan (LHS) and Mengjiadawan (MJDW) granodiorites. Both of them display high Sr/Y ratios (52-91), coupled with low Y and HREE contents, implying that they were derived from partial melting of thickened lower crust, with garnet in the residue. The middle-period intrusive rocks ( 430 Ma), including the MJDW quartz diorites and Yangqiandashan (YQDS) granodiorites, are high-K calc-alkaline with low Sr/Y values. The geochemical and isotopic data suggest that they are generated from partial melting of lower crust without garnet in the residue. The late-period intrusive rocks (414-422 Ma), represented by the Shengrongsi (SRS) and Xinkaigou (XKG) plutons, are A-type or alkali-feldspar granites. They are possibly derived from partial melting of felsic crustal material under lower pressure condition. Our data show decreasing magma crystallization ages from MJDW pluton in the north and LHS pluton in the south to the SRS and XKG plutons in the central part of the study area. We suggest that such spatial and temporal variations of magmatic suites were caused by lithospheric delamination after the collision between the Central Qilian and the Alxa block. A more plausible explanation is that the delamination propagated from the margin part of the thickened lithosphere to inward beneath the North Qilian and southern margin of the Alxa block.

  16. Navigation/Prop Software Suite

    NASA Technical Reports Server (NTRS)

    Bruchmiller, Tomas; Tran, Sanh; Lee, Mathew; Bucker, Scott; Bupane, Catherine; Bennett, Charles; Cantu, Sergio; Kwong, Ping; Propst, Carolyn

    2012-01-01

    Navigation (Nav)/Prop software is used to support shuttle mission analysis, production, and some operations tasks. The Nav/Prop suite containing configuration items (CIs) resides on IPS/Linux workstations. It features lifecycle documents, and data files used for shuttle navigation and propellant analysis for all flight segments. This suite also includes trajectory server, archive server, and RAT software residing on MCC/Linux workstations. Navigation/Prop represents tool versions established during or after IPS Equipment Rehost-3 or after the MCC Rehost.

  17. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    PubMed

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency During Early Childhood

    PubMed Central

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2012-01-01

    Longitudinal relations among ego-resiliency, effortful control, and observed intrusive parenting were examined at 18, 30, and 42 months of age (Ns = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted effortful control a year later, over and above earlier levels. Effortful control at 30 months mediated the negative relation between 18-month intrusive parenting and ego-resiliency at 42 months when controlling for stability of the variables. Ego-resiliency did not predict effortful control. The findings suggest that intrusive parenting may have a negative effect on children’s personality resiliency through its effects on the abilities to regulate attention and behavior. PMID:23379965

  19. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    NASA Astrophysics Data System (ADS)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  20. Effective use of surface-water management to control saltwater intrusion

    NASA Astrophysics Data System (ADS)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  1. Interactive Modelling of Salinity Intrusion in the Rhine-Meuse Delta

    NASA Astrophysics Data System (ADS)

    Baart, F.; Kranenburg, W.; Luijendijk, A.

    2015-12-01

    In many delta's of the world salinity intrusion imposes limits to fresh water availability. With increasing population and industry, the need for fresh water increases. But also salinity intrusion is expected to increase due to changes in river discharge, sea level and storm characteristics. In the Rhine-Meuse delta salt intrusion is impacted by human activities as well, like deepening of waterways and opening of delta-branches closed earlier. All these developments call for increasing the understanding of the system, but also for means for policy makers, coastal planners and engineers to assess effects of changes and to explore and design measures. In our presentation we present the developments in interactive modelling of salinity intrusion in the Rhine-Meuse delta. In traditional process-based numerical modelling, impacts are investigated by researchers and engineers by following the steps of pre-defining scenario's, running the model and post-processing the results. Interactive modelling lets users adjust simulations while running. Users can for instance change river discharges or bed levels, and can add measures like changes to geometry. The model will take the adjustments into account immediately, and will directly compute the effect. In this way, a tool becomes available with which coastal planners, policy makers and engineers together can develop and evaluate ideas and designs by interacting with the numerical model. When developing interactive numerical engines, one of the challenges is to optimize the exchange of variables as e.g. salt concentration. In our case we exchange variables on a 3D grid every time step. For this, the numerical model adheres to the Basic Model Interface (http://csdms.colorado.edu/wiki), which allows external control and the exchange of variables through pointers while the model is running. In our presentation we further explain our method and show examples of interactive design of salinity intrusion measures in the Rhine

  2. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    PubMed

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  3. The petrogenesis of late Neoproterozoic mafic dyke-like intrusion in south Sinai, Egypt

    NASA Astrophysics Data System (ADS)

    Azer, M. K.; Abu El-Ela, F. F.; Ren, M.

    2012-08-01

    New field, petrographical and geochemical studies are presented here for the late Neoproterozoic Rimm intrusion (˜15 km long) exposed in the southern Sinai Peninsula, Egypt in the northernmost Arabian-Nubian Shield (ANS). Field relations indicate that the Rimm intrusion is younger than the surrounding metamorphic rocks and calc-alkaline syn-tectonic granodiorite and it was not affected by regional metamorphism. The anorogenic peralkaline granite of Gebel Serbal crosscuts the Rimm intrusion. The Rimm intrusion is made up of several consanguineous rock types with gradational contacts. It is composed chiefly of pyroxene-hornblende gabbro, hornblende gabbro and minor quartz diorite. The chemical composition of the mafic minerals indicated that the studied rocks derived from calc-alkaline mafic magma. Geochemically, the studied rocks are characterized by enrichment in LILE relative to HFSE and LREE relative to HREE [(Ce/Yb)N = 4.50-6.36]. Quartz diorite display slightly concave HREE pattern and slightly negative Eu-anomaly [(Eu/Eu*)n = 0.91] which may be the result of fractionation of amphibole and plagioclase from the source melt, respectively. The Rimm intrusion evolved from mafic mantle magma into different type rocks by fractional crystallization with minor crustal contamination. The initial magma corresponds to pyroxene-hornblende gabbro and the crystallization of hornblende was caused by slight H2O increase in magma after crystallization of near-liquidus clinopyroxene and Ca-rich plagioclase. Amphiboles geobarometer indicate that the gabbroic rocks of the Rimm intrusion crystallized at pressures between 4.8 and 6.4 Kb, while quartz diorite crystallized at 1.3-2.1 Kb. Crystallization temperatures range between 800 and 926 °C for the gabbros and between 667 and 784 °C for the quartz diorite. The Rimm intrusion represents a post-orogenic phase formed during the crustal thinning and extension of the Arabian-Nubian Shield.

  4. Beta-blockers may reduce intrusive thoughts in newly diagnosed cancer patients.

    PubMed

    Lindgren, Monica E; Fagundes, Christopher P; Alfano, Catherine M; Povoski, Stephen P; Agnese, Doreen M; Arnold, Mark W; Farrar, William B; Yee, Lisa D; Carson, William E; Schmidt, Carl R; Kiecolt-Glaser, Janice K

    2013-08-01

    A cancer diagnosis provokes significant levels of emotional distress, with intrusive thoughts being the most common manifestation among breast cancer survivors. Cancer-related intrusive thoughts can take the form of emotional memories, flashbacks, nightmares, and intrusive images. Emotional arousal after a severe life stressor prolongs adrenergic activation, which in turn may increase risk for post-traumatic symptomatology. However, antihypertensive beta-blockers block adrenergic activation and are known to reduce traumatic memories and related psychological distress. Thus, the current study examined the association between beta-blocker use and the severity of cancer-related intrusive thoughts and related symptoms following a cancer diagnosis. The 174 breast and 36 female colorectal cancer patients who had recently undergone diagnostic screening or biopsy included 39 beta-blocker users and 171 non-users. Prior to any cancer treatment including surgery, participants completed questionnaires that included the Impact of Events Scale and the Center for Epidemiological Studies Depression Scale. Analyses controlled for age, education, cancer stage, cancer type, days since diagnosis, marital status, depression, and comorbidities. Although the high rates of cancer-related distress in this sample were similar to those of other studies with recently diagnosed patients, beta-blocker users endorsed 32% fewer cancer-related intrusive thoughts than non-users. Recently diagnosed cancer patients using beta-blockers reported less cancer-related psychological distress. These results suggest that beta-blocker use may benefit cancer patients' psychological adjustment following diagnosis, and provide a promising direction for future investigations on the pharmacological benefits of beta-blockers for cancer-related distress. Copyright © 2012 John Wiley & Sons, Ltd.

  5. Beta-blockers May Reduce Intrusive Thoughts in Newly Diagnosed Cancer Patients

    PubMed Central

    Lindgren, Monica E.; Fagundes, Christopher P.; Alfano, Catherine M.; Povoski, Stephen P.; Agnese, Doreen M.; Arnold, Mark W.; Farrar, William B.; Yee, Lisa D.; Carson, William E.; Schmidt, Carl R.; Kiecolt-Glaser, Janice K.

    2012-01-01

    Objective A cancer diagnosis provokes significant levels of emotional distress, with intrusive thoughts being the most common manifestation among breast cancer survivors. Cancer-related intrusive thoughts can take the form of emotional memories, flashbacks, nightmares, and intrusive images. Emotional arousal after a severe life stressor prolongs adrenergic activation, which in turn may increase risk for posttraumatic symptomatology. However, antihypertensive beta-blockers block adrenergic activation and are known to reduce traumatic memories and related psychological distress. Thus, the current study examined the association between beta-blocker use and the severity of cancer-related intrusive thoughts and related symptoms following a cancer diagnosis. Methods The 174 breast and 36 female colorectal cancer patients who had recently undergone diagnostic screening or biopsy included 39 beta-blocker users and 171 non-users. Prior to any cancer treatment including surgery, participants completed questionnaires that included the Impact of Events Scale (IES) and the Center for Epidemiological Studies Depression Scale (CES-D). Analyses controlled for age, education, cancer stage, cancer type, days since diagnosis, marital status, depression, and comorbidities. Results Although the high rates of cancer-related distress in this sample were similar to those of other studies with recently diagnosed patients, beta-blocker users endorsed 32% fewer cancer-related intrusive thoughts than non-users. Conclusions Recently diagnosed cancer patients using beta-blockers reported less cancer-related psychological distress. These results suggest that beta-blocker use may benefit cancer patients’ psychological adjustment following diagnosis, and provide a promising direction for future investigations on the pharmacological benefits of beta-blockers for cancer-related distress. PMID:23255459

  6. Mental Imagery and Post-Traumatic Stress Disorder: A Neuroimaging and Experimental Psychopathology Approach to Intrusive Memories of Trauma

    PubMed Central

    Clark, Ian A.; Mackay, Clare E.

    2015-01-01

    This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of post-traumatic stress disorder (PTSD). However, key questions, including those involving etiology, remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma) memory, involuntary recall, negative emotions, attention hijacking, and mental imagery. Each component part is considered in turn, both behaviorally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory, and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them. PMID:26257660

  7. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    PubMed

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p < .01, but was unrelated to physiological responses to trauma reminder images (ps > .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  8. Intrusive [r] and Optimal Epenthetic Consonants

    ERIC Educational Resources Information Center

    Uffmann, Christian

    2007-01-01

    This paper argues against the view of intrusive [r] as a synchronically arbitrary insertion process. Instead, it is seen as a phonologically natural process, which can be modelled within the framework of Optimality Theory (OT). Insertion of [r] in phonologically restricted environments is a consequence of a more general theory of consonant…

  9. Mars EVA Suit Airlock (MESA)

    NASA Astrophysics Data System (ADS)

    Ransom, Stephen; Böttcher, Jörg; Steinsiek, Frank

    The Astrium Space Infrastructure Division has begun an in-house research activity of an Earth-based simulation facility supporting future manned missions to Mars. This research unit will help to prepare and support planned missions in the following ways: 1) to enable the investigation and analysis of contamination issues in advance of a human visit to Mars; 2) as a design tool to investigate and simulate crew operations; 3) to simulate crew operation during an actual mission; 4) to enable on-surface scientific operations without leaving the shirt-sleeve habitation environment ("glove box principle"). The MESA module is a surface EVA facility attached to the main habitation or laboratory module, or mobile pressurized rover. It will be sealed, but not pressurized, and provide protection against the harsh Martian environment. This module will include a second crew airlock for safety reasons. The compartment can also be used to provide an external working bench and experiment area for the crew. A simpler MESA concept provides only an open shelter against wind and dust. This concept does not incorporate working and experimental areas. The principle idea behind the MESA concept is to tackle the issue of contamination by minimizing the decontamination processes needed to clean surface equipment and crew suit surfaces after an EVA excursion prior to the astronaut re-entering the habitable area. The technical solution envisages the use of a dedicated crew suit airlock. This airlock uses an EVA suit which is externally attached by its back-pack to the EVA compartment area facing the Martian environment. The crew donns the suit from inside the habitable volume through the airlock on the back of the suit. The surface EVA can be accomplished after closing the back-pack and detaching the suit. A special technical design concept foresees an extendable suit back-pack, so that the astronaut can operate outside and in the vincinity of the module. The key driver in the investigation

  10. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT.

    PubMed

    Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime

    2017-08-26

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.

  11. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT

    PubMed Central

    Carro, Belen; Sanchez-Esguevillas, Antonio

    2017-01-01

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host’s network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery. PMID:28846608

  12. Paleozoic intrusive rocks from the Dunhuang tectonic belt, NW China: Constraints on the tectonic evolution of the southernmost Central Asian Orogenic Belt

    NASA Astrophysics Data System (ADS)

    Zhao, Yan; Sun, Yong; Diwu, Chunrong; Zhu, Tao; Ao, Wenhao; Zhang, Hong; Yan, Jianghao

    2017-05-01

    The Dunhuang tectonic belt (DTB) is of great importance for understanding the tectonic evolution of the southernmost Central Asian Orogenic Belt (CAOB). In this study, the temporal-spatial distribution, petrogenesis and tectonic setting of the Paleozoic representative intrusive rocks from the DTB were systematically investigated to discuss crustal evolution history and tectonic regime of the DTB during Paleozoic. Our results reveal that the Paleozoic magmatism within the DTB can be broadly divided into two distinct episodes of early Paleozoic and late Paleozoic. The early Paleozoic intrusive rocks, represented by a suite metaluminous-slight peraluminous and medium- to high-K calc-alkaline I-type granitoids crystallized at Silurian (ca. 430-410 Ma), are predominantly distributed along the northern part of the DTB. They were probably produced with mineral assemblage of eclogite or garnet + amphibole + rutile in the residue, and were derived from magma mixing source of depleted mantle materials with various proportions of Archean-Mesoproterozoic continental crust. The late Paleozoic intrusive rocks can be further subdivided into two stages of late Devonian stage (ca. 370-360 Ma) and middle Carboniferous stage (ca. 335-315 Ma). The former stage is predominated by metaluminous to slight peraluminous and low-K tholeiite to high-K calc-alkaline I-type granitic rocks distributed in the central part of the DTB. They were also generated with mineral assemblage of amphibolite- to eclogite-facies in the residue, and originated from magma source of depleted mantle materials mixed with different degrees of old continental crust. The later stage is represented by adakite and alkali-rich granite exposed in the southern part of the DTB. The alkali-rich granites studied in this paper were possibly produced with mineral assemblage of granulite-facies in the residue and were generated by partial melting of thickened lower continental crust. Zircon Hf isotopes and field distribution of

  13. Space Suit Spins

    NASA Technical Reports Server (NTRS)

    2005-01-01

    Space is a hostile environment where astronauts combat extreme temperatures, dangerous radiation, and a near-breathless vacuum. Life support in these unforgiving circumstances is crucial and complex, and failure is not an option for the devices meant to keep astronauts safe in an environment that presents constant opposition. A space suit must meet stringent requirements for life support. The suit has to be made of durable material to withstand the impact of space debris and protect against radiation. It must provide essential oxygen, pressure, heating, and cooling while retaining mobility and dexterity. It is not a simple article of clothing but rather a complex modern armor that the space explorers must don if they are to continue exploring the heavens

  14. Testing the differential effects of acceptance and attention-based psychological interventions on intrusive thoughts and worry.

    PubMed

    Ainsworth, B; Bolderston, H; Garner, M

    2017-04-01

    Worry is a key component of anxiety and may be an effective target for therapeutic intervention. We compared two psychological processes (attention and acceptance) on the frequency of intrusive worrying thoughts in an experimental worry task. 77 participants were randomised across three groups and completed either a 10 min attention or acceptance-based psychological exercise, or progressive muscle relaxation control. We subsequently measured anxiety, and the content and frequency of intrusive thoughts before and after a 'worry induction task'. Groups did not differ in baseline worry, anxiety or thought intrusions. Both attention and acceptance-based groups experienced fewer negative thought intrusions (post-worry) compared to the relaxation control group. The acceptance exercise had the largest effect, preventing 'worry induction'. Increases in negative intrusive thoughts predicted subjective anxiety. We provide evidence that acceptance and attention psychological exercises may reduce anxiety by reducing the negative thought intrusions that characterise worry. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  15. Enabling interoperability in Geoscience with GI-suite

    NASA Astrophysics Data System (ADS)

    Boldrini, Enrico; Papeschi, Fabrizio; Santoro, Mattia; Nativi, Stefano

    2015-04-01

    GI-suite is a brokering framework targeting interoperability of heterogeneous systems in the Geoscience domain. The framework is composed by different brokers each one focusing on a specific functionality: discovery, access and semantics (i.e. GI-cat, GI-axe, GI-sem). The brokering takes place between a set of heterogeneous publishing services and a set of heterogeneous consumer applications: the brokering target is represented by resources (e.g. coverages, features, or metadata information) required to seamlessly flow from the providers to the consumers. Different international and community standards are now supported by GI-suite, making possible the successful deployment of GI-suite in many international projects and initiatives (such as GEOSS, NSF BCube and several EU funded projects). As for the publisher side more than 40 standards and implementations are supported (e.g. Dublin Core, OAI-PMH, OGC W*S, Geonetwork, THREDDS Data Server, Hyrax Server, etc.). The support for each individual standard is provided by means of specific GI-suite components, called accessors. As for the consumer applications side more than 15 standards and implementations are supported (e.g. ESRI ArcGIS, Openlayers, OGC W*S, OAI-PMH clients, etc.). The support for each individual standard is provided by means of specific profiler components. The GI-suite can be used in different scenarios by different actors: - A data provider having a pre-existent data repository can deploy and configure GI-suite to broker it and making thus available its data resources through different protocols to many different users (e.g. for data discovery and/or data access) - A data consumer can use GI-suite to discover and/or access resources from a variety of publishing services that are already publishing data according to well-known standards. - A community can deploy and configure GI-suite to build a community (or project-specific) broker: GI-suite can broker a set of community related repositories and

  16. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.

    PubMed

    Ganapathy, S; Yogesh, P; Kannan, A

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  17. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    NASA Astrophysics Data System (ADS)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  18. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    PubMed Central

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  19. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    PubMed

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  20. Multi-User Low Intrusive Occupancy Detection

    PubMed Central

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  1. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth

    PubMed Central

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.

    2013-01-01

    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  2. An artificial bioindicator system for network intrusion detection.

    PubMed

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  3. The SAM Suite

    NASA Image and Video Library

    2013-04-08

    This illustration shows the instruments and subsystems of the Sample Analysis at Mars SAM suite on the Curiosity Rover of NASA Mars Science Laboratory Project. SAM analyzes the gases in the Martian atmosphere.

  4. Intrusion Detection System Visualization of Network Alerts

    DTIC Science & Technology

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  5. Parallel Regulation of Memory and Emotion Supports the Suppression of Intrusive Memories

    PubMed Central

    Anderson, Michael C.

    2017-01-01

    Intrusive memories often take the form of distressing images that emerge into a person's awareness, unbidden. A fundamental goal of clinical neuroscience is to understand the mechanisms allowing people to control these memory intrusions and reduce their emotional impact. Mnemonic control engages a right frontoparietal network that interrupts episodic retrieval by modulating hippocampal activity; less is known, however, about how this mechanism contributes to affect regulation. Here we report evidence in humans (males and females) that stopping episodic retrieval to suppress an unpleasant image triggers parallel inhibition of mnemonic and emotional content. Using fMRI, we found that regulation of both mnemonic and emotional content was driven by a shared frontoparietal inhibitory network and was predicted by a common profile of medial temporal lobe downregulation involving the anterior hippocampus and the amygdala. Critically, effective connectivity analysis confirmed that reduced amygdala activity was not merely an indirect consequence of hippocampal suppression; rather, both the hippocampus and the amygdala were targeted by a top-down inhibitory control signal originating from the dorsolateral prefrontal cortex. This negative coupling was greater when unwanted memories intruded into awareness and needed to be purged. Together, these findings support the broad principle that retrieval suppression is achieved by regulating hippocampal processes in tandem with domain-specific brain regions involved in reinstating specific content, in an activity-dependent fashion. SIGNIFICANCE STATEMENT Upsetting events sometimes trigger intrusive images that cause distress and that may contribute to psychiatric disorders. People often respond to intrusions by suppressing their retrieval, excluding them from awareness. Here we examined whether suppressing aversive images might also alter emotional responses to them, and the mechanisms underlying such changes. We found that the better

  6. Livermore Compiler Analysis Loop Suite

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hornung, R. D.

    2013-03-01

    LCALS is designed to evaluate compiler optimizations and performance of a variety of loop kernels and loop traversal software constructs. Some of the loop kernels are pulled directly from "Livermore Loops Coded in C", developed at LLNL (see item 11 below for details of earlier code versions). The older suites were used to evaluate floating-point performances of hardware platforms prior to porting larger application codes. The LCALS suite is geared toward assissing C++ compiler optimizations and platform performance related to SIMD vectorization, OpenMP threading, and advanced C++ language features. LCALS contains 20 of 24 loop kernels from the older Livermoremore » Loop suites, plus various others representative of loops found in current production appkication codes at LLNL. The latter loops emphasize more diverse loop constructs and data access patterns than the others, such as multi-dimensional difference stencils. The loops are included in a configurable framework, which allows control of compilation, loop sampling for execution timing, which loops are run and their lengths. It generates timing statistics for analysis and comparing variants of individual loops. Also, it is easy to add loops to the suite as desired.« less

  7. Perceptual processing during trauma, priming and the development of intrusive memories

    PubMed Central

    Sündermann, Oliver; Hauschildt, Marit; Ehlers, Anke

    2013-01-01

    Background Intrusive reexperiencing in posttraumatic stress disorder (PTSD) is commonly triggered by stimuli with perceptual similarity to those present during the trauma. Information processing theories suggest that perceptual processing during the trauma and enhanced perceptual priming contribute to the easy triggering of intrusive memories by these cues. Methods Healthy volunteers (N = 51) watched neutral and trauma picture stories on a computer screen. Neutral objects that were unrelated to the content of the stories briefly appeared in the interval between the pictures. Dissociation and data-driven processing (as indicators of perceptual processing) and state anxiety during the stories were assessed with self-report questionnaires. After filler tasks, participants completed a blurred object identification task to assess priming and a recognition memory task. Intrusive memories were assessed with telephone interviews 2 weeks and 3 months later. Results Neutral objects were more strongly primed if they occurred in the context of trauma stories than if they occurred during neutral stories, although the effect size was only moderate (ηp2=.08) and only significant when trauma stories were presented first. Regardless of story order, enhanced perceptual priming predicted intrusive memories at 2-week follow-up (N = 51), but not at 3 months (n = 40). Data-driven processing, dissociation and anxiety increases during the trauma stories also predicted intrusive memories. Enhanced perceptual priming and data-driven processing were associated with lower verbal intelligence. Limitations It is unclear to what extent these findings generalize to real-life traumatic events and whether they are specific to negative emotional events. Conclusions The results provide some support for the role of perceptual processing and perceptual priming in reexperiencing symptoms. PMID:23207970

  8. An Optimal Method for Detecting Internal and External Intrusion in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.

    Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

  9. Volumetric measurement of root resorption following molar mini-screw implant intrusion using cone beam computed tomography.

    PubMed

    Li, Wen; Chen, Fei; Zhang, Feng; Ding, Wanghui; Ye, Qingsong; Shi, Jiejun; Fu, Baiping

    2013-01-01

    Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. 1. The volumes of 32 teeth were measured using CBCT and laser scanning to verify the accuracy of CBCT. 2. Twelve overerupted molars from adult patients were investigated in this study. After mini-screw implants were inserted into the buccal and palatal alveolar bones, 150 g of force was applied to the mini-screw implants on each side to intrude the molars. CBCT images of all patients were taken immediately prior to intrusion and after intrusion. The volumes of the roots were calculated using the Mimics software program. The differences between the pre-intrusion and post-intrusion root volumes were statistically evaluated with a paired-samples t-test. In addition, the losses of the roots were statistically compared with each other using one-way analysis of variance at the P<0.05 level. No statistically significant volume differences were observed between the physical (laser scanning) and CBCT measurements (P>0.05). The overerupted molars were significantly intruded (P<0.05), and the average intrusion was 3.30±1.60 mm. The differences between the pre-intrusion and post-intrusion root volumes were statistically significant for all of the roots investigated (P<0.05). The roots were sorted by volume loss in descending order as follows: mesiobuccal, palatal, and distobuccal. Statistical significance was achieved among the three roots. The average total resorption for each tooth was 58.39±1.54 mm(3). Volume measurement using CBCT was able to effectively evaluate root resorption caused by mini-screw intrusion. The highest volume loss was observed in the mesiobuccal root among the three roots of

  10. Volumetric Measurement of Root Resorption following Molar Mini-Screw Implant Intrusion Using Cone Beam Computed Tomography

    PubMed Central

    Li, Wen; Chen, Fei; Zhang, Feng; Ding, Wanghui; Ye, Qingsong; Shi, Jiejun; Fu, Baiping

    2013-01-01

    Objective Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. Materials and Methods 1. The volumes of 32 teeth were measured using CBCT and laser scanning to verify the accuracy of CBCT. 2. Twelve overerupted molars from adult patients were investigated in this study. After mini-screw implants were inserted into the buccal and palatal alveolar bones, 150 g of force was applied to the mini-screw implants on each side to intrude the molars. CBCT images of all patients were taken immediately prior to intrusion and after intrusion. The volumes of the roots were calculated using the Mimics software program. The differences between the pre-intrusion and post-intrusion root volumes were statistically evaluated with a paired-samples t-test. In addition, the losses of the roots were statistically compared with each other using one-way analysis of variance at the P<0.05 level. Results No statistically significant volume differences were observed between the physical (laser scanning) and CBCT measurements (P>0.05). The overerupted molars were significantly intruded (P<0.05), and the average intrusion was 3.30±1.60 mm. The differences between the pre-intrusion and post-intrusion root volumes were statistically significant for all of the roots investigated (P<0.05). The roots were sorted by volume loss in descending order as follows: mesiobuccal, palatal, and distobuccal. Statistical significance was achieved among the three roots. The average total resorption for each tooth was 58.39±1.54 mm3. Conclusion Volume measurement using CBCT was able to effectively evaluate root resorption caused by mini-screw intrusion. The highest volume loss was observed

  11. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    PubMed Central

    Alcalá, José M.; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-01-01

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented. PMID:28208672

  12. Temporal associations and prior-list intrusions in free recall.

    PubMed

    Zaromb, Franklin M; Howard, Marc W; Dolan, Emily D; Sirotin, Yevgeniy B; Tully, Michele; Wingfield, Arthur; Kahana, Michael J

    2006-07-01

    When asked to recall the words from a just-presented target list, subjects occasionally recall words that were not on the list. These intrusions either appeared on earlier lists (prior-list intrusions, or PLIs) or had not appeared over the course of the experiment (extra-list intrusions). The authors examined the factors that elicit PLIs in free recall. A reanalysis of earlier studies revealed that PLIs tend to come from semantic associates as well as from recently studied lists, with the rate of PLIs decreasing sharply with list recency. The authors report 3 new experiments in which some items in a given list also appeared on earlier lists. Although repetition enhanced recall of list items, subjects were significantly more likely to make PLIs following the recall of repeated items, suggesting that temporal associations formed in earlier lists can induce recall errors. The authors interpret this finding as evidence for the interacting roles of associative and contextual retrieval processes in recall. Although contextual information helps to focus recall on words in the target list, it does not form an impermeable boundary between current- and prior-list experiences. Copyright 2006 APA, all rights reserved.

  13. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  14. ASDA - Advanced Suit Design Analyzer computer program

    NASA Technical Reports Server (NTRS)

    Bue, Grant C.; Conger, Bruce C.; Iovine, John V.; Chang, Chi-Min

    1992-01-01

    An ASDA model developed to evaluate the heat and mass transfer characteristics of advanced pressurized suit design concepts for low pressure or vacuum planetary applications is presented. The model is based on a generalized 3-layer suit that uses the Systems Integrated Numerical Differencing Analyzer '85 in conjunction with a 41-node FORTRAN routine. The latter simulates the transient heat transfer and respiratory processes of a human body in a suited environment. The user options for the suit encompass a liquid cooled garment, a removable jacket, a CO2/H2O permeable layer, and a phase change layer.

  15. Extravehicular Space Suit Bearing Technology Development Research

    NASA Astrophysics Data System (ADS)

    Pang, Yan; Liu, Xiangyang; Guanghui, Xie

    2017-03-01

    Pressure bearing has been acting an important role in the EVA (extravehicular activity) suit as a main mobility component. EVA suit bearing has its unique traits on the material, dustproof design, seal, interface, lubrication, load and performance. This paper states the peculiarity and development of the pressure bearing on the construction design element, load and failure mode, and performance and test from the point view of structure design. The status and effect of EVA suit pressure bearing is introduced in the paper. This analysis method can provide reference value for our country’s EVA suit pressure bearing design and development.

  16. Internet use, Facebook intrusion, and depression: Results of a cross-sectional study.

    PubMed

    Błachnio, A; Przepiórka, A; Pantic, I

    2015-09-01

    Facebook has become a very popular social networking platform today, particularly among adolescents and young adults, profoundly changing the way they communicate and interact. However, some reports have indicated that excessive Facebook use might have detrimental effects on mental health and be associated with certain psychological problems. Because previous findings on the relationship between Facebook addiction and depression were not unambiguous, further investigation was required. The main objective of our study was to examine the potential associations between Internet use, depression, and Facebook intrusion. A total of 672 Facebook users took part in the cross-sectional study. The Facebook Intrusion Questionnaire and the Center for Epidemiologic Studies Depression Scale were used. For collecting the data, the snowball sampling procedure was used. We showed that depression can be a predictor of Facebook intrusion. Our results provides additional evidence that daily Internet use time in minutes, gender, and age are also predictors of Facebook intrusion: that Facebook intrusion can be predicted by being male, young age, and an extensive number of minutes spent online. On the basis of this study, it is possible to conclude that there are certain demographic - variables, such as age, gender, or time spent online - that may help in outlining the profile of a user who may be in danger of becoming addicted to Facebook. This piece of knowledge may serve for prevention purposes. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  17. Extruded upper first molar intrusion: Comparison between unilateral and bilateral miniscrew anchorage.

    PubMed

    Sugii, Mari Miura; Barreto, Bruno de Castro Ferreira; Francisco Vieira-Júnior, Waldemir; Simone, Katia Regina Izola; Bacchi, Ataís; Caldas, Ricardo Armini

    2018-01-01

    The aim of his study was to evaluate the stress on tooth and alveolar bone caused by orthodontic intrusion forces in a supraerupted upper molar, by using a three-dimensional Finite Element Method (FEM). A superior maxillary segment was modeled in the software SolidWorks 2010 (SolidWorks Corporation, Waltham, MA, USA) containing: cortical and cancellous bone, supraerupted first molar, periodontal tissue and orthodontic components. A finite element model has simulated intrusion forces of 4N onto a tooth, directed to different mini-screw locations. Three different intrusion mechanics vectors were simulated: anchoring on a buccal mini-implant; anchoring on a palatal mini-implant and the association of both anchorage systems. All analyses were performed considering the minimum principal stress and total deformation. Qualitative analyses exhibited stress distribution by color maps. Quantitative analysis was performed with a specific software for reading and solving numerical equations (ANSYS Workbench 14, Ansys, Canonsburg, Pennsylvania, USA). Intrusion forces applied from both sides (buccal and palatal) resulted in a more homogeneous stress distribution; no high peak of stress was detected and it has allowed a vertical resultant movement. Buccal or palatal single-sided forces resulted in concentrated stress zones with higher values and tooth tipping to respective force side. Unilateral forces promoted higher stress in root apex and higher dental tipping. The bilateral forces promoted better distribution without evidence of dental tipping. Bilateral intrusion technique suggested lower probability of root apex resorption.

  18. A Gulf Stream-derived pycnocline intrusion on the Middle Atlantic Bight shelf

    NASA Astrophysics Data System (ADS)

    Gawarkiewicz, Glen; McCarthy, Robert K.; Barton, Kenneth; Masse, Ann K.; Church, Thomas M.

    1990-12-01

    Saline intrusions from the upper slope onto the outer shelf are frequently observed at the pycnocline along the shelfbreak front in the Middle Atlantic Bight during the summer. A brief cruise was conducted in July, 1986 between Baltimore and Washington Canyons to examine along-shelf variability of pycnocline salinity intrusions. A particularly saline intrusion of 35.8 Practical Salinity Units (PSU) was observed between 20 and 40 m in a water depth of 70 to 80 m. The along-shelf extent was at least 40 km. The cooler, sub-pycnocline outer shelf water was displaced 15 km shoreward of the shelfbreak. A Gulf Stream filament was present in the slope region prior to the hydrographic sampling, but was not visible in thermal imagery during the hydrographic sampling. Temperature-salinity characteristics of the intrusion suggest that it was a mixture of Gulf Stream water and slope water, possibly from the filament. The shoreward penetration of saline water was most pronounced at the pycnocline and penetrated the shelfbreak front, with salinities as high as 35.0 PSU reaching as far shoreward as the 35 m isobath. These pycnocline intrusions may be an important mechanism for the transport of Gulf Stream-derived water onto the shelf during the summer. The presence of filaments or other Gulf Stream-derived water on the upper slope may account for some of the along-front variability of the pycnocline salinity maximum that has previously been observed.

  19. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability maymore » also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system« less

  20. Acute effects of alcohol on the development of intrusive memories.

    PubMed

    Bisby, James A; Brewin, Chris R; Leitz, Julie R; Valerie Curran, H

    2009-07-01

    Post-traumatic stress disorder is characterised by repeated intrusive imagery of the traumatic event. Despite alcohol's impairing effect on memory and frequent involvement in real-life trauma, virtually nothing is known of the interaction between alcohol and trauma memory. We aimed to investigate the acute alcohol effects on spontaneous memories following a trauma film as well as explicit memory for the film. Utilising an independent-group double-blind design, 48 healthy volunteers were randomly allocated to receive alcohol of 0.4 or 0.8 g/kg or a matched placebo drink. A stressful film was viewed post-drink. Skin conductance was monitored throughout and mood and dissociative symptoms were indexed. Volunteers recorded their spontaneous memories of the film daily in an online diary over the following week. Their explicit memory for both gist and details of the film was tested on day 7. Intriguingly, an inverted 'U' alcohol dose-response was observed on intrusive memories with a low dose of alcohol increasing memory intrusions while a high dose decreased intrusions. In contrast, explicit memory performance after 7 days showed a linear dose-response effect of alcohol with both recall and recognition decreasing as dose increased. These findings highlight a striking differential pattern of alcohol's effects on spontaneous memories as compared with explicit memories. Alcohol's effect on spontaneous memories may reflect a dose-dependent impairment of two separate memory systems integral to the processing of different aspects of a traumatic event.

  1. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.

  2. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    USGS Publications Warehouse

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  3. HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

    DTIC Science & Technology

    2003-01-01

    securing the routing protocols of mobile ad hoc wireless net- works has been done in prevention. Intrusion detection systems play a complimentary...TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified...hops of A would be unable to communicate with B and vice versa [1]. 1.2 The role of intrusion detection in security In order to provide reliable

  4. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    NASA Astrophysics Data System (ADS)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  5. Hypomanic Experience in Young Adults Confers Vulnerability to Intrusive Imagery After Experimental Trauma

    PubMed Central

    Malik, Aiysha; Goodwin, Guy M.; Hoppitt, Laura

    2014-01-01

    Emotional mental imagery occurs across anxiety disorders, yet is neglected in bipolar disorder despite high anxiety comorbidity. Furthermore, a heightened susceptibility to developing intrusive mental images of stressful events in bipolar disorder and people vulnerable to it (with hypomanic experience) has been suggested. The current study assessed, prospectively, whether significant hypomanic experience (contrasting groups scoring high vs. low on the Mood Disorder Questionnaire, MDQ) places individuals at increased risk of visual reexperiencing after experimental stress. A total of 110 young adults watched a trauma film and recorded film-related intrusive images for 6 days. Compared to the low MDQ group, the high MDQ group experienced approximately twice as many intrusive images, substantiated by convergent measures. Findings suggest hypomanic experience is associated with developing more frequent intrusive imagery of a stressor. Because mental imagery powerfully affects emotion, such imagery may contribute to bipolar mood instability and offer a cognitive treatment target. PMID:25419498

  6. Use MACES IVA Suit for EVA Mobility Evaluations

    NASA Technical Reports Server (NTRS)

    Watson, Richard D.

    2014-01-01

    The use of an Intra-Vehicular Activity (IVA) suit for a spacewalk or Extra-Vehicular Activity (EVA) was evaluated for mobility and usability in the Neutral Buoyancy Lab (NBL) environment. The Space Shuttle Advanced Crew Escape Suit (ACES) has been modified (MACES) to integrate with the Orion spacecraft. The first several missions of the Orion MPCV spacecraft will not have mass available to carry an EVA specific suit so any EVA required will have to be performed by the MACES. Since the MACES was not designed with EVA in mind, it was unknown what mobility the suit would be able to provide for an EVA or if a person could perform useful tasks for an extended time inside the pressurized suit. The suit was evaluated in multiple NBL runs by a variety of subjects including crewmembers with significant EVA experience. Various functional mobility tasks performed included: translation, body positioning, carrying tools, body stabilization, equipment handling, and use of tools. Hardware configurations included with and without TMG, suit with IVA gloves and suit with EVA gloves. Most tasks were completed on ISS mockups with existing EVA tools. Some limited tasks were completed with prototype tools on a simulated rocky surface. Major findings include: demonstration of the ability to weigh-out the suit, understanding the need to have subjects perform multiple runs prior to getting feedback, determination of critical sizing factors, and need for adjustment of suit work envelop. The early testing has demonstrated the feasibility of EVA's limited duration and limited scope. Further testing is required with more flight like tasking and constraints to validate these early results. If the suit is used for EVA, it will require mission specific modifications for umbilical management or PLSS integration, safety tether attachment, and tool interfaces. These evaluations are continuing through calendar year 2014.

  7. Expedition 18 Suit-up

    NASA Image and Video Library

    2008-10-11

    A Russian Sokol suit technician prepares to help American spaceflight participant Richard Garriott don his flight suit prior to the Soyuz TMA-13 launch with Expedition 18 Commander Michael Fincke and Flight Engineer Yuri V. Lonchakov, Sunday, Oct. 12, 2008 in Baikonur, Kazakhstan. The three crew members are scheduled to dock with the International Space Station on Oct. 14. Fincke and Lonchakov will spend six months on the station, while Garriott will return to Earth Oct. 24 with two of the Expedition 17 crew members currently on the International Space Station. Photo Credit: (NASA/Bill Ingalls)

  8. Contextual representations increase analogue traumatic intrusions: evidence against a dual-representation account of peri-traumatic processing.

    PubMed

    Pearson, David G

    2012-12-01

    Information processing accounts of post-traumatic stress disorder (PTSD) state that intrusive memories emerge due to a lack of integration between perceptual and contextual trauma representations in autobiographical memory. This hypothesis was tested experimentally using an analogue trauma paradigm in which participants viewed an aversive film designed to elicit involuntary recollections. Participants viewed scenes from the film either paired with contextual information or with the contextual information omitted. After viewing the film participants were asked to record for one week any involuntary intrusions for the film using a provided intrusions diary. The results revealed a significant increase in analogue intrusions for the film when viewed with contextual information in comparison to when the film was viewed with the contextual information omitted. In contrast there was no effect of contextual information on valence ratings or voluntary memory for the film, or on the reported vividness and emotionality of the intrusions. The analogue trauma paradigm may have failed to reproduce the effect of extreme stress on encoding that is postulated to occur during PTSD. The findings have potential implications for trauma intervention as they suggest that the contextual understanding of a scene during encoding can be integral to the subsequent occurrence of traumatic intrusions. The pattern of results found in the study are inconsistent with dual-representation accounts of intrusive memory formation, and instead provide new evidence that contextual representations play a casual role in increasing the frequency of involuntary intrusions for traumatic material. Copyright © 2012 Elsevier Ltd. All rights reserved.

  9. Intrusive imagery in severe health anxiety: Prevalence, nature and links with memories and maintenance cycles

    PubMed Central

    Muse, Kate; McManus, Freda; Hackmann, Ann; Williams, Matthew; Williams, Mark

    2010-01-01

    Increased understanding of the nature and role of intrusive imagery has contributed to the development of effective treatment protocols for some anxiety disorders. However, intrusive imagery in severe health anxiety (hypochondriasis) has been comparatively neglected. Hence, the current study investigates the prevalence, nature and content of intrusive imagery in 55 patients who met DSM-IV-TR (APA, 2000) criteria for the diagnosis of hypochondriasis. A semi-structured interview was used to assess the prevalence, nature and possible role of intrusive imagery in this disorder. Over 78% of participants reported experiencing recurrent, distressing intrusive images, the majority (72%) of which either were a memory of an earlier event or were strongly associated with a memory. The images tended to be future orientated, and were reliably categorised into four themes: i) being told ‘the bad news’ that you have a serious/life threatening-illness (6.9%), ii) suffering from a serious or life-threatening illness (34.5%), iii) death and dying due to illness (22.4%) and iv) impact of own death or serious illness on loved ones (36.2%). Participants reported responding to experiencing intrusive images by engaging in avoidance, checking, reassurance seeking, distraction and rumination. Potential treatment implications and links to maintenance cycles are considered. PMID:20627270

  10. WISESight : a multispectral smart video-track intrusion monitor.

    DOT National Transportation Integrated Search

    2015-05-01

    International Electronic Machines : Corporation (IEM) developed, tested, and : validated a unique smart video-based : intrusion monitoring system for use at : highway-rail grade crossings. The system : used both thermal infrared (IR) and : visible/ne...

  11. Natural tooth intrusion and reversal in implant-assisted prosthesis: evidence of and a hypothesis for the occurrence.

    PubMed

    Sheets, C G; Earthmann, J C

    1993-12-01

    Based on clinical observation, a hypothesis of the mechanism of intrusion of natural teeth in an implant-assisted prosthesis is suggested. Engineering principles are presented that establish an energy absorption model as it relates to the implant-assisted prosthesis. In addition, in the course of patient treatment it has been discovered that the intrusion of natural teeth can be reversed. Patient histories that demonstrate intrusion reversal are reviewed. The possible mechanisms for the intrusion/reversal phenomenon are presented and preventative recommendations are given.

  12. Testing of Space Suit Materials for Mars

    NASA Technical Reports Server (NTRS)

    Larson, Kristine

    2016-01-01

    Human missions to Mars may require radical changes in our approach to EVA suit design. A major challenge is the balance of building a suit robust enough to complete 50 EVAs in the dirt under intense UV exposure without losing mechanical strength or compromising its mobility. We conducted ground testing on both current and new space suit materials to determine performance degradation after exposure to 2500 hours of Mars mission equivalent UV. This testing will help mature the material technologies and provide performance data that can be used by not only the space suit development teams but for all Mars inflatable and soft goods derived structures from airlocks to habitats.

  13. The Variable Vector Countermeasure Suit (V2Suit) for space habitation and exploration.

    PubMed

    Duda, Kevin R; Vasquez, Rebecca A; Middleton, Akil J; Hansberry, Mitchell L; Newman, Dava J; Jacobs, Shane E; West, John J

    2015-01-01

    The "Variable Vector Countermeasure Suit (V2Suit) for Space Habitation and Exploration" is a novel system concept that provides a platform for integrating sensors and actuators with daily astronaut intravehicular activities to improve health and performance, while reducing the mass and volume of the physiologic adaptation countermeasure systems, as well as the required exercise time during long-duration space exploration missions. The V2Suit system leverages wearable kinematic monitoring technology and uses inertial measurement units (IMUs) and control moment gyroscopes (CMGs) within miniaturized modules placed on body segments to provide a "viscous resistance" during movements against a specified direction of "down"-initially as a countermeasure to the sensorimotor adaptation performance decrements that manifest themselves while living and working in microgravity and during gravitational transitions during long-duration spaceflight, including post-flight recovery and rehabilitation. Several aspects of the V2Suit system concept were explored and simulated prior to developing a brassboard prototype for technology demonstration. This included a system architecture for identifying the key components and their interconnects, initial identification of key human-system integration challenges, development of a simulation architecture for CMG selection and parameter sizing, and the detailed mechanical design and fabrication of a module. The brassboard prototype demonstrates closed-loop control from "down" initialization through CMG actuation, and provides a research platform for human performance evaluations to mitigate sensorimotor adaptation, as well as a tool for determining the performance requirements when used as a musculoskeletal deconditioning countermeasure. This type of countermeasure system also has Earth benefits, particularly in gait or movement stabilization and rehabilitation.

  14. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  15. Biological intrusion of low-level-waste trench covers

    NASA Astrophysics Data System (ADS)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  16. Quantification of the intrusion process at Kīlauea volcano, Hawai'i

    NASA Astrophysics Data System (ADS)

    Wright, Thomas L.; Marsh, Bruce

    2016-12-01

    The characteristic size of two types of intrusions identified beneath Kīlauea's East Rift zone are uniquely estimated by combining time constraints from fractional crystallization and the rates of magma solidification during cooling. Some intrusions were rapidly emplaced as dikes, but stalled before reaching the surface, and cooled and crystallized to feed later fractionated eruptions. More specifically, using the observed time interval between initial emplacement and eruption of fractionated lava, whose degree of fractionation is estimated from petrologic mixing calculations, the extent of solidification or cooling needed to produce this amount of fractionation can be directly inferred. And from the known erupted volumes the spatial extent or size of this fractionated volume can be analytically related to the full size of the source body itself. Two examples yield dike widths of 82 and 68 m. Other intrusions remain close to the east rift magma transport path and are observed to last for decades or longer as viable magma bodies that may participate in feeding later eruptions. The thickness of semi-permanent reservoirs near the East Rift Zone magma transport path can be estimated by assuming a resupply rate that is sufficiently frequent to restrict cooling to < 10 °C. It is inferred that both types of intrusions likely began as dike offshoots from the East Rift Zone magma transport path, but the frequently resupplied bodies may have later been converted to sills or laccoliths of heights estimated at 43-62 m. Our modeled intrusions contrast with models of rapidly emplaced thinner dikes feeding shallow intrusions, which are accompanied by intense rift earthquake swarms and are often associated with eruptions. These calculations show that long-term heating of the wallrock of the magma transport paths serves to slow conduit cooling, which may be partly responsible for sustaining long East Rift Zone eruptions. Adjacent to the vertical transport path beneath K

  17. Analytical Tools for Space Suit Design

    NASA Technical Reports Server (NTRS)

    Aitchison, Lindsay

    2011-01-01

    As indicated by the implementation of multiple small project teams within the agency, NASA is adopting a lean approach to hardware development that emphasizes quick product realization and rapid response to shifting program and agency goals. Over the past two decades, space suit design has been evolutionary in approach with emphasis on building prototypes then testing with the largest practical range of subjects possible. The results of these efforts show continuous improvement but make scaled design and performance predictions almost impossible with limited budgets and little time. Thus, in an effort to start changing the way NASA approaches space suit design and analysis, the Advanced Space Suit group has initiated the development of an integrated design and analysis tool. It is a multi-year-if not decadal-development effort that, when fully implemented, is envisioned to generate analysis of any given space suit architecture or, conversely, predictions of ideal space suit architectures given specific mission parameters. The master tool will exchange information to and from a set of five sub-tool groups in order to generate the desired output. The basic functions of each sub-tool group, the initial relationships between the sub-tools, and a comparison to state of the art software and tools are discussed.

  18. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  19. Multilayer Statistical Intrusion Detection in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  20. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  1. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  2. Suited Contingency Ops Food - 2

    NASA Technical Reports Server (NTRS)

    Glass, J. W.; Leong, M. L.; Douglas, G. L.

    2014-01-01

    The contingency scenario for an emergency cabin depressurization event may require crewmembers to subsist in a pressurized suit for up to 144 hours. This scenario requires the capability for safe nutrition delivery through a helmet feed port against a 4 psi pressure differential to enable crewmembers to maintain strength and cognition to perform critical tasks. Two nutritional delivery prototypes were developed and analyzed for compatibility with the helmet feed port interface and for operational effectiveness against the pressure differential. The bag-in-bag (BiB) prototype, designed to equalize the suit pressure with the beverage pouch and enable a crewmember to drink normally, delivered water successfully to three different subjects in suits pressurized to 4 psi. The Boa restrainer pouch, designed to provide mechanical leverage to overcome the pressure differential, did not operate sufficiently. Guidelines were developed and compiled for contingency beverages that provide macro-nutritional requirements, a minimum one-year shelf life, and compatibility with the delivery hardware. Evaluation results and food product parameters have the potential to be used to improve future prototype designs and develop complete nutritional beverages for contingency events. These feeding capabilities would have additional use on extended surface mission EVAs, where the current in-suit drinking device may be insufficient.

  3. Cretaceous and Paleogene granitoid suites of the Sikhote-Alin area (Far East Russia): Geochemistry and tectonic implications

    NASA Astrophysics Data System (ADS)

    Grebennikov, Andrei V.; Khanchuk, Alexander I.; Gonevchuk, Valeriy G.; Kovalenko, Sergey V.

    2016-09-01

    The Mesozoic and Cenozoic geological history of NE Asia comprises alternating episodes of subduction or transform strike-slip movement of the oceanic plate along the continental margin of Eurasia. This sequence resulted in the regular generation of granitoid suites that are characterized by different ages, compositions, and tectonic settings. The Hauterivian-Aptian orogenic stage of the Sikhote-Alin, associated with the strike-slip displacement of the early Paleozoic continental blocks, the successive deformation of the Jurassic and Early Cretaceous terranes, and the injection of the earliest S-type granitoids. During late Albian, the area underwent syn-strike-slip compression caused by collision with the Aptian island arc and resulted in the injection of voluminous magmas of calc-alkaline magnesian (S- and I-type) and alkali-calcic ferroan (A-type) granitoids into syn-faulting compressional and extensional basins, respectively. Northwestward to westward movement of the Izanagi Plate resulted in the initiation of frontal subduction of the Paleo-Pacific Plate during the Cenomanian-Maastrichtian. In turn, this resulted in the generation of plateau-forming ignimbrites and their intrusive analogs formed from metaluminous I-type felsic magmas. Paleocene-Eocene magmatism in the Sikhote-Alin area commenced after the termination of subduction in a rifting regime related to strike-slip movement of the oceanic plate relative to the continent. The break-off of the subducted plate and the injection of oceanic asthenospheric material into the subcontinental lithosphere resulted in the eruption of lamproites and fayalite rhyolites, and coeval intrusions of gabbro and alkali feldspar granites (A-type). The A-type granitic-rocks and coeval gabbro-monzonites are considered to be reliable indicators of the transform continental margin geodynamic settings.

  4. Intrusive Method for Uncertainty Quantification in a Multiphase Flow Solver

    NASA Astrophysics Data System (ADS)

    Turnquist, Brian; Owkes, Mark

    2016-11-01

    Uncertainty quantification (UQ) is a necessary, interesting, and often neglected aspect of fluid flow simulations. To determine the significance of uncertain initial and boundary conditions, a multiphase flow solver is being created which extends a single phase, intrusive, polynomial chaos scheme into multiphase flows. Reliably estimating the impact of input uncertainty on design criteria can help identify and minimize unwanted variability in critical areas, and has the potential to help advance knowledge in atomizing jets, jet engines, pharmaceuticals, and food processing. Use of an intrusive polynomial chaos method has been shown to significantly reduce computational cost over non-intrusive collocation methods such as Monte-Carlo. This method requires transforming the model equations into a weak form through substitution of stochastic (random) variables. Ultimately, the model deploys a stochastic Navier Stokes equation, a stochastic conservative level set approach including reinitialization, as well as stochastic normals and curvature. By implementing these approaches together in one framework, basic problems may be investigated which shed light on model expansion, uncertainty theory, and fluid flow in general. NSF Grant Number 1511325.

  5. Space Suit (Mobil Biological Isolation)

    NASA Technical Reports Server (NTRS)

    1977-01-01

    A Houston five-year-old known as David is getting a "space suit," a vitally important gift that will give him mobility he has never known. David suffers from a rare malady called severe combined immune deficiency, which means that be was born without natural body defenses against disease; germs that would have little or no effect on most people could cause his death. As a result, he has spent his entire life in germ-free isolation rooms, one at Houston's Texas Children's hospital, another at his home. The "space suit" David is getting will allow him to spend four hours ata a time in a mobile sterile environment outside his isolation rooms. Built by NASA's Johnson Space Center, it is a specially-designed by product of Space Suit technology known as the mobile biological isolation system.

  6. Intrusive Rock Database for the Digital Geologic Map of Utah

    USGS Publications Warehouse

    Nutt, C.J.; Ludington, Steve

    2003-01-01

    Digital geologic maps offer the promise of rapid and powerful answers to geologic questions using Geographic Information System software (GIS). Using modern GIS and database methods, a specialized derivative map can be easily prepared. An important limitation can be shortcomings in the information provided in the database associated with the digital map, a database which is often based on the legend of the original map. The purpose of this report is to show how the compilation of additional information can, when prepared as a database that can be used with the digital map, be used to create some types of derivative maps that are not possible with the original digital map and database. This Open-file Report consists of computer files with information about intrusive rocks in Utah that can be linked to the Digital Geologic Map of Utah (Hintze et al., 2000), an explanation of how to link the databases and map, and a list of references for the databases. The digital map, which represents the 1:500,000-scale Geologic Map of Utah (Hintze, 1980), can be obtained from the Utah Geological Survey (Map 179DM). Each polygon in the map has a unique identification number. We selected the polygons identified on the geologic map as intrusive rock, and constructed a database (UT_PLUT.xls) that classifies the polygons into plutonic map units (see tables). These plutonic map units are the key information that is used to relate the compiled information to the polygons on the map. The map includes a few polygons that were coded as intrusive on the state map but are largely volcanic rock; in these cases we note the volcanic rock names (rhyolite and latite) as used in the original sources Some polygons identified on the digital state map as intrusive rock were misidentified; these polygons are noted in a separate table of the database, along with some information about their true character. Fields may be empty because of lack of information from references used or difficulty in finding

  7. Results and Analysis from Space Suit Joint Torque Testing

    NASA Technical Reports Server (NTRS)

    Matty, Jennifer

    2010-01-01

    A space suit's mobility is critical to an astronaut's ability to perform work efficiently. As mobility increases, the astronaut can perform tasks for longer durations with less fatigue. Mobility can be broken down into two parts: range of motion (ROM) and torque. These two measurements describe how the suit moves and how much force it takes to move. Two methods were chosen to define mobility requirements for the Constellation Space Suit Element (CSSE). One method focuses on range of motion and the second method centers on joint torque. A joint torque test was conducted to determine a baseline for current advanced space suit joint torques. This test utilized the following space suits: Extravehicular Mobility Unit (EMU), Advanced Crew Escape Suit (ACES), I-Suit, D-Suit, Enhanced Mobility (EM)- ACES, and Mark III (MK-III). Data was collected data from 16 different joint movements of each suit. The results were then reviewed and CSSE joint torque requirement values were selected. The focus of this paper is to discuss trends observed during data analysis.

  8. Assessment of Suited Reach Envelope in an Underwater Environment

    NASA Technical Reports Server (NTRS)

    Kim, Han; Benson, Elizabeth; Bernal, Yaritza; Jarvis, Sarah; Meginnis, Ian; Rajulu, Sudhakar

    2017-01-01

    Predicting the performance of a crewmember in an extravehicular activity (EVA) space suit presents unique challenges. The kinematic patterns of suited motions are difficult to reproduce in gravity. Additionally, 3-D suited kinematics have been practically and technically difficult to quantify in an underwater environment, in which crewmembers are commonly trained and assessed for performance. The goal of this study is to develop a hardware and software system to predictively evaluate the kinematic mobility of suited crewmembers, by measuring the 3-D reach envelope of the suit in an underwater environment. This work is ultimately aimed at developing quantitative metrics to compare the mobility of the existing Extravehicular Mobility Unit (EMU) to newly developed space suit, such as the Z-2. The EMU has been extensively used at NASA since 1981 for EVA outside the Space Shuttle and International Space Station. The Z-2 suit is NASA's newest prototype space suit. The suit is comprised of new upper torso and lower torso architectures, which were designed to improve test subject mobility.

  9. Interoperative efficiency in minimally invasive surgery suites.

    PubMed

    van Det, M J; Meijerink, W J H J; Hoff, C; Pierie, J P E N

    2009-10-01

    Performing minimally invasive surgery (MIS) in a conventional operating room (OR) requires additional specialized equipment otherwise stored outside the OR. Before the procedure, the OR team must collect, prepare, and connect the equipment, then take it away afterward. These extra tasks pose a thread to OR efficiency and may lengthen turnover times. The dedicated MIS suite has permanently installed laparoscopic equipment that is operational on demand. This study presents two experiments that quantify the superior efficiency of the MIS suite in the interoperative period. Preoperative setup and postoperative breakdown times in the conventional OR and the MIS suite in an experimental setting and in daily practice were analyzed. In the experimental setting, randomly chosen OR teams simulated the setup and breakdown for a standard laparoscopic cholecystectomy (LC) and a complex laparoscopic sigmoid resection (LS). In the clinical setting, the interoperative period for 66 LCs randomly assigned to the conventional OR or the MIS suite were analyzed. In the experimental setting, the setup and breakdown times were significantly shorter in the MIS suite. The difference between the two types of OR increased for the complex procedure: 2:41 min for the LC (p < 0.001) and 10:47 min for the LS (p < 0.001). In the clinical setting, the setup and breakdown times as a whole were not reduced in the MIS suite. Laparoscopic setup and breakdown times were significantly shorter in the MIS suite (mean difference, 5:39 min; p < 0.001). Efficiency during the interoperative period is significantly improved in the MIS suite. The OR nurses' tasks are relieved, which may reduce mental and physical workload and improve job satisfaction and patient safety. Due to simultaneous tasks of other disciplines, an overall turnover time reduction could not be achieved.

  10. Supra-subduction zone extensional magmatism in Vermont and adjacent Quebec: Implications for early Paleozoic Appalachian tectonics

    USGS Publications Warehouse

    Kim, J.; Coish, R.; Evans, M.; Dick, G.

    2003-01-01

    Metadiabasic intrusions of the Mount Norris Intrusive Suite occur in fault-bounded lithotectonic packages containing Stowe, Moretown, and Cram Hill Formation lithologies in the northern Vermont Rowe-Hawley belt, a proposed Ordovician arc-trench gap above an east-dipping subduction zone. Rocks of the Mount Norris Intrusive Suite are characteristically massive and weakly foliated, have chilled margins, contain xenoliths, and have sharp contacts that both crosscut and are parallel to early structural fabrics in the host metasedimentary rocks. Although the mineral assemblage of the Mount Norris Intrusive Suite is albite + actinolite + epidote + chlorite + calcite + quartz, intergrowths of albite + actinolite are probably pseudomorphs after plagioclase + clinopyroxene. The metadiabases are subalkaline, tholeiitic, hypabyssal basalts with preserved ophitic texture. A backarc-basin tectonic setting for the intrusive suite is suggested by its LREE (light rare earth element) enrichment, negative Nb-Ta anomalies, and Ta/Yb vs. Th/Yb trends. Although no direct isotopic age data are available, the intrusions are broadly Ordovician because their contacts are clearly folded by the earliest Acadian (Silurian-Devonian) folds. Field evidence and geochemical data suggest compelling along-strike correlations with the Coburn Hill Volcanics of northern Vermont and the Bolton Igneous Group of southern Quebec. Isotopic and stratigraphic age constraints for the Bolton Igneous Group bracket these backarc magmas to the 477-458 Ma interval. A tectonic model that begins with east-dipping subduction and progresses to outboard west-dipping subduction after a syncollisional polarity reversal best explains the intrusion of deformed metamorphosed metasedimentary rocks by backarc magmas.

  11. Externalizing symptoms, effortful control, and intrusive parenting: A test of bidirectional longitudinal relations during early childhood.

    PubMed

    Eisenberg, Nancy; Taylor, Zoe E; Widaman, Keith F; Spinrad, Tracy L

    2015-11-01

    At approximately 30, 42, and 54 months of age (N = 231), the relations among children's externalizing symptoms, intrusive maternal parenting, and children's effortful control (EC) were examined. Both intrusive parenting and low EC have been related to psychopathology, but children's externalizing problems and low EC might affect the quality of parenting and one another. Mothers' intrusive behavior with their children was assessed with observations, children's EC was measured with mothers' and caregivers' reports, and children's externalizing symptoms were assessed with mothers', fathers', and caregivers' reports. In a structural equation panel model, bidirectional relations between intrusive parenting and EC were found: EC at 30 and 42 months predicted low levels of intrusive parenting a year later, controlling for prior levels of parenting and vice versa. Moreover, high levels of children's externalizing problems at both 30 and 42 months negatively predicted EC a year later, controlling for prior levels of EC. Although externalizing problems positively predicted high EC over time, this appeared to be a suppression effect because these variables had a strong negative pattern in the zero-order correlations. Moreover, when controlling for the stability of intrusive parenting, EC, and externalizing (all exhibited significant stability across time) and the aforementioned cross-lagged predictive paths, EC and externalizing problems were still negatively related within the 54-month assessment. The findings are consistent with the view that children's externalizing behavior undermines their EC and contributes to intrusive mothering and that relations between intrusive parenting and EC are bidirectional across time. Thus, interventions that focus on modifying children's externalizing problems (as well as the quality of parenting) might affect the quality of parenting they receive and, hence, subsequent problems with adjustment.

  12. Erosion and intrusion of silicone rubber scleral buckle. Presentation and management.

    PubMed

    Nguyen, Q D; Lashkari, K; Hirose, T; Pruett, R C; McMeel, J W; Schepens, C L

    2001-01-01

    To describe the clinical presentation and management of erosion and intrusion of silicone rubber implants that are used in scleral buckling procedures for the treatment of retinal detachment. The authors identified four patients from their practices during the last 20 years (1978-1998) who had erosion or intrusion of silicone rubber scleral buckles that were used to manage retinal detachment. Approximately 4400 scleral buckling procedures were performed during this period. A retrospective review of the medical records of all patients was performed. Factors that influenced management decisions concerning the intruding buckle are emphasized. All four patients had myopia. The interval between placement of the scleral buckle and development of intrusion ranged from 1 to 20 years. The buckles were intrascleral in three cases and episcleral in one. Recurrent detachment and vitreous hemorrhage were indications for surgical intervention in three cases. After the surgical removal of buckling elements, visual acuity stabilized in all patients and the retina remained attached in all cases. Erosion and intrusion of scleral buckle are rare complications of scleral buckling procedures. The intruding buckle may be left intact unless there is significant threat to the integrity of ocular structures, recurrent detachment, or hemorrhage. Manipulation of the encircling band or buckle does not necessarily alter the visual acuity or the status of the retina.

  13. Intrusion-Tolerant Location Information Services in Intelligent Vehicular Networks

    NASA Astrophysics Data System (ADS)

    Yan, Gongjun; Yang, Weiming; Shaner, Earl F.; Rawat, Danda B.

    Intelligent Vehicular Networks, known as Vehicle-to-Vehicle and Vehicle-to-Roadside wireless communications (also called Vehicular Ad hoc Networks), are revolutionizing our daily driving with better safety and more infortainment. Most, if not all, applications will depend on accurate location information. Thus, it is of importance to provide intrusion-tolerant location information services. In this paper, we describe an adaptive algorithm that detects and filters the false location information injected by intruders. Given a noisy environment of mobile vehicles, the algorithm estimates the high resolution location of a vehicle by refining low resolution location input. We also investigate results of simulations and evaluate the quality of the intrusion-tolerant location service.

  14. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    PubMed

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  15. Geology, petrology and geochronology of the Lago Grande layered complex: Evidence for a PGE-mineralized magmatic suite in the Carajás Mineral Province, Brazil

    NASA Astrophysics Data System (ADS)

    Teixeira, Antonio Sales; Ferreira Filho, Cesar Fonseca; Giustina, Maria Emilia Schutesky Della; Araújo, Sylvia Maria; da Silva, Heloisa Helena Azevedo Barbosa

    2015-12-01

    ultramafic lithotypes render Nd model ages between 2.94 and 3.56 Ga, with variably negative ɛNd (T = 2.72 Ga) values (-0.32 to -4.25). The crystallization sequence of the intrusion and the composition of cumulus minerals, together with lithogeochemical and Nd isotopic results, are consistent with an original mantle melt contaminated with older continental crust. The contamination of mafic magma with sialic crust is also consistent with intra-plate rifting models proposed in several studies of the CMP. Lithogeochemical and isotopic data from the Lago Grande Complex may also be interpreted as the result of melting an old lithospheric mantle, and alternative models should not be disregarded. PGE mineralizations occur in chromitites and associated with base metal sulfides in the Lago Grande Complex. Chromitite has the highest PGE content (up to 10 ppm) and is characterized by high Pt/Pd ratio (4.3). Mantle-normalized profile of chromitite is highly enriched in PPGE and similar to those from Middle Group (MG) and Upper Group (UG) chromitites from the Bushveld Complex. Platinum group minerals (PGM) occur mainly at the edge of chromite crystals in the Lago Grande chromitite, consisting of arsenides and sulfo-arsenides. Sulfide-bearing harzburgite samples of the Lago Grande complex have PGE content of up to 1 ppm and low Pt/Pd (0.2-0.3) ratios. The 2722 ± 53 Ma U-Pb zircon age determined in this study for the Lago Grande Complex overlaps with the crystallization age of the Luanga Complex. Previous interpretation that the Lago Grande and Luanga layered intrusions are part of a magmatic suite (i.e., Serra Leste Magmatic Suite) is now reinforced by similar fractionation sequences, comparable petrological evolution and overlapped U-Pb zircon ages. The occurrence of the same styles of PGE mineralization in the Lago Grande and Luanga complexes, together with remarkably similar chondrite-normalized PGE profiles and PGE minerals for chromitites of both complexes, support the concept that

  16. Quasi-horizontal circulation cells in 3D seawater intrusion

    USGS Publications Warehouse

    Abarca, E.; Carrera, J.; Sanchez-Vila, X.; Voss, C.I.

    2007-01-01

    The seawater intrusion process is characterized by the difference in freshwater and seawater density that causes freshwater to float on seawater. Many confined aquifers have a large horizontal extension with respect to thickness. In these cases, while buoyancy acts in the vertical direction, flow is confined between the upper and bottom boundaries and the effect of gravity is controlled by variations of aquifer elevation. Therefore, the effective gravity is controlled by the slope and the shape of the aquifer boundaries. Variability in the topography of the aquifer boundaries is one case where 3D analysis is necessary. In this work, density-dependent flow processes caused by 3D aquifer geometry are studied numerically and specifically, considering a lateral slope of the aquifer boundaries. Sub-horizontal circulation cells are formed in the saltwater entering the aquifer. The penetration of the saltwater can be quantified by a dimensionless buoyancy number that measures the lateral slope of the aquifer relative to freshwater flux. The penetration of the seawater intrusion wedge is controlled more by this slope than by the aquifer thickness and dispersivity. Thus, the slope must be taken into account in order to accurately evaluate seawater intrusion. ?? 2007 Elsevier B.V. All rights reserved.

  17. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks

    PubMed Central

    Navia, Marlon; Campelo, Jose C.; Bonastre, Alberto; Ors, Rafael; Capella, Juan V.; Serrano, Juan J.

    2015-01-01

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature. PMID:26393604

  18. 76 FR 14660 - Public Comment on the Development of Final Guidance for Evaluating the Vapor Intrusion to Indoor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... Groundwater and Soils (Subsurface Vapor Intrusion Guidance) AGENCY: Environmental Protection Agency (EPA... Pathway from Contaminated Groundwater and Soil (Subsurface Vapor Intrusion Guidance). A draft of the... Evaluating Vapor Intrusion to Indoor Air Pathway from Contaminated Groundwater and Soil (Subsurface Vapor...

  19. The Variable Vector Countermeasure Suit (V2Suit) for space habitation and exploration

    PubMed Central

    Duda, Kevin R.; Vasquez, Rebecca A.; Middleton, Akil J.; Hansberry, Mitchell L.; Newman, Dava J.; Jacobs, Shane E.; West, John J.

    2015-01-01

    The “Variable Vector Countermeasure Suit (V2Suit) for Space Habitation and Exploration” is a novel system concept that provides a platform for integrating sensors and actuators with daily astronaut intravehicular activities to improve health and performance, while reducing the mass and volume of the physiologic adaptation countermeasure systems, as well as the required exercise time during long-duration space exploration missions. The V2Suit system leverages wearable kinematic monitoring technology and uses inertial measurement units (IMUs) and control moment gyroscopes (CMGs) within miniaturized modules placed on body segments to provide a “viscous resistance” during movements against a specified direction of “down”—initially as a countermeasure to the sensorimotor adaptation performance decrements that manifest themselves while living and working in microgravity and during gravitational transitions during long-duration spaceflight, including post-flight recovery and rehabilitation. Several aspects of the V2Suit system concept were explored and simulated prior to developing a brassboard prototype for technology demonstration. This included a system architecture for identifying the key components and their interconnects, initial identification of key human-system integration challenges, development of a simulation architecture for CMG selection and parameter sizing, and the detailed mechanical design and fabrication of a module. The brassboard prototype demonstrates closed-loop control from “down” initialization through CMG actuation, and provides a research platform for human performance evaluations to mitigate sensorimotor adaptation, as well as a tool for determining the performance requirements when used as a musculoskeletal deconditioning countermeasure. This type of countermeasure system also has Earth benefits, particularly in gait or movement stabilization and rehabilitation. PMID:25914631

  20. Intrusive images and voluntary memory for affective pictures: contextualization and dual-task interference.

    PubMed

    Krans, Julie; Langner, Oliver; Reinecke, Andrea; Pearson, David G

    2013-12-01

    The present study addressed the role of context information and dual-task interference during the encoding of negative pictures on intrusion development and voluntary recall. Healthy participants were shown negative pictures with or without context information. Pictures were either viewed alone or concurrently with a visuospatial or verbal task. Participants reported their intrusive images of the pictures in a diary. At follow-up, perceptual and contextual memory was tested. Participants in the context group reported more intrusive images and perceptual voluntary memory than participants in the no context group. No effects of the concurrent tasks were found on intrusive image frequency, but perceptual and contextual memory was affected according to the cognitive load of the task. The analogue method cannot be generalized to real-life trauma and the secondary tasks may differ in cognitive load. The findings challenge a dual memory model of PTSD but support an account in which retrieval strategy, rather than encoding processes, accounts for the experience of involuntary versus voluntary recall. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Multiple levels of bilingual language control: evidence from language intrusions in reading aloud.

    PubMed

    Gollan, Tamar H; Schotter, Elizabeth R; Gomez, Joanne; Murillo, Mayra; Rayner, Keith

    2014-02-01

    Bilinguals rarely produce words in an unintended language. However, we induced such intrusion errors (e.g., saying el instead of he) in 32 Spanish-English bilinguals who read aloud single-language (English or Spanish) and mixed-language (haphazard mix of English and Spanish) paragraphs with English or Spanish word order. These bilinguals produced language intrusions almost exclusively in mixed-language paragraphs, and most often when attempting to produce dominant-language targets (accent-only errors also exhibited reversed language-dominance effects). Most intrusion errors occurred for function words, especially when they were not from the language that determined the word order in the paragraph. Eye movements showed that fixating a word in the nontarget language increased intrusion errors only for function words. Together, these results imply multiple mechanisms of language control, including (a) inhibition of the dominant language at both lexical and sublexical processing levels, (b) special retrieval mechanisms for function words in mixed-language utterances, and (c) attentional monitoring of the target word for its match with the intended language.

  2. Innovative methods to reduce salt water intrusion in harbours

    NASA Astrophysics Data System (ADS)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  3. DEVELOPMENT OF A SUB-SLAB AIR SAMPLING PROTOCOL TO SUPPORT ASSESSMENT OF VAPOR INTRUSION

    EPA Science Inventory

    The primary purpose of this research effort is to develop a methodology for sub-slab sampling to support the EPA guidance and vapor intrusion investigations after vapor intrusion has been established at a site. Methodologies for sub-slab air sampling are currently lacking in ref...

  4. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    EPA Science Inventory

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  5. Class Action Suits against Public Schools.

    ERIC Educational Resources Information Center

    Mesibov, Laurie

    1984-01-01

    If a suit is brought as a class action, either plaintiff or defendant may move to uphold or challenge class certification. If neither does so, the court decides whether the action may be maintained as a class suit. Prerequisites for class certification from Rule 23 (Federal Rules of Civil Procedure) are explained. (TE)

  6. Early Permian intrusions of the Alai range: Understanding tectonic settings of Hercynian post-collisional magmatism in the South Tien Shan, Kyrgyzstan

    NASA Astrophysics Data System (ADS)

    Konopelko, D.; Wilde, S. A.; Seltmann, R.; Romer, R. L.; Biske, Yu. S.

    2018-03-01

    We present geochemical and Sr-Nd-Pb-Hf isotope data as well as the results of single grain U-Pb zircon dating for ten granitoid and alkaline intrusions of the Alai segment of Kyrgyz South Tien Shan (STS). The intrusions comprise four geochemically contrasting series or suites, including (1) I-type and (2) shoshonitic granitoids, (3) peraluminous granitoids including S-type leucogranites and (4) alkaline rocks and carbonatites, closely associated in space. New geochronological data indicate that these diverse magmatic series of the Alai segment formed in a post-collisional setting. Five single grain U-Pb zircon ages in the range 287-281 Ma, in combination with published ages, define the main post-collisional magmatic pulse at 290-280 Ma, which is similar to ages of post-collisional intrusions elsewhere in the STS. An age of 287 ± 4 Ma, obtained for peraluminous graniodiorite of the Liayliak massif, emplaced in amphibolite-facies metamorphic rocks of the Zeravshan-Alai block, is indistinguishable from ca. 290 Ma age of peraluminous granitoids emplaced coevally with Barrovian-type metamorphism in the Garm block, located ca. 40 km south-west of the research area. The Sr-Nd-Pb-Hf isotopic compositions of the studied intrusions are consistent with the reworking of crustal material with 1.6-1.1 Ga average crustal residence times, indicating the formation of the Alai segment on a continental basement with Mesoproterozoic or older crust. The pattern of post-collisional magmatism in the Alai segment, characterized by emplacement of I-type and shoshoninitic granitoids in combination with coeval Barrovian-type metamorphism, is markedly different from the pattern of post-collisional magmatism in the adjacent Kokshaal segment of the STS with predominant A-type granitoids that formed on a former passive margin of the Tarim Craton. We suggest that during the middle-late Carboniferous the Alai segment probably comprised a microcontinent with Precambrian basement located between

  7. Type D personality, stress coping strategies and self-efficacy as predictors of Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Czuczwar, Stanisław Jerzy

    2017-07-01

    Recently, Facebook has become one of the most popular social networking sites. People use it more and more often. A number of studies have recently addressed the issue of excessive Facebook use, showing this phenomenon to be a spreading problem. The main aim of the present study was to examine whether Type D personality, self-efficacy and coping strategies are related to Facebook intrusion. The participants were 882 students of Polish universities, all of them Facebook users (72% women, mean age: 22.25 years, SD =2.06). We used the Facebook Intrusion Questionnaire, the Facebook Intensity Scale, the General Self-Efficacy Scale, the Coping Inventory for Stressful Situations, and the Type D Scale. We applied the pen-and-paper procedure. Our results indicate that emotion-oriented and avoidance-oriented strategies of coping in stressful situations are predictors of Facebook intrusion and Facebook intensity. The relations between both Facebook intrusion and intensity and social inhibition are significant only when emotion-oriented coping strategy is controlled. The knowledge of whether coping strategies in stressful situations, such as focus on emotions or avoidance, are related to Facebook intrusion might be useful for clinical purposes. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  8. Prediction of changes due to mandibular autorotation following miniplate-anchored intrusion of maxillary posterior teeth in open bite cases.

    PubMed

    Kassem, Hassan E; Marzouk, Eiman S

    2018-05-14

    Prediction of the treatment outcome of various orthodontic procedures is an essential part of treatment planning. Using skeletal anchorage for intrusion of posterior teeth is a relatively novel procedure for the treatment of anterior open bite in long-faced subjects. Data were analyzed from lateral cephalometric radiographs of a cohort of 28 open bite adult subjects treated with intrusion of the maxillary posterior segment with zygomatic miniplate anchorage. Mean ratios and regression equations were calculated for selected variables before and after intrusion. Relative to molar intrusion, there was approximately 100% vertical change of the hard and soft tissue mention and 80% horizontal change of the hard and soft tissue pogonion. The overbite deepened two folds with 60% increase in overjet. The lower lip moved forward about 80% of the molar intrusion. Hard tissue pogonion and mention showed the strongest correlations with molar intrusion. There was a general agreement between regression equations and mean ratios at 3 mm molar intrusion. This study attempted to provide the clinician with a tool to predict the changes in key treatment variables following skeletally anchored maxillary molar intrusion and autorotation of the mandible.

  9. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    USGS Publications Warehouse

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  10. Igneous layering in the peralkaline intrusions ,Kola Peninsula :leading role of gravitational differentiation

    NASA Astrophysics Data System (ADS)

    Kogarko, L. N..

    2012-04-01

    In the center of Kola Peninsula there are two large layered intrusions of agpaitic nepheline syenites - Khibina and Lovozero. . The Khibina alkaline massif (Kola Peninsula,Russia) hosts the world's largest and economically most important apatite deposit. The Khibina massif is a complex multiphase body built up from a number of ring-like and conical intrusions. The apatite bearing intrusion is ring-like and is represented by a layered body of ijolitic composition with a thickness of about 1 - 2 km. The upper zone is represented by different types of apatite ores. These rocks consist of 60-90% euhedral very small (tenths of mm)apatite crystals. The lower zone has mostly ijolitic composition. The lower zone grades into underlying massive urtite consisting of 75-90% large (several mm) euhedral nepheline. Our experimental studies of systems with apatite demonstrated the near-eutectic nature of the apatite-bearing intrusion, resulting in practically simultaneous crystallization of nepheline, apatite and pyroxene. The mathematical model of the formation of the layered apatite-bearing intrusion based on the processes of sedimentation under the conditions of steady state convection taking account of crystal sizes is proposed. Under the conditions of steady-state convection large crystals of nepheline continuously had been settling forming massive underlying urtite whereas smaller crystals of pyroxenes, nepheline and apatite had been stirred in the convecting melt. During the cooling the intensity of convection decreased causing a settling of smaller crystals of nepheline and pyroxene and later very small crystalls of apatite in the upper part of alkaline magma chamber. The Lovozero massif, the largest of the Globe layered peralkaline intrusion, comprises super-large rare-metal (Nb, Ta, REE) deposit. The main ore mineral is loparite (Na, Ce, Ca)2 (Ti, Nb)2O6 which was mined during many years. The composition of cumulus loparite changed systematically upward through the

  11. The ZPIC educational code suite

    NASA Astrophysics Data System (ADS)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  12. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    PubMed

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  13. Repeated magmatic intrusions at El Hierro Island following the 2011-2012 submarine eruption

    NASA Astrophysics Data System (ADS)

    Benito-Saz, Maria A.; Parks, Michelle M.; Sigmundsson, Freysteinn; Hooper, Andrew; García-Cañada, Laura

    2017-09-01

    After more than 200 years of quiescence, in July 2011 an intense seismic swarm was detected beneath the center of El Hierro Island (Canary Islands), culminating on 10 October 2011 in a submarine eruption, 2 km off the southern coast. Although the eruption officially ended on 5 March 2012, magmatic activity continued in the area. From June 2012 to March 2014, six earthquake swarms, indicative of magmatic intrusions, were detected underneath the island. We have studied these post-eruption intrusive events using GPS and InSAR techniques to characterize the ground surface deformation produced by each of these intrusions, and to determine the optimal source parameters (geometry, location, depth, volume change). Source inversions provide insight into the depth of the intrusions ( 11-16 km) and the volume change associated with each of them (between 0.02 and 0.13 km3). During this period, > 20 cm of uplift was detected in the central-western part of the island, corresponding to approximately 0.32-0.38 km3 of magma intruded beneath the volcano. We suggest that these intrusions result from deep magma migrating from the mantle, trapped at the mantle/lower crust discontinuity in the form of sill-like bodies. This study, using joint inversion of GPS and InSAR data in a post-eruption period, provides important insight into the characteristics of the magmatic plumbing system of El Hierro, an oceanic intraplate volcanic island.

  14. The relationship between loss of parents in the holocaust, intrusive memories, and distress among child survivors.

    PubMed

    Letzter-Pouw, Sonia; Werner, Perla

    2012-04-01

    The prevalence of intrusive memories of the Holocaust and their relationship to distress was examined among 272 child survivors in Israel. Using attachment theory as a conceptual framework, the authors also examined the effects of type of experience and loss of parents in the Holocaust, psychological resources, other life events, and sociodemographic characteristics on distress and symptomatic behavior. Eighty five percent of the participants reported suffering from intrusive memories. Structural equation modeling showed that survivors who lost one or both parents in the Holocaust suffered more distress because of more intrusive memories. These findings suggest that intrusive memories may be part of unfinished mourning processes related to the loss of parents in the Holocaust. © 2012 American Orthopsychiatric Association.

  15. Emergency Medical Considerations in a Space-Suited Patient.

    PubMed

    Garbino, Alejandro; Nusbaum, Derek M; Buckland, Daniel M; Menon, Anil S; Clark, Jonathan B; Antonsen, Erik L

    The Stratex Project is a high altitude balloon flight that culminated in a freefall from 41,422 m (135,890 ft), breaking the record for the highest freefall to date. Crew recovery operations required an innovative approach due to the unique nature of the event as well as the equipment involved. The parachutist donned a custom space suit similar to a NASA Extravehicular Mobility Unit (EMU), with life support system mounted to the front and a parachute on the back. This space suit had a metal structure around the torso, which, in conjunction with the parachute and life support assembly, created a significant barrier to extraction from the suit in the event of a medical emergency. For this reason the Medical Support Team coordinated with the pressure suit assembly engineer team for integration, training in suit removal, definition of a priori contingency leadership on site, creation of color-coded extraction scenarios, and extraction drills with a suit mock-up that provided insight into limitations to immediate access. This paper discusses novel extraction processes and contrasts the required medical preparation for this type of equipment with the needs of the prior record-holding jump that used a different space suit with easier immediate access. Garbino A, Nusbaum DM, Buckland DM, Menon AS, Clark JB, Antonsen EL. Emergency medical considerations in a space-suited patient. Aerosp Med Hum Perform. 2016; 87(11):958-962.

  16. Intrusive dike complexes, cumulate cores, and the extrusive growth of Hawaiian volcanoes

    USGS Publications Warehouse

    Flinders, Ashton F.; Ito, Garrett; Garcia, Michael O.; Sinton, John M.; Kauahikaua, Jim; Taylor, Brian

    2013-01-01

    The Hawaiian Islands are the most geologically studied hot-spot islands in the world yet surprisingly, the only large-scale compilation of marine and land gravity data is more than 45 years old. Early surveys served as reconnaissance studies only, and detailed analyses of the crustal-density structure have been limited. Here we present a new chain-wide gravity compilation that incorporates historical island surveys, recently published work on the islands of Hawai‘i, Kaua‘i, and Ni‘ihau, and >122,000 km of newly compiled marine gravity data. Positive residual gravity anomalies reflect dense intrusive bodies, allowing us to locate current and former volcanic centers, major rift zones, and a previously suggested volcano on Ka‘ena Ridge. By inverting the residual gravity data, we generate a 3-D view of the dense, intrusive complexes and olivine-rich cumulate cores within individual volcanoes and rift zones. We find that the Hāna and Ka‘ena ridges are underlain by particularly high-density intrusive material (>2.85 g/cm3) not observed beneath other Hawaiian rift zones. Contrary to previous estimates, volcanoes along the chain are shown to be composed of a small proportion of intrusive material (<30% by volume), implying that the islands are predominately built extrusively.

  17. Report: Lack of Final Guidance on Vapor Intrusion Impedes Efforts to Address Indoor Air Risks

    EPA Pesticide Factsheets

    Report #10-P-0042, December 14, 2009. EPA’s efforts to protect human health at sites where vapor intrusion risks may occur have been impeded by the lack of final Agency guidance on vapor intrusion risks.

  18. Intrusive luxation in primary teeth – Review of literature and report of a case

    PubMed Central

    Gupta, Megha

    2011-01-01

    Luxation injuries such as intrusion are commonly seen in the primary dentition. Intrusion drives the tooth deeper into the alveolar socket, which results in damage to the pulp and peridontium. Difficulty in gaining compliance from a very young child and the risk of damaging the permanent tooth germ makes the management of these injuries challenging. Careful clinical and radiographic examination along with regular follow-up is essential. A case of intrusive luxation to the maxillary central incisor in a 3-year-old patient is reported. Spontaneous reeruption was noted 4 months after injury, but the tooth had developed an abscess and external root resorption. Hence, extraction of the tooth was done and an anterior esthetic fixed space maintainer was placed. Traumatic injuries to the primary dentition should not be ignored by the parents or by the dentist. The paper also includes a literature review of intrusive luxation in the primary dentition. PMID:23960512

  19. [Antigravity suit used for neurosurgical operations in sitting position].

    PubMed

    Szpiro-Zurkowska, A; Milczarek, Z; Marchel, A; Jagielski, J

    1996-01-01

    The aviator's antigravity suit (G-suit) was used for 40 operations on neurosurgical patients operated on in sitting position. The G-suit was filled with air to 0.2 atmosphere (20 kPa) pressure in 26 cases, and 0.3 atm. (30 kPa) in 14 cases. In all cases G-suit filling was followed by central venous pressure rise and mean arterial pressure rise. Venous air embolism was found in 5 (12.5%) patients. No other complications connected with the use of G-suit were observed.

  20. Identifying and forecasting deep stratospheric ozone intrusions over the western United States from space

    NASA Astrophysics Data System (ADS)

    Lin, M.; Fiore, A. M.; Horowitz, L. W.; Cooper, O. R.; Langford, A. O.; Pan, L.; Liu, X.; Reddy, P. J.

    2012-12-01

    Recent studies have shown that deep stratospheric ozone intrusions can episodically enhance ground-level ozone above the health-based standard over the western U.S. in spring. Advanced warning of incoming intrusions could be used by state agencies to inform the public about poor air quality days. Here we explore the potential for using total ozone retrievals (version 5.2, level 3) at twice daily near global coverage from the AIRS instrument aboard the NASA Aqua satellite to identify stratospheric intrusions and forecast the eventual surface destination of transported stratospheric ozone. The method involves the correlation of AIRS daily total ozone columns at each 1ox1o grid box ~1-3 days prior to stratospheric enhancements to daily maximum 8-hour average ozone at a selected surface site using datasets from April to June in 2003-2011. The surface stratospheric enhancements are estimated by the GFDL AM3 chemistry-climate model which includes full stratospheric and tropospheric chemistry and is nudged to reanalysis winds. Our earlier work shows that the model presents deep stratospheric intrusions over the Western U.S. consistently with observations from AIRS, surface networks, daily ozone sondes, and aircraft lidar available in spring of 2010 during the NOAA CalNex field campaign. For the 15 surface sites in the U.S. Mountain West considered, a correlation coefficient of 0.4-0.7 emerges with AIRS ozone columns over 30o-50oN latitudes and 125o-105oW longitudes - variability in the AIRS column within this spatial domain indicates incoming intrusions. For each "surface receptor site", the spatial domain can narrow to an area ~5ox5o northwest of the individual site, with the strong correlation (0.5-0.7) occurring when the AIRS data is lagged by 1 day from the AM3 stratospheric enhancements in surface air. The spatial pattern of correlations is consistent with our process-oriented understanding developed from case studies of extreme intrusions. Surface observations

  1. Acoustic emission intrusion detector

    DOEpatents

    Carver, Donald W.; Whittaker, Jerry W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  2. Suitport Feasibility: Development and Test of a Suitport and Space Suit for Human Pressurized Space Suit Donning Tests

    NASA Technical Reports Server (NTRS)

    Boyle, Robert M.; Mitchell, Kathryn; Allton, Charles; Ju, Hsing

    2012-01-01

    The suitport concept has been recently implemented as part of the small pressurized lunar rover (Currently the Space Exploration vehicle, or SEV) and the Multi-Mission Space Exploration Vehicle (MMSEV) concept demonstrator vehicle. Suitport replaces or augments the traditional airlock function of a spacecraft by providing a bulkhead opening, capture mechanism, and sealing system to allow ingress and egress of a space suit while the space suit remains outside of the pressurized volume of the spacecraft. This presents significant new opportunities to EVA exploration in both microgravity and surface environments. The suitport concept will enable three main improvements in EVA by providing reductions in: pre-EVA time from hours to less than thirty minutes; airlock consumables; contamination returned to the cabin with the EVA crewmember. To date, the first generation suitport has been tested with mockup suits on the rover cabins and pressurized on a bench top engineering unit. The work on the rover cabin has helped define the operational concepts and timelines, and has demonstrated the potential of suitport to save significant amounts of crew time before and after EVAs. The work with the engineering unit has successfully demonstrated the pressurizable seal concept including the ability to seal after the introduction and removal of contamination to the sealing surfaces. Using this experience, a second generation suitport was designed. This second generation suitport has been tested with a space suit prototype on the second generation MMSEV cabin, and testing is planned using the pressure differentials of the spacecraft. Pressurized testing will be performed using the JSC B32 Chamber B, a human rated vacuum chamber. This test will include human rated suitports, a suitport compatible prototype suit, and chamber modifications. This test will bring these three elements together in the first ever pressurized donning of a rear entry suit through a suitport. This paper presents

  3. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    NASA Astrophysics Data System (ADS)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  4. The Torres del Paine intrusion as a model for a shallow magma chamber

    NASA Astrophysics Data System (ADS)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  5. Metabolic Assessment of Suited Mobility Using Functional Tasks

    NASA Technical Reports Server (NTRS)

    Norcross, J. R.; McFarland, S. M.; Ploutz-Snyder, Robert

    2016-01-01

    Existing methods for evaluating extravehicular activity (EVA) suit mobility have typically focused on isolated joint range of motion or torque, but these techniques have little to do with how well a crewmember functionally performs in an EVA suit. To evaluate suited mobility at the system level through measuring metabolic cost (MC) of functional tasks.

  6. Intrusion of Soil Water through Pipe Cracks

    EPA Science Inventory

    This report describes a series of experiments conducted at U.S. EPA’s Test and Evaluation Facility in 2013-2014 to study the intrusion of contaminated soil water into a pipe crack during simulated backflow events. A test rig was used consisting of a 3’ x 3’ x 3’ acrylic soil bo...

  7. LANDSAT and radar mapping of intrusive rocks in SE-Brazil

    NASA Technical Reports Server (NTRS)

    Parada, N. D. J. (Principal Investigator); Dossantos, A. R.; Dosanjos, C. E.; Moreira, J. C.; Barbosa, M. P.; Veneziani, P.

    1982-01-01

    The feasibility of intrusive rock mapping was investigated and criteria for regional geological mapping established at the scale of 1:500,00 in polycyclic and polymetamorphic areas using the logic method of photointerpretation of LANDSAT imagery and radar from the RADAMBRASIL project. The spectral behavior of intrusive rocks, was evaluated using the interactive multispectral image analysis system (Image-100). The region of Campos (city) in northern Rio de Janeiro State was selected as the study area and digital imagery processing and pattern recognition techniques were applied. Various maps at the 2:250,000 scale were obtained to evaluate the results of automatic data processing.

  8. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island.

    NASA Astrophysics Data System (ADS)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen

    2017-04-01

    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  9. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    PubMed

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  10. User's Guide for Evaluating Subsurface Vapor Intrusion into Buildings

    EPA Pesticide Factsheets

    This revised version of the User's Guide corresponds with the release of Version 3.1 of the Johnson and Ettinger (1991) model (J E) spreadsheets for estimating subsurface vapor intrusion into buildings.

  11. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    NASA Astrophysics Data System (ADS)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  12. Suites of dwarfs around Nearby giant galaxies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karachentsev, Igor D.; Kaisina, Elena I.; Makarov, Dmitry I., E-mail: ikar@sao.ru, E-mail: kei@sao.ru, E-mail: dim@sao.ru

    2014-01-01

    The Updated Nearby Galaxy Catalog (UNGC) contains the most comprehensive summary of distances, radial velocities, and luminosities for 800 galaxies located within 11 Mpc from us. The high density of observables in the UNGC makes this sample indispensable for checking results of N-body simulations of cosmic structures on a ∼1 Mpc scale. The environment of each galaxy in the UNGC was characterized by a tidal index Θ{sub 1}, depending on the separation and mass of the galaxy's main disturber (MD). We grouped UNGC galaxies with a common MD in suites, and ranked suite members according to their Θ{sub 1}. Allmore » suite members with positive Θ{sub 1} are assumed to be physical companions of the MD. About 58% of the sample are members of physical groups. The distribution of suites by the number of members, n, follows a relation N(n) ∼ n {sup –2}. The 20 most populated suites contain 468 galaxies, i.e., 59% of the UNGC sample. The fraction of MDs among the brightest galaxies is almost 100% and drops to 50% at M{sub B} = –18{sup m}. We discuss various properties of MDs, as well as galaxies belonging to their suites. The suite abundance practically does not depend on the morphological type, linear diameter, or hydrogen mass of the MD, the tightest correlation being with the MD dynamical mass. Dwarf galaxies around MDs exhibit well-known segregation effects: the population of the outskirts has later morphological types, richer H I contents, and higher rates of star formation activity. Nevertheless, there are some intriguing cases where dwarf spheroidal galaxies occur at the far periphery of the suites, as well as some late-type dwarfs residing close to MDs. Comparing simulation results with galaxy groups, most studies assume the Local Group is fairly typical. However, we recognize that the nearby groups significantly differ from each other and there is considerable variation in their properties. The suites of companions around the Milky Way and M31, consisting

  13. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    EPA Science Inventory

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  14. Space Suit Joint Torque Measurement Method Validation

    NASA Technical Reports Server (NTRS)

    Valish, Dana; Eversley, Karina

    2012-01-01

    In 2009 and early 2010, a test method was developed and performed to quantify the torque required to manipulate joints in several existing operational and prototype space suits. This was done in an effort to develop joint torque requirements appropriate for a new Constellation Program space suit system. The same test method was levied on the Constellation space suit contractors to verify that their suit design met the requirements. However, because the original test was set up and conducted by a single test operator there was some question as to whether this method was repeatable enough to be considered a standard verification method for Constellation or other future development programs. In order to validate the method itself, a representative subset of the previous test was repeated, using the same information that would be available to space suit contractors, but set up and conducted by someone not familiar with the previous test. The resultant data was compared using graphical and statistical analysis; the results indicated a significant variance in values reported for a subset of the re-tested joints. Potential variables that could have affected the data were identified and a third round of testing was conducted in an attempt to eliminate and/or quantify the effects of these variables. The results of the third test effort will be used to determine whether or not the proposed joint torque methodology can be applied to future space suit development contracts.

  15. Suited Occupant Injury Potential During Dynamic Spacecraft Flight Phases

    NASA Technical Reports Server (NTRS)

    Dub, Mark O.; McFarland, Shane M.

    2010-01-01

    In support of the Constellation Space Suit Element [CSSE], a new space-suit architecture will be created for support of Launch, Entry, Abort, Microgravity Extra- Vehicular Activity [EVA], and post-landing crew operations, safety and, under emergency conditions, survival. The space suit is unique in comparison to previous launch, entry, and abort [LEA] suit architectures in that it utilizes rigid mobility elements in the scye (i.e., shoulder) and the upper arm regions. The suit architecture also utilizes rigid thigh disconnect elements to create a quick disconnect approximately located above the knee. This feature allows commonality of the lower portion of the suit (from the thigh disconnect down), making the lower legs common across two suit configurations. This suit must interface with the Orion vehicle seat subsystem, which includes seat components, lateral supports, and restraints. Due to the unique configuration of spacesuit mobility elements, combined with the need to provide occupant protection during dynamic vehicle events, risks have been identified with potential injury due to the suit characteristics described above. To address the risk concerns, a test series has been developed in coordination with the Injury Biomechanics Research Laboratory [IBRL] to evaluate the likelihood and consequences of these potential issues. Testing includes use of Anthropomorphic Test Devices [ATDs; vernacularly referred to as "crash test dummies"], Post Mortem Human Subjects [PMHS], and representative seat/suit hardware in combination with high linear acceleration events. The ensuing treatment focuses on test purpose and objectives; test hardware, facility, and setup; and preliminary results.

  16. Complexity of Sizing for Space Suit Applications

    NASA Technical Reports Server (NTRS)

    Rajulu, Sudhakar; Benson, Elizabeth

    2009-01-01

    The `fit? of a garment is often considered to be a subjective measure of garment quality. However, some experts attest that a complaint of poor garment fit is a symptom of inadequate or excessive ease, the space between the garment and the wearer. Fit has traditionally been hard to quantify, and space suits are an extreme example, where fit is difficult to measure but crucial for safety and operability. A proper space suit fit is particularly challenging because of NASA?s need to fit an incredibly diverse population (males and females from the 1st to 99th percentile) while developing a minimum number of space suit sizes. Because so few sizes are available, the available space suits must be optimized so that each fits a large segment of the population without compromising the fit of any one wearer.

  17. Thermal Analysis and Design of an Advanced Space Suit

    NASA Technical Reports Server (NTRS)

    Lin, Chin H.; Campbell, Anthony B.; French, Jonathan D.; French, D.; Nair, Satish S.; Miles, John B.

    2000-01-01

    The thermal dynamics and design of an Advanced Space Suit are considered. A transient model of the Advanced Space Suit has been developed and implemented using MATLAB/Simulink to help with sizing, with design evaluation, and with the development of an automatic thermal comfort control strategy. The model is described and the thermal characteristics of the Advanced Space suit are investigated including various parametric design studies. The steady state performance envelope for the Advanced Space Suit is defined in terms of the thermal environment and human metabolic rate and the transient response of the human-suit-MPLSS system is analyzed.

  18. Music effects on EEG in intrusive and withdrawn mothers with depressive symptoms.

    PubMed

    Tornek, Alexandra; Field, Tiffany; Hernandez-Reif, Maria; Diego, Miguel; Jones, Nancy

    2003-01-01

    The EEG patterns of 48 intrusive and withdrawn mothers with depressive symptoms were assessed following a 20-minute music session to determine if the music had mood-altering effects. Half the mothers listened to classical music while half listened to rock music. Intrusive mothers were expected to have more positive responses and more symmetrical EEG following the calming classical music, while withdrawn mothers were expected to have a more positive response and symmetrical EEG following the energizing rock music. Although more positive EEGs were noted for rock music in both groups, only the withdrawn mothers showed a significant change in EEG toward symmetry following rock music, and only the intrusive mothers showed a decrease in cortisol levels following the rock music. Their State Anxiety Inventory (STAI) anxiety levels also decreased, while the Profile of Mood States (POMS) depressed mood levels decreased significantly for all four groups following music.

  19. Quantitation by Portable Gas Chromatography: Mass Spectrometry of VOCs Associated with Vapor Intrusion

    PubMed Central

    Fair, Justin D.; Bailey, William F.; Felty, Robert A.; Gifford, Amy E.; Shultes, Benjamin; Volles, Leslie H.

    2010-01-01

    Development of a robust reliable technique that permits for the rapid quantitation of volatile organic chemicals is an important first step to remediation associated with vapor intrusion. This paper describes the development of an analytical method that allows for the rapid and precise identification and quantitation of halogenated and nonhalogenated contaminants commonly found within the ppbv level at sites where vapor intrusion is a concern. PMID:20885969

  20. Advanced EVA Suit Camera System Development Project

    NASA Technical Reports Server (NTRS)

    Mock, Kyla

    2016-01-01

    The National Aeronautics and Space Administration (NASA) at the Johnson Space Center (JSC) is developing a new extra-vehicular activity (EVA) suit known as the Advanced EVA Z2 Suit. All of the improvements to the EVA Suit provide the opportunity to update the technology of the video imagery. My summer internship project involved improving the video streaming capabilities of the cameras that will be used on the Z2 Suit for data acquisition. To accomplish this, I familiarized myself with the architecture of the camera that is currently being tested to be able to make improvements on the design. Because there is a lot of benefit to saving space, power, and weight on the EVA suit, my job was to use Altium Design to start designing a much smaller and simplified interface board for the camera's microprocessor and external components. This involved checking datasheets of various components and checking signal connections to ensure that this architecture could be used for both the Z2 suit and potentially other future projects. The Orion spacecraft is a specific project that may benefit from this condensed camera interface design. The camera's physical placement on the suit also needed to be determined and tested so that image resolution can be maximized. Many of the options of the camera placement may be tested along with other future suit testing. There are multiple teams that work on different parts of the suit, so the camera's placement could directly affect their research or design. For this reason, a big part of my project was initiating contact with other branches and setting up multiple meetings to learn more about the pros and cons of the potential camera placements we are analyzing. Collaboration with the multiple teams working on the Advanced EVA Z2 Suit is absolutely necessary and these comparisons will be used as further progress is made for the overall suit design. This prototype will not be finished in time for the scheduled Z2 Suit testing, so my time was

  1. Physiological responses to wearing the space shuttle launch and entry suit and the prototype advanced crew escape suit compared to the unsuited condition

    NASA Technical Reports Server (NTRS)

    Barrows, Linda H.; Mcbrine, John J.; Hayes, Judith C.; Stricklin, Marcella D.; Greenisen, Michael C.

    1993-01-01

    The launch and entry suit (LES) is a life support suit worn during Orbiter ascent and descent. The impact of suit weight and restricted mobility on egress from the Orbiter during an emergency is unknown. An alternate suit - the advanced crew escape suite (ACES) - is being evaluated. The physiological responses to ambulatory exercise of six subjects wearing the LES and ACES were measured and compared to those measurements taken while unsuited. Dependent variables included heart rate and metabolic response to treadmill walking at 5.6 km/h (3.5 mph), and also bilateral concentric muscle strength about the knee, shoulder, and elbow. No significant (p greater than 0.06) differences in heart rate or metabolic variables were measured in either suit while walking at 5.6 km/h. Significant (p less than 0.05) decreases in all metabolic variables were remarked when both suits were compared to the unsuited condition. There were no significant (p greater than 0.05) differences among the three suit conditions at 30 or 180 deg/s for muscles about the elbow and knee; however, about the shoulder, a significant (p = 0.0215) difference between the ACES and the unsuited condition was noted. Therefore, wearing a life support suit while performing Orbiter egress imposes a significant metabolic demand on crewmembers. Selective upper body strength movements may be compromised.

  2. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

    PubMed Central

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-01-01

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu–Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors. PMID:23529146

  3. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features.

    PubMed

    Amudha, P; Karthik, S; Sivakumari, S

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different.

  4. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    PubMed Central

    Amudha, P.; Karthik, S.; Sivakumari, S.

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  5. A distributed signature detection method for detecting intrusions in sensor systems.

    PubMed

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-03-25

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

  6. Individual differences in experiencing intrusive memories: the role of the ability to resist proactive interference.

    PubMed

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J

    2009-06-01

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N=91) completed a self-report measure of intrusive memories, and carried out experimental tasks intended to measure two different types of inhibition: resistance to proactive interference and response inhibition (i.e., the ability to prevent automatically triggered responses). The results showed a significant relationship between inhibition at the cognitive level (i.e., resistance to proactive interference) and the frequency of intrusive memories (especially in the group of female participants) whereas no such relationship with measures of response inhibition emerged. These findings are consistent with the idea that deficient inhibitory control reflects a vulnerability factor for experiencing intrusive memories. Implications for research investigating risk factors for the development of posttraumatic stress disorder (PTSD) are discussed.

  7. Open architecture of smart sensor suites

    NASA Astrophysics Data System (ADS)

    Müller, Wilmuth; Kuwertz, Achim; Grönwall, Christina; Petersson, Henrik; Dekker, Rob; Reinert, Frank; Ditzel, Maarten

    2017-10-01

    Experiences from recent conflicts show the strong need for smart sensor suites comprising different multi-spectral imaging sensors as core elements as well as additional non-imaging sensors. Smart sensor suites should be part of a smart sensor network - a network of sensors, databases, evaluation stations and user terminals. Its goal is to optimize the use of various information sources for military operations such as situation assessment, intelligence, surveillance, reconnaissance, target recognition and tracking. Such a smart sensor network will enable commanders to achieve higher levels of situational awareness. Within the study at hand, an open system architecture was developed in order to increase the efficiency of sensor suites. The open system architecture for smart sensor suites, based on a system-of-systems approach, enables combining different sensors in multiple physical configurations, such as distributed sensors, co-located sensors combined in a single package, tower-mounted sensors, sensors integrated in a mobile platform, and trigger sensors. The architecture was derived from a set of system requirements and relevant scenarios. Its mode of operation is adaptable to a series of scenarios with respect to relevant objects of interest, activities to be observed, available transmission bandwidth, etc. The presented open architecture is designed in accordance with the NATO Architecture Framework (NAF). The architecture allows smart sensor suites to be part of a surveillance network, linked e.g. to a sensor planning system and a C4ISR center, and to be used in combination with future RPAS (Remotely Piloted Aircraft Systems) for supporting a more flexible dynamic configuration of RPAS payloads.

  8. Comparison of the intrusion effects on the maxillary incisors between implant anchorage and J-hook headgear.

    PubMed

    Deguchi, Toru; Murakami, Takashi; Kuroda, Shingo; Yabuuchi, Toshinori; Kamioka, Hiroshi; Takano-Yamamoto, Teruko

    2008-05-01

    Recently, miniscrews have been used to provide anchorage during orthodontic treatment, especially for incisor intrusion. Miniscrews during incisor intrusion are commonly used in implant orthodontics. Traditionally, effective incisor intrusion has been accomplished with J-hook headgear. In this study, we compared the effect of incisor intrusion, force vector, and amount of root resorption between implant orthodontics and J-hook headgear. Lateral cephalometric radiographs from 8 patients in the implant group and 10 patients in the J-hook headgear group were analyzed for incisor retraction. The estimated force vector was analyzed in the horizontal and vertical directions in both groups. Root resorption was also measured on periapical radiographs. In the implant group, significant reductions in overjet, overbite, maxillary incisor to palatal plane, and maxillary incisor to upper lip were observed after intrusion of the incisors. In the J-hook headgear group, significant reductions in overjet, overbite, maxillary incisor to upper lip, and maxillary incisor to SN plane were observed after intrusion of the incisors. There were significantly greater reductions in overbite, maxillary incisor to palatal plane, and maxillary incisor to upper lip in the implant group than in the J-hook headgear group. Estimated force analysis resulted in significantly more force in the vertical direction and less in the horizontal direction in the implant group. Furthermore, significantly less root resorption was observed in the implant group compared with the J-hook headgear group. The maxillary incisors were effectively intruded by using miniscrews as orthodontic anchorage without patient cooperation. The amount of root resorption was not affected by activating the ligature wire from the miniscrew during incisor intrusion.

  9. EVA Suit R and D for Performance Optimization

    NASA Technical Reports Server (NTRS)

    Cowley, Matthew S.; Harvill, Lauren; Benson, Elizabeth; Rajulu, Sudhakar

    2014-01-01

    Designing a planetary suit is very complex and often requires difficult trade-offs between performance, cost, mass, and system complexity. To verify that new suit designs meet requirements, full prototypes must be built and tested with human subjects. However, numerous design iterations will occur before the hardware meets those requirements. Traditional draw-prototype-test paradigms for R&D are prohibitively expensive with today's shrinking Government budgets. Personnel at NASA are developing modern simulation techniques which focus on human-centric designs by creating virtual prototype simulations and fully adjustable physical prototypes of suit hardware. During the R&D design phase, these easily modifiable representations of an EVA suit's hard components will allow designers to think creatively and exhaust design possibilities before they build and test working prototypes with human subjects. It allows scientists to comprehensively benchmark current suit capabilities and limitations for existing suit sizes and sizes that do not exist. This is extremely advantageous and enables comprehensive design down-selections to be made early in the design process, enables the use of human performance as design criteria, and enables designs to target specific populations

  10. Advanced Sensor Platform to Evaluate Manloads For Exploration Suit Architectures

    NASA Technical Reports Server (NTRS)

    McFarland, Shane; Pierce, Gregory

    2016-01-01

    Space suit manloads are defined as the outer bounds of force that the human occupant of a suit is able to exert onto the suit during motion. They are defined on a suit-component basis as a unit of maximum force that the suit component in question must withstand without failure. Existing legacy manloads requirements are specific to the suit architecture of the EMU and were developed in an iterative fashion; however, future exploration needs dictate a new suit architecture with bearings, load paths, and entry capability not previously used in any flight suit. No capability currently exists to easily evaluate manloads imparted by a suited occupant, which would be required to develop requirements for a flight-rated design. However, sensor technology has now progressed to the point where an easily-deployable, repeatable and flexible manloads measuring technique could be developed leveraging recent advances in sensor technology. INNOVATION: This development positively impacts schedule, cost and safety risk associated with new suit exploration architectures. For a final flight design, a comprehensive and accurate man loads requirements set must be communicated to the contractor; failing that, a suit design which does not meet necessary manloads limits is prone to failure during testing or worse, during an EVA, which could cause catastrophic failure of the pressure garment posing risk to the crew. This work facilitates a viable means of developing manloads requirements using a range of human sizes & strengths. OUTCOME / RESULTS: Performed sensor market research. Highlighted three viable options (primary, secondary, and flexible packaging option). Designed/fabricated custom bracket to evaluate primary option on a single suit axial. Manned suited manload testing completed and general approach verified.

  11. Economic potential of the Rooiberg Group: volcanic rocks in the floor and roof of the Bushveld Complex

    NASA Astrophysics Data System (ADS)

    Schweitzer, J. K.; Hatton, C. J.; de Waal, S. A.

    1995-04-01

    Volcanic rocks of the Rooiberg Group are preserved in the floor and roof of the mafic Rustenburg Layered Suite of the Bushveld Complex. Field and geochemical characteristics of these volcanic rocks imply that they are genetically related to the Rustenburg Layered Suite. Four major ore-forming events are identified in the Rooiberg Group. The first phase was accompanied by volcanic hosted, fault controlled, hydrothermal copper mineralisation, which is found in the lowermost portion of the Rooiberg Group, underlying the Rustenburg Layered Suite. This type of mineralisation is tentatively linked to initial Rustenburg Layered Suite intrusions. Stratabound arsenic mineralisation that possibly formed in response to contact metamorphism, characterises the second phase, and occurred after extrusion of the Damwal Formation, possibly due to shallow granophyric intrusion. The third mineralising event occurred in response to contact metamorphism during the final stages of the Rustenburg Layered Suite, where especially Pb and Zn were introduced into the felsite roof rocks. This type of mineralisation affected the majority of the Rooiberg Group, but is most pronounced towards the contact with the Rustenburg Layered Suite. The fourth phase is restricted to the Rooiberg Group in the Nylstroom area and is linked to the granite intrusions of the Lebowa Granite Suite, from which Sn and F were introduced into the uppermost felsite succession. Mineralisation in the Rooiberg Group appears to be controlled by the character and intrusion level of the associated Bushveld magmas. Different styles of mineralisation in Rooiberg Group volcanic rocks are encountered at various stratigraphic levels. Major primary volcanogenic ore deposits appear to be absent.

  12. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.F.; Maccabe, A.B.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  13. Investigating the long-term geodetic response to magmatic intrusions at volcanoes in northern California

    NASA Astrophysics Data System (ADS)

    Parker, A. L.; Biggs, J.; Annen, C.; Houseman, G. A.; Yamasaki, T.; Wright, T. J.; Walters, R. J.; Lu, Z.

    2014-12-01

    Ratios of intrusive to extrusive activity at volcanic arcs are thought to be high, with estimates ranging between 5:1 and 30:1. Understanding the geodetic response to magmatic intrusion is therefore fundamental to large-scale studies of volcano deformation, providing insight into the dynamics of the inter-eruptive period of the volcano cycle and the building of continental crust. In northern California, we identify two volcanoes - Medicine Lake Volcano (MLV) and Lassen Volcanic Center (LaVC) - that exhibit long-term (multi-decadal) subsidence. We test the hypothesis that deformation at these volcanoes results from processes associated with magmatic intrusions. We first constrain the spatial and temporal characteristics of the deformation fields, establishing the first time-series of deformation at LaVC using InSAR data, multi-temporal analysis techniques and global weather models. Although the rates of deformation at the two volcanoes are similar (~1 cm/yr), our results show that the ratio of vertical to horizontal displacements is significantly different, suggesting contrasting source geometries. To test the origin of deformation, we develop modeling strategies to investigate thermal and viscoelastic processes associated with magmatic intrusions. The first model we develop couples analytical geodetic models to a numerical model of volume loss due to cooling and crystallization based upon temperature-melt fraction relationships from petrological experiments. This model provides evidence that magmatic intrusion at MLV has occurred more recently than the last eruption ~1 ka. The second model we test uses a finite element approach to simulate the time-dependent viscoelastic response of the crust to magmatic intrusion. We assess the magnitude and timescales of ground deformation that may result from these processes, exploring the model parameter space before applying the models to our InSAR observations of subsidence in northern California.

  14. Meso to Neoproterozoic layered mafic-ultramafic rocks from the Virorco back-arc intrusion, Argentina

    NASA Astrophysics Data System (ADS)

    Ferracutti, Gabriela; Bjerg, Ernesto; Hauzenberger, Christoph; Mogessie, Aberra; Cacace, Francisco; Asiain, Lucía

    2017-11-01

    The Virorco layered mafic-ultramafic intrusion is part of a belt that extends over 100 km from NE to SW in the Eastern Sierras Pampeanas of San Luis, Argentina. The rocks of this belt carry a Fe-Cu-Ni sulphide mineralization in veins and as disseminated and massive ore. Platinum group minerals are associated with the sulphides. The Virorco intrusion exhibits modal, textural and cryptic layering. New results allow the characterization of six layered units (Modal Layered Unit, Pyroxenitic Macro-Layered Unit, Gabbroic Unit, Banded Unit, Hornblende Norite Unit and Gabbronorite Unit) present in three sectors of the intrusion (Eastern, Central and Western). The units from the Western Sector (Banded Unit, Hornblende Norite Unit and Gabbronorite Unit) and the Modal Layered Unit from the Eastern Sector belong to the Marginal Border Series of the intrusion. Meanwhile, the Central sector units (Pyroxenitic Macro-Layered Unit and Gabbroic Unit) are from the Layered Series. The presence of crescumulate texture (Modal Layered Unit) and colloform banding (Banded Unit) are evidences of "in situ" crystallization due to supercooling of a MgO-rich hydrated mafic magma, where cooling proceeded from the walls towards the interior of the magma chamber. In previous studies the mafic-ultramafic rocks have been considered to be Cambrian to Ordovician. Here we present a Sm-Nd whole rock isochron which shows that the formation age of these intrusions is 1002 ± 150 Ma and that the protolith age of the Pringles Metamorphic Complex metasedimentary rocks is 1289 ± 97 Ma. Our study also indicates that the San Luis mafic-ultramafic layered intrusives most probably formed in a back-arc tectonic setting, from an enriched sub-continental mantle, influenced by a subducting slab and/or crust injection into the Pampia Terrane prior to its collision with the Rio de la Plata Craton.

  15. Executive functions in adolescents with spina bifida: relations with autonomy development and parental intrusiveness.

    PubMed

    Tuminello, Elizabeth R; Holmbeck, Grayson N; Olson, Rick

    2012-01-01

    The current study was part of a larger longitudinal investigation and examined the relation of parent-report and performance measures of executive functioning (EF) with measures of behavioral and emotional autonomy and parental intrusiveness in adolescents with and without spina bifida (SB; n=65 in a comparison sample and 61 in an SB sample; M age=14.55, SD=0.63). For both groups, higher levels of parent-reported EF problems predicted higher levels of observed child dependency and lower levels of teacher-reported intrinsic motivation. Higher scores on performance EF measures predicted lower levels of observed child dependency and observed maternal intrusiveness for both groups. In adolescents with SB only, higher performance EF scores predicted higher intrinsic motivation and emotional autonomy from both mother and father and predicted lower levels of observed paternal intrusiveness. While causal conclusions cannot be drawn, EFs appear to be closely related to autonomy development and parental intrusiveness, particularly for adolescents with SB. These results suggest that the inclusion of EF training in interventions targeting adolescents with SB may be beneficial for autonomy development.

  16. Geophysical Characterization of a Rare Earth Element Enriched Carbonatite Terrane at Mountain Pass, California Eastern Mojave Desert

    NASA Astrophysics Data System (ADS)

    Denton, Kevin M.

    Mountain Pass, California, located in the eastern Mojave Desert, hosts one of the world's richest rare earth element (REE) deposits. The REE-rich rocks occur in a 2.5 km- wide, north-northwest trending zone of Mesoproterozoic (1.4-1.42 Ga) stocks and dikes, which intrude a larger Paleoproterozoic (1.7 Ga) schist-gneiss terrane that extends 10 km southward from Clark Mountain to the Mescal Range. Several REE-enriched bodies make up the Mountain Pass intrusive suite including shonkinite, syenite, and granite comprising an ultrapotassic intrusive suite and the Sulphide Queen carbonatite body. Two-dimensional modeling of gravity, magnetic, and electrical resistivity data reveals that the Mountain Pass intrusive suite is associated with a local gravity high that is superimposed on a 4-km wide gravity terrace. Rock property data indicate that the Mountain Pass intrusive suite is unusually nonmagnetic at the surface (2.0 x 10-3 SI, n = 67). However, aeromagnetic data indicate that these rocks occur along the eastern edge of a prominent north-northwest trending aeromagnetic high of unknown origin. The source of this unknown magnetic anomaly is 2-3 km below the surface and coincides with a body of rock having high electrical conductivity. Electrical resistivity models indicate that this unknown magnetic anomaly is several orders of magnitude more conductive (103 O•m) than the surrounding rock. Combined geophysical data suggest that the carbonatite and its associated ultrapotassic intrusive suite were preferentially emplaced along a northwest zone of weakness and/or a fault.

  17. Z-2 Prototype Space Suit Development

    NASA Technical Reports Server (NTRS)

    Ross, Amy; Rhodes, Richard; Graziosi, David; Jones, Bobby; Lee, Ryan; Haque, Bazle Z.; Gillespie, John W., Jr.

    2014-01-01

    NASA's Z-2 prototype space suit is the highest fidelity pressure garment from both hardware and systems design perspectives since the Space Shuttle Extravehicular Mobility Unit (EMU) was developed in the late 1970's. Upon completion the Z-2 will be tested in the 11 foot human-rated vacuum chamber and the Neutral Buoyancy Laboratory (NBL) at the NASA Johnson Space Center to assess the design and to determine applicability of the configuration to micro-, low- (asteroid), and planetary- (surface) gravity missions. This paper discusses the 'firsts' that the Z-2 represents. For example, the Z-2 sizes to the smallest suit scye bearing plane distance for at least the last 25 years and is being designed with the most intensive use of human models with the suit model.

  18. Geochemistry and tectonic implications of the Early Carboniferous Keketuobie intrusion in the West Junggar foldbelt, NW China

    NASA Astrophysics Data System (ADS)

    Deng, Yu-Feng; Yuan, Feng; Zhou, Taofa; Hollings, Pete; Zhang, Dayu

    2018-06-01

    The Keketuobie intrusion is situated in the northern part of the West Junggar foldbelt at the southern margin of the Central Asian Orogeic Belt. The intrusion consists of medium- to coarse-grained gabbro, fine-grained gabbro and diorite. Igneous zircons from the medium- to coarse-grained gabbro yielded a LA-ICP-MS U-Pb age of 320.8 ± 5.7 Ma, indicating that the intrusion was emplaced in the Early Carboniferous. The intrusive contact between the medium- to coarse-grained gabbro and the fine-grained gabbro indicates they formed from distinct magma pulses. Magnetite crystals from the fine-grained gabbro have lower V2O3 but higher TiO2 and Al2O3 contents than those of the medium- to coarse-grained gabbro, suggesting that the fine-grained gabbro crystallized in a relatively higher fO2 and temperature magma than the medium- to coarse-grained gabbro. The Keketuobie intrusive rocks are characterized by enriched large ion lithophile elements and depleted high field strength elements relative to N-MORB with restricted (87Sr/86Sr)t ratios (0.70370-0.70400) and εNd(t) values (+5.85 to +6.97). The petrography and geochemistry are comparable to those of subduction-related volcanic rocks. The trace elements and isotopic compositions of the mafic intrusive rocks suggest that the primary magmas were derived from mixing of metasomatized lithospheric mantle and depleted asthenospheric melts, perhaps triggered by slab break-off. The Keketuobie intrusion is younger than adjacent ophiolite sequences, island arc volcanic rocks and porphyry deposits, but predates the post-collisional A-type granites and bimodal volcanic rocks in the district, suggesting that the Keketuobie intrusion likely formed in a syn-collisional setting.

  19. Geophysical characterization of saltwater intrusion in a coastal aquifer: The case of Martil-Alila plain (North Morocco)

    NASA Astrophysics Data System (ADS)

    Himi, Mahjoub; Tapias, Josefiina; Benabdelouahab, Sara; Salhi, Adil; Rivero, Luis; Elgettafi, Mohamed; El Mandour, Abdenabi; Stitou, Jamal; Casas, Albert

    2017-02-01

    Several factors can affect the quantity and the quality of groundwater resources, but in coastal aquifers seawater intrusion is often the most significant issue regarding freshwater supply. Further, saltwater intrusion is a worldwide issue because about seventy percent of the world's population lives in coastal regions. Generally, fresh groundwater not affected by saltwater intrusion is characterized by low salinity and therefore low electrical conductivity (EC) values. Consequently, high values of EC in groundwater along the coastline are usually associated to seawater intrusion. This effect is amplified if the coastal aquifer is overexploited with a subsequent gradual displacement of the freshwater-saltwater interface towards the continent. Delineation of marine intrusion in coastal aquifers has traditionally relied upon observation wells and collection of water samples. This approach may miss important hydrologic features related to saltwater intrusion in areas where access is difficult and where wells are widely spaced. Consequently, the scarcity of sampling points and sometimes their total absence makes the number of data available limited and most of the time not representative for mapping the spatial and temporal variability of groundwater salinity. In this study, we use a series of geophysical methods for characterizing the aquifer geometry and the extension of saltwater intrusion in the Martil-Alila coastal region (Morocco) as a complement to geological and hydrogeochemical data. For this reason, we carried out three geophysical surveys: Gravity, Electrical Resistivity and Frequency Domain Electromagnetic. The geometry of the basin has been determined from the interpretation of a detailed gravity survey. Electrical resistivity models derived from vertical electrical soundings allowed to characterize the vertical and the lateral extensions of aquifer formations. Finally, frequency domain electromagnetic methods allowed delineating the extension of the

  20. First steps in using machine learning on fMRI data to predict intrusive memories of traumatic film footage

    PubMed Central

    Clark, Ian A.; Niehaus, Katherine E.; Duff, Eugene P.; Di Simplicio, Martina C.; Clifford, Gari D.; Smith, Stephen M.; Mackay, Clare E.; Woolrich, Mark W.; Holmes, Emily A.

    2014-01-01

    After psychological trauma, why do some only some parts of the traumatic event return as intrusive memories while others do not? Intrusive memories are key to cognitive behavioural treatment for post-traumatic stress disorder, and an aetiological understanding is warranted. We present here analyses using multivariate pattern analysis (MVPA) and a machine learning classifier to investigate whether peri-traumatic brain activation was able to predict later intrusive memories (i.e. before they had happened). To provide a methodological basis for understanding the context of the current results, we first show how functional magnetic resonance imaging (fMRI) during an experimental analogue of trauma (a trauma film) via a prospective event-related design was able to capture an individual's later intrusive memories. Results showed widespread increases in brain activation at encoding when viewing a scene in the scanner that would later return as an intrusive memory in the real world. These fMRI results were replicated in a second study. While traditional mass univariate regression analysis highlighted an association between brain processing and symptomatology, this is not the same as prediction. Using MVPA and a machine learning classifier, it was possible to predict later intrusive memories across participants with 68% accuracy, and within a participant with 97% accuracy; i.e. the classifier could identify out of multiple scenes those that would later return as an intrusive memory. We also report here brain networks key in intrusive memory prediction. MVPA opens the possibility of decoding brain activity to reconstruct idiosyncratic cognitive events with relevance to understanding and predicting mental health symptoms. PMID:25151915

  1. Paleomagnetic record of a geomagnetic field reversal from late miocene mafic intrusions, southern nevada.

    PubMed

    Ratcliff, C D; Geissman, J W; Perry, F V; Crowe, B M; Zeitler, P K

    1994-10-21

    Late Miocene (about 8.65 million years ago) mafic intrusions and lava flows along with remagnetized host rocks from Paiute Ridge, southern Nevada, provide a high-quality paleomagnetic record of a geomagnetic field reversal. These rocks yield thermoremanent magnetizations with declinations of 227 degrees to 310 degrees and inclinations of -7 degrees to 49 degrees , defining a reasonably continuous virtual geomagnetic pole path over west-central Pacific longitudes. Conductive cooling estimates for the intrusions suggest that this field transition, and mafic magmatism, lasted only a few hundred years. Because this record comes principally from intrusive rocks, rather than sediments or lavas, it is important in demonstrating the longitudinal confinement of the geomagnetic field during a reversal.

  2. Visual behavior characterization for intrusion and misuse detection

    NASA Astrophysics Data System (ADS)

    Erbacher, Robert F.; Frincke, Deborah

    2001-05-01

    As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.

  3. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    ERIC Educational Resources Information Center

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  4. Both trust and self-control are necessary to prevent intrusive behaviors: evidence from a longitudinal study of married couples.

    PubMed

    Buyukcan-Tetik, Asuman; Finkenauer, Catrin; Kuppens, Sofie; Vohs, Kathleen D

    2013-08-01

    Many people engage in intrusive behaviors in close relationships. Existing research links intrusive behaviors to a lack of trust and an imbalance between self- and partner-interest. The authors tested the novel hypothesis that people need self-control to regulate intrusive behaviors. Self-control enables people to forgo their self-interests (reassurance or closeness) for the sake of their partner or the relationship. Specifically, we predicted that people need both trust and self-control to refrain from intrusive behavior. One-hundred-eighty-nine couples participated in a prospective longitudinal study with three waves. Consistent with predictions, multilevel analyses revealed an interaction between trust and self-control on intrusive behaviors cross-sectionally as well as longitudinally (albeit marginally). These results provide support for our hypothesis that neither trust in the partner nor self-control is sufficient to forestall intrusive behaviors, but rather both are necessary to refrain from intruding into one's partner's privacy. © 2013 American Psychological Association

  5. Quantifying Astronaut Tasks: Robotic Technology and Future Space Suit Design

    NASA Technical Reports Server (NTRS)

    Newman, Dava

    2003-01-01

    The primary aim of this research effort was to advance the current understanding of astronauts' capabilities and limitations in space-suited EVA by developing models of the constitutive and compatibility relations of a space suit, based on experimental data gained from human test subjects as well as a 12 degree-of-freedom human-sized robot, and utilizing these fundamental relations to estimate a human factors performance metric for space suited EVA work. The three specific objectives are to: 1) Compile a detailed database of torques required to bend the joints of a space suit, using realistic, multi- joint human motions. 2) Develop a mathematical model of the constitutive relations between space suit joint torques and joint angular positions, based on experimental data and compare other investigators' physics-based models to experimental data. 3) Estimate the work envelope of a space suited astronaut, using the constitutive and compatibility relations of the space suit. The body of work that makes up this report includes experimentation, empirical and physics-based modeling, and model applications. A detailed space suit joint torque-angle database was compiled with a novel experimental approach that used space-suited human test subjects to generate realistic, multi-joint motions and an instrumented robot to measure the torques required to accomplish these motions in a space suit. Based on the experimental data, a mathematical model is developed to predict joint torque from the joint angle history. Two physics-based models of pressurized fabric cylinder bending are compared to experimental data, yielding design insights. The mathematical model is applied to EVA operations in an inverse kinematic analysis coupled to the space suit model to calculate the volume in which space-suited astronauts can work with their hands, demonstrating that operational human factors metrics can be predicted from fundamental space suit information.

  6. Eating-related Intrusive Thoughts Inventory: exploring the dimensionality of eating disorder symptoms.

    PubMed

    Perpiñá, Conxa; Roncero, María; Belloch, Amparo; Sánchez-Reales, Sergio

    2011-08-01

    The aims of this study were, first, to examine the structure and validity of the Eating-related Intrusive Thoughts Inventory (INPIAS), a self-report questionnaire designed to assess eating disorders related to intrusive thoughts (EDITs), and second, to explore the existence of a continuum ranging from normal to abnormal thought intrusions related to eating, weight, and shape. Participants were 574 (408 women) nonclinical community individuals. Analyses revealed that EDITs can be clustered into three sets: appearance-dieting, need to exercise, and thoughts-impulses related to eating disorders. EDITs' consequences showed a two-factor structure: emotional consequences/personal meaning and thought-action fusion responsibility; and four factors of strategies: "anxiety," suppression, obsessive-compulsive rituals, and distraction. The sample was then divided according to reported restrained eating. The High dietary restraint group reported a higher frequency of EDITs, whereas differences in the other factors were mediated by depression, anxiety, and obsessionality. The results suggest that eating disorder-related cognitions are experienced by nonclinical individuals, and distributed on a continuum.

  7. Does repeated human intrusion alter use of wildland sites by red squirrels? Multiyear experimental evidence

    Treesearch

    Kevin J. Gutzwiller; Samuel K. Riffell

    2008-01-01

    Intrusion by humans into wildlife habitat during recreational activities has become a worldwide conservation concern. Low levels of intrusion, which occur frequently in many wildlands, could influence use of sites by red squirrels (Tamiasciurus hudsonicus) and have important ramifications for conservation. Red squirrels can influence forest...

  8. Acceptance- and imagery-based strategies can reduce chocolate cravings: A test of the elaborated-intrusion theory of desire.

    PubMed

    Schumacher, Sophie; Kemps, Eva; Tiggemann, Marika

    2017-06-01

    The elaborated-intrusion theory of desire proposes that craving is a two-stage process whereby initial intrusions about a desired target are subsequently elaborated with mental imagery. The present study tested whether the craving reduction strategies of cognitive defusion and guided imagery could differentially target the intrusion and elaboration stages, respectively, and thus differentially impact the craving process. Participants were randomly assigned to a cognitive defusion, a guided imagery or a mind-wandering control condition. Pre- and post-intervention chocolate-related thoughts, intrusiveness of thoughts, vividness of imagery, craving intensity, and chocolate consumption were compared. Experiment 1 recruited a general sample of young women (n = 94), whereas Experiment 2 recruited a sample of chocolate cravers who wanted to reduce their chocolate consumption (n = 97). Across both experiments, cognitive defusion lowered intrusiveness of thoughts, vividness of imagery and craving intensity. Guided imagery reduced chocolate-related thoughts, intrusiveness, vividness and craving intensity for chocolate cravers (Experiment 2), but not for the general sample (Experiment 1). There were no group differences in chocolate consumption in either experiment. Results add to existing evidence supporting the elaborated-intrusion theory of desire in the food domain, and suggest that acceptance- and imagery-based techniques have potential for use in combatting problematic cravings. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Children’s Dietary Recalls from Three Validation Studies: Types of Intrusion Vary with Retention Interval

    PubMed Central

    Baxter, Suzanne Domel; Hardin, James W.; Smith, Albert F.; Royer, Julie A.; Guinn, Caroline H.

    2008-01-01

    SUMMARY Using previously collected data of fourth-grade children observed eating school meals and then interviewed, we categorized intrusions (food items reported but not observed eaten) as stretches (on the child’s tray) or confabulations (not on the child’s tray). We investigated intrusions, confabulations, and stretches, and the role of liking, at different retention intervals (morning interviews about the previous day’s intake; evening interviews about that day’s intake) and under different reporting-order prompts (forward; reverse). As retention interval between consumption and report increased, the likelihood 1) increased that reported items were intrusions, that reported items were confabulations, and that intrusions were confabulations; and 2) was constant that reported items were stretches. Results concerning reporting-order prompts were inconclusive. Liking ratings were higher for matches (reports of items observed eaten) than stretches, for confabulations than stretches, and for matches than omissions (unreported items observed eaten), but did not vary by retention interval or reporting-order prompts. PMID:19023454

  10. Trauma Films, Information Processing, and Intrusive Memory Development

    ERIC Educational Resources Information Center

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  11. The Interplay between Rumination and Intrusions in the Prediction of Concurrent and Prospective Depressive Symptoms in Two Nonclinical Samples

    ERIC Educational Resources Information Center

    Smets, Jorien; Wessel, Ineke; Schreurs, Ellen; Raes, Filip

    2012-01-01

    Depressed patients commonly experience intrusive memories. There is some evidence that ruminative responses to those intrusions are important for maintaining depressive symptoms. Three models concerning the interplay of intrusions and rumination in the prediction of depressive symptoms were tested in students in 2 studies (N = 711): (a) rumination…

  12. 46 CFR 199.214 - Immersion suits and thermal protective aids.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Immersion suits and thermal protective aids. 199.214... Passenger Vessels § 199.214 Immersion suits and thermal protective aids. (a) Each passenger vessel must... an immersion suit. (c) The immersion suits and thermal protective aids required under paragraphs (a...

  13. 46 CFR 199.214 - Immersion suits and thermal protective aids.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Immersion suits and thermal protective aids. 199.214... Passenger Vessels § 199.214 Immersion suits and thermal protective aids. (a) Each passenger vessel must... an immersion suit. (c) The immersion suits and thermal protective aids required under paragraphs (a...

  14. 46 CFR 199.214 - Immersion suits and thermal protective aids.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Immersion suits and thermal protective aids. 199.214... Passenger Vessels § 199.214 Immersion suits and thermal protective aids. (a) Each passenger vessel must... an immersion suit. (c) The immersion suits and thermal protective aids required under paragraphs (a...

  15. 46 CFR 199.214 - Immersion suits and thermal protective aids.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Immersion suits and thermal protective aids. 199.214... Passenger Vessels § 199.214 Immersion suits and thermal protective aids. (a) Each passenger vessel must... an immersion suit. (c) The immersion suits and thermal protective aids required under paragraphs (a...

  16. 46 CFR 199.214 - Immersion suits and thermal protective aids.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Immersion suits and thermal protective aids. 199.214... Passenger Vessels § 199.214 Immersion suits and thermal protective aids. (a) Each passenger vessel must... an immersion suit. (c) The immersion suits and thermal protective aids required under paragraphs (a...

  17. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    PubMed

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  18. Perimeter intrusion detection and assessment system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  19. Tetris and Word games lead to fewer intrusive memories when applied several days after analogue trauma.

    PubMed

    Hagenaars, Muriel A; Holmes, Emily A; Klaassen, Fayette; Elzinga, Bernet

    2017-01-01

    Background : Intrusive trauma memories are a key symptom of posttraumatic stress disorder (PTSD), so disrupting their recurrence is highly important. Intrusion development was hindered by visuospatial interventions administered up to 24 hours after analogue trauma. It is unknown whether interventions can be applied later, and whether modality or working-memory load are crucial factors. Objectives : This study tested: (1) whether a visuospatial task would lead to fewer intrusions compared to a reactivation-only group when applied after memory reactivation four days after analogue trauma exposure (extended replication), (2) whether both tasks (i.e. one aimed to be visuospatial, one more verbal) would lead to fewer intrusions than the reactivation-only group (intervention effect), and (3) whether supposed task modality (visuospatial or verbal) is a critical component (modality effect). Method : Fifty-four participants were randomly assigned to reactivation+Tetris (visuospatial), reactivation+Word games (verbal), or reactivation-only (no task). They watched an aversive film (day 0) and recorded intrusive memories of the film in diary A. On day 4, memory was reactivated, after which participants played Tetris, Word games, or had no task for 10 minutes. They then kept a second diary (B). Informative hypotheses were evaluated using Bayes factors. Results : Reactivation+Tetris and reactivation+Word games resulted in relatively fewer intrusions from the last day of diary A to the first day of diary B than reactivation-only (objective 1 and 2). Thus, both tasks were effective even when applied days after analogue trauma. Reactivation-only was not effective. Reactivation+Word games appeared to result in fewer intrusions than reactivation+Tetris (objective 3; modality effect), but this evidence was weak. Explorative analyses showed that Word games were more difficult than Tetris. Conclusions : Applying a task four days after the trauma film (during memory reconsolidation

  20. Petrogenesis of selected A-type granitic intrusions from Central Eastern Desert of Egypt

    NASA Astrophysics Data System (ADS)

    Hassan, Tharwat; Asran, Asran; Amron, Taha; Hauzenberger, Christoph

    2014-05-01

    The Pan-African orogeny in the Arabian-Nubian Shield was terminated by intrusion of A-type granites (~ 595 Ma; Greenberg, 1981) and its volcanic equivalents. Subsequent to the intrusions of these granitic bodies the shield was exhumed. Eroded A-type granite pebbles were found in the molasse sediments that were deposited in intermountain basins. Therefore the A-type granites provide information about the last stage of the Pan-African geochemical system. Preliminary whole-rock geochemical data of three granitic intrusions (Kadabora, Um Naggat and El shiekh Salem) from the Central Eastern Desert of Egypt; indicate that all of them are peraluminous and with A-type characteristics. These intrusions show low CaO content (average 0.43 %wt), high FeOT/MgO ratio (10.46-121.88), high Na2O+K2O (average 8.04 %wt), marked enrichment of high field strength elements (Y, Nb and Ga except Zr), depletion in MgO (0.01-0.11 %wt) and with low concentration of Sr and Ba. The studied granitoids were emplaced in within plate tectonic regime. References: Greenberg, J.K. (1981): Characteristic and origin of Egyptian younger granites. Bull. Geol. Soc. Am. Part 1, v.92: 224-232.

  1. Playing the computer game Tetris prior to viewing traumatic film material and subsequent intrusive memories: Examining proactive interference.

    PubMed

    James, Ella L; Lau-Zhu, Alex; Tickle, Hannah; Horsch, Antje; Holmes, Emily A

    2016-12-01

    Visuospatial working memory (WM) tasks performed concurrently or after an experimental trauma (traumatic film viewing) have been shown to reduce subsequent intrusive memories (concurrent or retroactive interference, respectively). This effect is thought to arise because, during the time window of memory consolidation, the film memory is labile and vulnerable to interference by the WM task. However, it is not known whether tasks before an experimental trauma (i.e. proactive interference) would also be effective. Therefore, we tested if a visuospatial WM task given before a traumatic film reduced intrusions. Findings are relevant to the development of preventative strategies to reduce intrusive memories of trauma for groups who are routinely exposed to trauma (e.g. emergency services personnel) and for whom tasks prior to trauma exposure might be beneficial. Participants were randomly assigned to 1 of 2 conditions. In the Tetris condition (n = 28), participants engaged in the computer game for 11 min immediately before viewing a 12-min traumatic film, whereas those in the Control condition (n = 28) had no task during this period. Intrusive memory frequency was assessed using an intrusion diary over 1-week and an Intrusion Provocation Task at 1-week follow-up. Recognition memory for the film was also assessed at 1-week. Compared to the Control condition, participants in the Tetris condition did not report statistically significant difference in intrusive memories of the trauma film on either measure. There was also no statistically significant difference in recognition memory scores between conditions. The study used an experimental trauma paradigm and findings may not be generalizable to a clinical population. Compared to control, playing Tetris before viewing a trauma film did not lead to a statistically significant reduction in the frequency of later intrusive memories of the film. It is unlikely that proactive interference, at least with this task

  2. Infiltration metasomatism within the Rum layered intrusion (Scotland)

    NASA Astrophysics Data System (ADS)

    Leuthold, J.; Blundy, J.; Holness, M.

    2012-04-01

    The well studied Rum Isle layered intrusion was built up by emplacement of a series of 15 macro-rhythmic units. Magma intruded 60.53±0.08 Ma (Hamilton et al., 1998), at a pressure <0.5 kbar (Holness, 1999). Units are composed of feldspathic peridotite at the base, overlain by troctolite and gabbro. Layering is induced by fractional crystallization from picritic magma (Upton et al., 2002; Holness et al., 2007). Rum magma liquid line of descent is complicated by reactive melt percolation within crystal mushes, either originating from continuous compaction of the cumulate pile or from a newly injected reactive picritic magma. The studied Unit 9 sequence is well known for the injection of a picritic sill within the layered intrusion. Clinopyroxene textures are very diverse above the Unit 9 intrusive picritic sill. (1) Late-stage interstitial crystals occur in the basal intrusive peridotite, corresponding to the picritic sill. The Cr2O3 content varies from 1.2 to 0.6 wt% along core to rim profiles. (2) Within the overlying troctolite, poikilitic crystals (up to 2 cm in diameter) enclose randomly oriented plagioclase and olivine, wrapped by a foliated troctolitic assemblage. Within the first 3 meters, the Cr2O3 composition of the few clinopyroxene crystals is very similar to the underlying peridotite one, but it then drops to lower concentration (0.5 to 0 wt%). The plagioclase-clinopyroxene-plagioclase median dihedral angle also decreases from ~90° to ~80° (Sides, 2008). The Cr2O3 content increases progressively towards the troctolite-gabbro wavy horizon. Gabbroic enclaves occur within the troctolite. (3) Cumulus clinopyroxene grains occur in the summit gabbro. Their Cr2O3 content regularly decreases from 1.2-0.8 to 0.7-0.3 across the gabbro pile. Cr-spinel crystals are rare. Median plagioclase-clinopyroxene-plagioclase dihedral angles evolve from ~85° to ~95°. We propose that troctolites, that contain gabbroic enclaves, result from clinopyroxene primocryst

  3. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid

    PubMed Central

    Li, Yuancheng; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can’t satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy. PMID:29485990

  4. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

    PubMed

    Li, Yuancheng; Qiu, Rixuan; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  5. Space Suit CO2 Washout During Intravehicular Activity

    NASA Technical Reports Server (NTRS)

    Augustine, Phillip M.; Navarro, Moses; Conger, Bruce; Sargusingh, Miriam M.

    2010-01-01

    Space suit carbon dioxide (CO2) washout refers to the removal of CO2 gas from the oral-nasal area of a suited astronaut's (or crewmember's) helmet using the suit's ventilation system. Inadequate washout of gases can result in diminished mental/cognitive abilities as well as headaches and light headedness. In addition to general discomfort, these ailments can impair an astronaut s ability to perform mission-critical tasks ranging from flying the space vehicle to performing lunar extravehicular activities (EVAs). During design development for NASA s Constellation Program (CxP), conflicting requirements arose between the volume of air flow that the new Orion manned space vehicle is allocated to provide to the suited crewmember and the amount of air required to achieve CO2 washout in a space suit. Historically, space suits receive 6.0 actual cubic feet per minute (acfm) of air flow, which has adequately washed out CO2 for EVAs. For CxP, the Orion vehicle will provide 4.5 acfm of air flow to the suit. A group of subject matter experts (SM Es) among the EVA Systems community came to an early consensus that 4.5 acfm may be acceptable for low metabolic rate activities. However, this value appears very risky for high metabolic rates, hence the need for further analysis and testing. An analysis was performed to validate the 4.5 acfm value and to determine if adequate CO2 washout can be achieved with the new suit helmet design concepts. The analysis included computational fluid dynamic (CFD) modeling cases, which modeled the air flow and breathing characteristics of a human wearing suit helmets. Helmet testing was performed at the National Institute of Occupational Safety and Health (NIOSH) in Pittsburgh, Pennsylvania, to provide a gross-level validation of the CFD models. Although there was not a direct data correlation between the helmet testing and the CFD modeling, the testing data showed trends that are very similar to the CFD modeling. Overall, the analysis yielded

  6. Hysteretic behavior in seawater intrusion in response to discontinuous drought periods

    NASA Astrophysics Data System (ADS)

    Salandin, P.; Darvini, G.

    2017-12-01

    The seawater intrusion (SWI) represents a relevant problem for communities living in many coastal regions and in small islands, where the amount of fresh water available for human consumption or irrigation purposes depends on the equilibrium between the natural groundwater recharge from precipitations and the surrounding sea. This issue is exacerbated by climate changes, and, as a consequence, the reduction of natural groundwater recharge and the decrease the seaward flows of fresh water rather than sea level rise, as recently demonstrated by Ketabchi et al. (2016), leads to magnify the seawater intrusion into coastal aquifers. The temporal fluctuation of the fresh water table level are a natural consequence of the interaction of the aquifer with a water body or due to the seasonal replenishment of the water table. The severe and prolonged drought phenomena as that observed in last years in some areas of the Mediterranean, as over the central western Mediterranean basin, Italy and Spain, where a decreasing trend in total precipitation was detected (Alpert et al., 2002) in addition to the rise in temperature, enlarges the variation of the freshwater flux and can magnify the progression of the saline wedge. In the present study we demonstrate that the presence of varying boundary constraints or forcing factors may lead to hysteretic behavior in saltwater intrusion, showing dependence of the saline wedge on historic conditions. Therefore, the dynamic behavior of SWI may depend on both the present and past forcing conditions. To this aim different transient simulations supported by evidences deduced from a physical model are carried out to assess the presence of the hysteretic effects in the SWI phenomenon and to evaluate its influence in the management of the coastal aquifers for both the rational exploitation and the corrected management of water resources. About 70% of the world's population dwells in coastal zones. Therefore the optimal exploitation of fresh

  7. Design of Test Support Hardware for Advanced Space Suits

    NASA Technical Reports Server (NTRS)

    Watters, Jeffrey A.; Rhodes, Richard

    2013-01-01

    As a member of the Space Suit Assembly Development Engineering Team, I designed and built test equipment systems to support the development of the next generation of advanced space suits. During space suit testing it is critical to supply the subject with two functions: (1) cooling to remove metabolic heat, and (2) breathing air to pressurize the space suit. The objective of my first project was to design, build, and certify an improved Space Suit Cooling System for manned testing in a 1-G environment. This design had to be portable and supply a minimum cooling rate of 2500 BTU/hr. The Space Suit Cooling System is a robust, portable system that supports very high metabolic rates. It has a highly adjustable cool rate and is equipped with digital instrumentation to monitor the flowrate and critical temperatures. It can supply a variable water temperature down to 34 deg., and it can generate a maximum water flowrate of 2.5 LPM. My next project was to design and build a Breathing Air System that was capable of supply facility air to subjects wearing the Z-2 space suit. The system intakes 150 PSIG breathing air and regulates it to two operating pressures: 4.3 and 8.3 PSIG. It can also provide structural capabilities at 1.5x operating pressure: 6.6 and 13.2 PSIG, respectively. It has instrumentation to monitor flowrate, as well as inlet and outlet pressures. The system has a series of relief valves to fully protect itself in case of regulator failure. Both projects followed a similar design methodology. The first task was to perform research on existing concepts to develop a sufficient background knowledge. Then mathematical models were developed to size components and simulate system performance. Next, mechanical and electrical schematics were generated and presented at Design Reviews. After the systems were approved by the suit team, all the hardware components were specified and procured. The systems were then packaged, fabricated, and thoroughly tested. The next step

  8. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    PubMed

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  9. Intrusions in story recall: when over-learned information interferes with episodic memory recall. Evidence from Alzheimer's disease.

    PubMed

    De Anna, Francesca; Attali, Eve; Freynet, Laurence; Foubert, Lucie; Laurent, Aurore; Dubois, Bruno; Dalla Barba, Gianfranco

    2008-03-01

    Patients with Alzheimer's disease (AD) suffer from distortions of memory. Among such distortions, intrusions in memory tests are frequently observed. In this study we describe the performance of a group of mild AD patients and a group of normal controls on the recall of three different types of stories: a previously unknown story, a well-known fairy-tale (Cinderella), and a modified well-known fairy-tale (Little Red Riding Hood is not eaten by the wolf). The aim of our study was to test the hypothesis that in patients who tend to produce intrusions, over-learned information interferes with episodic recall, i.e., the retrieval of specific, unique past episodes. AD patients produced significantly more intrusions in the recall of the modified fairy-tale compared to the recall of the two other stories. Intrusions in the recall of the modified fairy-tale always consisted of elements of the original version of the story. We suggest that in AD patients intrusions may be traced back to the interference of strongly represented, over-learned information in episodic memory recall.

  10. Kontay intrusion (Polar Siberia)- an example of strong magmatic differentiation in the single magmatic body

    NASA Astrophysics Data System (ADS)

    Zaitsev, Victor

    2016-04-01

    Kontay intrusion is located in the north-west part of Maimecha-Kotuy province, (part of Siberian Large Igneous Province) in the northern part of the Siberian Platform. Intrusion is fully overlaid and practically not studied before. Geophysical data evident that intrusion has form of laccolite with diameter ˜7.5 km and thickness ˜ 2.5 km [1]. Initially lower part of intrusion was described as "gabbro-anortozite and anortositic gabbro" and higher part - as "leucocratic granophyric anortosites" [2]. Complex mineralo-petrological-geochemical study allow to divide intrusion section on three zones: Lower zone (below 1100 m) - layered sequence of leucocratic and melanocratic of biotite- and ortopyroxene-bearing gabbro, with minor alkaline feldspar, Middle zone (1100-700m) - biotite- and K-feldspar bearing gabbro and monzonotes, interstitial space often contain micrographical structures. Biotite corroded clinopyroxene and form interstitial crystals and Upper zone (700-214 m) - petrographically monotone porthyric quartz-monzonites and granosyenites with rare phenocrysts of plagioclase, magnetite, clinopyroxene and biotite. The main secondary minerals are albite, amphibole (edenite-feroedenite), secondary biotite, chlorite, and F,Al-bearing titanite. Rocks of the all parts fall in the same trends on the binary petrochemical diagrams, they belong to the High-K calc-alkaline seria. They are clearly more alkaline then intrusions of Norilsk district and less alkaline then alkaline-ultramafic intrusions of Maymecha-Kotuy province. Volcanic rocks of Norilsk and Maymecha-Kotuy area was subdivided for four geochemical types, mainly by the Ti-content, Th/U, Gd/Yb and Sm/Yb ratio: Low-Ti-1 (predominated), Low-Ti-2 (well -developed in Norilsk region), Moderate-Ti (developed only in the lower part of volcanic formation in Norilsk region), High-Ti (rare in Norilsk region, but widely spread in Mailecha-Kotuy area) [3]. Kontay intrusion rocks belong to Moderate-Ti group. The closest

  11. Pectin methyl esterase inhibits intrusive and symplastic cell growth in developing wood cells of Populus.

    PubMed

    Siedlecka, Anna; Wiklund, Susanne; Péronne, Marie-Amélie; Micheli, Fabienne; Lesniewska, Joanna; Sethson, Ingmar; Edlund, Ulf; Richard, Luc; Sundberg, Björn; Mellerowicz, Ewa J

    2008-02-01

    Wood cells, unlike most other cells in plants, grow by a unique combination of intrusive and symplastic growth. Fibers grow in diameter by diffuse symplastic growth, but they elongate solely by intrusive apical growth penetrating the pectin-rich middle lamella that cements neighboring cells together. In contrast, vessel elements grow in diameter by a combination of intrusive and symplastic growth. We demonstrate that an abundant pectin methyl esterase (PME; EC 3.1.1.11) from wood-forming tissues of hybrid aspen (Populus tremula x tremuloides) acts as a negative regulator of both symplastic and intrusive growth of developing wood cells. When PttPME1 expression was up- and down-regulated in transgenic aspen trees, the PME activity in wood-forming tissues was correspondingly altered. PME removes methyl ester groups from homogalacturonan (HG) and transgenic trees had modified HG methylesterification patterns, as demonstrated by two-dimensional nuclear magnetic resonance and immunostaining using PAM1 and LM7 antibodies. In situ distributions of PAM1 and LM7 epitopes revealed changes in pectin methylesterification in transgenic trees that were specifically localized in expanding wood cells. The results show that en block deesterification of HG by PttPME1 inhibits both symplastic growth and intrusive growth. PttPME1 is therefore involved in mechanisms determining fiber width and length in the wood of aspen trees.

  12. Magmatic Intrusions and a Hydrothermal Origin for Fluvial Valleys on Mars

    NASA Technical Reports Server (NTRS)

    Gulick, Virginia C

    1998-01-01

    Numerical models of Martian hydrothermal systems demonstrate that systems associated with magmatic intrusions greater than several hundred cubic kilometers can provide sufficient groundwater outflow to form the observed fluvial valleys, if subsurface permeability exceeds about 1.0 darcy. Groundwater outflow increases with increasing intrusion volume and subsurface permeability and is relatively insensitive to intrusion depth and subsurface porosity within the range considered here. Hydrothermally-derived fluids can melt through 1 to 2 km thick ice-rich permafrost layers in several thousand years. Hydrothermal systems thus provide a viable alternative to rainfall for providing surface water for valley formation. This mechanism can form fluvial valleys not only during the postulated early warm, wet climatic epoch, but also during more recent epochs when atmospheric conditions did not favor atmospheric cycling of water. The clustered distribution of the valley networks on a given geologic surface or terrain unit of Mars may also be more compatible with localized, hydrothermally-driven groundwater outflow than regional rainfall. Hydrothermal centers on Mars may have provided appropriate environments for the initiation of life or final oases for the long-term persistence of life.

  13. Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time

    NASA Astrophysics Data System (ADS)

    Pham, Congduc

    This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surveillance application and present a performance study of various cover set construction strategies that take into account cameras with heterogeneous angle of view and those with very small angle of view. We show by simulation how a dynamic criticality management scheme can provide fast event detection for mission-critical surveillance applications by increasing the network lifetime and providing low stealth time of intrusions.

  14. 33 CFR 144.20-5 - Exposure suits.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... readily accessible location in or near the berthing area of the person for whom the exposure suit is... stowed in that location) is readily accessible to the station. (c) Each exposure suit on a MODU must be... type or multi-tone type, of corrosion resistant construction, and in good working order. The whistle...

  15. Z-2 Prototype Space Suit Development

    NASA Technical Reports Server (NTRS)

    Ross, Amy; Rhodes, Richard; Graziosi, David; Jones, Bobby; Lee, Ryan; Haque, Bazle Z.; Gillespie, John W., Jr.

    2014-01-01

    NASA's Z-2 prototype space suit is the highest fidelity pressure garment from both hardware and systems design perspectives since the Shuttle Extravehicular Mobility Unit (EMU) was developed in the late 1970's. Upon completion it will be tested in the 11' humanrated vacuum chamber and the Neutral Buoyancy Laboratory (NBL) at the NASA Johnson Space Center to assess the design and to determine applicability of the configuration to micro-, low- (asteroid), and planetary- (surface) gravity missions. This paper discusses the 'firsts' the Z-2 represents. For example, the Z-2 sizes to the smallest suit scye bearing plane distance for at least the last 25 years and is being designed with the most intensive use of human models with the suit model. The paper also provides a discussion of significant Z-2 configuration features, and how these components evolved from proposal concepts to final designs.

  16. Z-2 Prototype Space Suit Development

    NASA Technical Reports Server (NTRS)

    Ross, Amy; Rhodes, Richard; Graziosi, David

    2014-01-01

    NASA's Z-2 prototype space suit is the highest fidelity pressure garment from both hardware and systems design perspectives since the Shuttle Extravehicular Mobility Unit (EMU) was developed in the late 1970's. Upon completion it will be tested in the 11' human-rated vacuum chamber and the Neutral Buoyancy Laboratory (NBL) at the NASA Johnson Space Center to assess the design and to determine applicability of the configuration to micro-, low- (asteroid), and planetary- (surface) gravity missions. This paper discusses the 'firsts' the Z-2 represents. For example, the Z-2 sizes to the smallest suit scye bearing plane distance for at least the last 25 years and is being designed with the most intensive use of human models with the suit model. The paper also provides a discussion of significant Z-2 configuration features, and how these components evolved from proposal concepts to final designs.

  17. Saltwater intrusion coupled with drought accelerates carbon loss from a brackish coastal wetland

    NASA Astrophysics Data System (ADS)

    Wilson, B.; Troxler, T.

    2017-12-01

    Coastal wetlands, such as the Everglades, are critical ecosystems for blue carbon (C) storage, yet this storage capacity is vulnerable to environmental change, such as saltwater intrusion and altered hydrology. Saltwater intrusion can stress vegetation and bring new metabolites for microbial respiration, thereby altering the C cycle. Drought can reduce the depth of water covering the wetland soil, and, in extreme cases, lead to exposed soil surface. This increases oxygen levels, thus speeding up C decomposition and potentially leading to peat collapse. The combined effects of both saltwater intrusion and drought on coastal marshes, however, are still uncertain, but recent evidence suggests that saltwater intrusion accelerates C loss from wetlands when coupled with drought. Our objective was to determine the change in CO2 flux, decomposition, root and shoot production, and elevation in a brackish water marsh under conditions of drought and elevated salinity. During the onset of drought, soil CO2 efflux increased by 124% and 237% in the ambient and elevated salinity treatments, respectively, compared to the control. Within one month, elevated salinity decreased net ecosystem production (NEP) by 40%, while after 6 months it had decreased by 85%. During the onset of the drought, there was no difference in NEP with ambient salinity between the inundated and exposed monoliths (-3.4 ± 0.8 vs. -4.2 ± 2.0 μmol CO2 m-2 s-1, respectively). However, drought conditions in the elevated salinity treatment resulted in more CO2 release in the exposed monoliths than the inundated monoliths (1.5 ± 0.4 vs. -0.5 ± 0.3 μmol CO2 m-2 s-1, respectively). Elevation change collected at the end of the experiment will allow us to test if elevated salinity combined with drought contributes to peat collapse, and what mechanisms of ecosystem C cycling has the greatest influence. While the restoration of water flows to the southern Everglades is hypothesized to mitigate the periods of

  18. Thermal History and Crystallinity of Sheet Intrusions

    NASA Astrophysics Data System (ADS)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  19. A new device for the inflation of the antigravity suit.

    PubMed

    Brodrick, P M

    1986-02-01

    The 'Schuco' orthopaedic tourniquet inflator can be simply converted into a suitable device for inflating an antigravity suit (G-suit). The antigravity suit may be used on neurosurgical patients undergoing procedures in the sitting position to help prevent hypotension and air embolism. The availability of this device may encourage the more widespread use of an antigravity suit in neuro-anaesthetic practice.

  20. Fear of cancer progression and cancer-related intrusive cognitions in breast cancer survivors.

    PubMed

    Mehnert, Anja; Berg, Petra; Henrich, Gerhard; Herschbach, Peter

    2009-12-01

    To assess the character and frequency of fear of progression (FoP) and to clarify its relationship with cancer-related intrusive cognitions in breast cancer survivors. A sample of 1083 patients was recruited in this cross-sectional study through a population-based Cancer Registry an average of 47 month following diagnosis (66% response rate). Participants completed self-report measures assessing fear of cancer progression (FoP-Q-SF), posttraumatic stress-disorder symptoms (PCL-C), coping strategies (DWI) and quality of life (QoL) (SF-8). In total, 23.6% of women were classified as having moderate to high FoP. Being nervous prior to doctors' appointments or examinations and being afraid of relying on strangers for activities of daily living were the most frequent fears. FoP was significantly associated with younger age, having children, disease progress, chemotherapy, perceived amount of impairments, physical and mental QoL, but not with time since initial diagnosis. Intrusive cognitions were screened in 37% of the sample. We found significant correlations between FoP and intrusive thoughts (r=0.63), avoidance (r=0.57), hyperarousal (r=0.54) and posttraumatic stress disorder diagnosis (r=0.42). Factors significantly associated with moderate and high FoP included a depressive coping style as well as an active problem-oriented coping style, intrusion, avoidance and hyperarousal symptoms (Nagelkerke's R(2)=0.44). Findings of this study give information regarding the frequency and the character of anxiety in breast cancer survivors and underline the relation of FoP to the reality of living with breast cancer. Results suggest that intrusive cognitions as well as avoidance and hyperarousal symptoms seem to be closely related to future-oriented fears of cancer recurrence.

  1. Simulation of salinity intrusion along the Georgia and South Carolina coasts using climate-change scenarios

    USGS Publications Warehouse

    Conrads, Paul; Roehl, Edwin A.; Daamen, Ruby C.; Cook, John B.

    2013-01-01

    Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. Changes in streamflow patterns in conjunction with sea-level rise may change the salinity-intrusion dynamics of coastal rivers. Several municipal water-supply intakes are located along the Georgia and South Carolina coast that are proximal to the present day saltwater-freshwater interface of tidal rivers. Increases in the extent of salinity intrusion resulting from climate change could threaten the availability of freshwater supplies in the vicinity of these intakes. To effectively manage these supplies, water-resource managers need estimates of potential changes in the frequency, duration, and magnitude of salinity intrusion near their water-supply intakes that may occur as a result of climate change. This study examines potential effects of climate change, including altered streamflow and sea-level rise, on the dynamics of saltwater intrusion near municipal water-supply intakes in two coastal areas. One area consists of the Atlantic Intracoastal Waterway (AIW) and the Waccamaw River near Myrtle Beach along the Grand Strand of the South Carolina Coast, and the second area is on or near the lower Savannah River near Savannah, Georgia. The study evaluated how future sea-level rise and a reduction in streamflows can potentially affect salinity intrusion and threaten municipal water supplies and the biodiversity of freshwater tidal marshes in these two areas. Salinity intrusion occurs as a result of the interaction between three principal forces—streamflow, mean coastal water levels, and tidal range. To analyze and simulate salinity dynamics at critical coastal gaging stations near four municipal water-supply intakes, various data-mining techniques, including artificial neural network (ANN) models, were used to evaluate hourly streamflow, salinity, and coastal water-level data collected

  2. Constraints on the magmatic evolution of the oceanic crust from plagiogranite intrusions in the Oman ophiolite

    NASA Astrophysics Data System (ADS)

    Haase, Karsten M.; Freund, Sarah; Beier, Christoph; Koepke, Jürgen; Erdmann, Martin; Hauff, Folkmar

    2016-05-01

    We present major and trace element as well as Sr, Nd, and Hf isotope data on a suite of 87 plutonic rock samples from 27 felsic crustal intrusions in seven blocks of the Oman ophiolite. The rock compositions of the sample suite including associated more mafic rocks range from 48 to 79 wt% SiO2, i.e. from gabbros to tonalites. The samples are grouped into a Ti-rich and relatively light rare earth element (LREE)-enriched P1 group [(Ce/Yb) N > 0.7] resembling the early V1 lavas, and a Ti-poor and LREE-depleted P2 group [(Ce/Yb) N < 0.7] resembling the late-stage V2 lavas. Based on the geochemical differences and in agreement with previous structural and petrographic models, we define phase 1 (P1) and phase 2 (P2) plutonic rocks. Felsic magmas in both groups formed by extensive fractional crystallization of olivine, clinopyroxene, plagioclase, apatite, and Ti-magnetite from mafic melts. The incompatible element compositions of P1 rocks overlap with those from mid-ocean ridges but have higher Ba/Nb and Th/Nb trending towards the P2 rock compositions and indicating an influence of a subducting slab. The P2 rocks formed from a more depleted mantle source but show a more pronounced slab signature. These rocks also occur in the southern blocks (with the exception of the Tayin block) of the Oman ophiolite implying that the entire ophiolite formed above a subducting slab. Initial Nd and Hf isotope compositions suggest an Indian-MORB-type mantle source for the Oman ophiolite magmas. Isotope compositions and high Th/Nb in some P2 rocks indicate mixing of a melt from subducted sediment into this mantle.

  3. The physician's reaction to a malpractice suit.

    PubMed

    Lavery, J P

    1988-01-01

    A malpractice suit can have a devastating impact on a practitioner's professional and personal life. The physician's reaction to this event is profound, affecting his own life-style and that of family, colleagues, and patients. This commentary presents an analogy between the physician's reaction to a malpractice suit and the stages of grief described by Elisabeth Kübler-Ross: the sequence of denial, anger, bargaining, depression, and acceptance. Understanding the psychodynamics of this reaction can help physicians to cope with the problems inherent in a malpractice suit and to maintain a greater stability in their personal lives. Adverse effects on medical practice and private life-style, and on the legal proceedings, can be minimized.

  4. On the Principles of Building a Layered Intrusion

    NASA Astrophysics Data System (ADS)

    Marsh, B. D.

    2009-12-01

    An accurate and realistic understanding of all magmatic processes involves knowing the combined physical and chemical fundamentals governing the overall process. Magmatic processes involve such a vast array of sub-processes (e.g., heat and mass transfer, crystal growth, slurry transport and sorting, annealing, resorbtion, etc.) that rarely is there any single feature or measurement that can be safely inverted to solve the problem. And each event as in the formation of an intrusion must at some level for heuristic purposes be defined as an isolated event. This is commonly done without much forethought, as is the absolutely critical assumption of the initial conditions defining the beginning of the event. Almost without exception, it is the initial conditions that determine the outcome of the entire process in all physical and biological systems. Automobile factories produce motorized vehicles not water melons or chimpanzees. Nucleosynthesis of H and He always gives the same set of elements. The initial conditions of the magma giving rise to the end product for mafic layered systems are especially difficult to discern and must be bounded by observing simpler, real time magmatic and volcanic processes. Initial conditions come from posing a series of questions: What was the style and duration of filling? What was the rate of influx and final volume of each delivery of magma? What was the compositional variation and phenocryst content of the individual magmatic deliveries? If phenocrysts are present, were they sorted prior to injection during ascension? What was the original and ongoing shape of the magmatic reservoir? A failure to appreciate or answer such basic questions leads to vastly untenable evolutionary scenarios. Unrealistic initial conditions necessarily lead to unrealistic magmatic scenarios. There are certain safe starting points. Eruptive and emplacement fluxes are limited. The larger an intrusion is the longer it took to build and the longer to build the

  5. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    PubMed

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  6. Bilingual language intrusions and other speech errors in Alzheimer's disease.

    PubMed

    Gollan, Tamar H; Stasenko, Alena; Li, Chuchu; Salmon, David P

    2017-11-01

    The current study investigated how Alzheimer's disease (AD) affects production of speech errors in reading-aloud. Twelve Spanish-English bilinguals with AD and 19 matched controls read-aloud 8 paragraphs in four conditions (a) English-only, (b) Spanish-only, (c) English-mixed (mostly English with 6 Spanish words), and (d) Spanish-mixed (mostly Spanish with 6 English words). Reading elicited language intrusions (e.g., saying la instead of the), and several types of within-language errors (e.g., saying their instead of the). Patients produced more intrusions (and self-corrected less often) than controls, particularly when reading non-dominant language paragraphs with switches into the dominant language. Patients also produced more within-language errors than controls, but differences between groups for these were not consistently larger with dominant versus non-dominant language targets. These results illustrate the potential utility of speech errors for diagnosis of AD, suggest a variety of linguistic and executive control impairments in AD, and reveal multiple cognitive mechanisms needed to mix languages fluently. The observed pattern of deficits, and unique sensitivity of intrusions to AD in bilinguals, suggests intact ability to select a default language with contextual support, to rapidly translate and switch languages in production of connected speech, but impaired ability to monitor language membership while regulating inhibitory control. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Water Vapor Permeability of the Advanced Crew Escape Suit

    NASA Technical Reports Server (NTRS)

    Bue, Grant; Kuznetz, Larry; Gillis, David; Jones, Jeffery; Daniel, Brian; Gernhardt, Michael; Hamilton, Douglas

    2009-01-01

    Crew Exploration Vehicle (CEV) crewmembers are expected to return to earth wearing a suit similar to the current Advanced Crew Escape Suit (ACES). To ensure optimum cognitive performance, suited crewmembers must maintain their core body temperature within acceptable limits. There are currently several options for thermal maintenance in the post-landing phase. These include the current baseline, which uses an ammonia boiler, purge flow using oxygen in the suit, accessing sea water for liquid cooling garment (LCG) cooling and/or relying on the evaporative cooling capacity of the suit. These options vary significantly in mass, power, engineering and safety factors, with relying on the evaporative cooling capacity of the suit being the least difficult to implement. Data from previous studies indicates that the evaporative cooling capacity of the ACES was much higher than previously expected, but subsequent tests were performed for longer duration and higher metabolic rates to better define the water vapor permeability of the ACES. In these tests five subjects completed a series of tests performing low to moderate level exercise in order to control for a target metabolic rate while wearing the ACES in an environmentally controlled thermal chamber. Four different metabolic profiles at a constant temperature of 95 F and relative humidity of 50% were evaluated. These tests showed subjects were able to reject about twice as much heat in the permeable ACES as they were in an impermeable suit that had less thermal insulation. All of the heat rejection differential is attributed to the increased evaporation capability through the Gortex bladder of the suit.

  8. Postural hypotension and the anti-gravity suit.

    PubMed

    Brook, W H

    1994-10-01

    An air force anti-gravity suit, as used by fighter pilots to prevent loss of consciousness, has been successfully employed to treat severe postural hypotension in a patient with Shy-Drager syndrome. The definition of postural hypotension is reviewed, and reference is made to the previous use of the anti-gravity suit in the treatment of this condition.

  9. Sources of Intrusions in Children’s Dietary Recalls from a Validation Study of Order Prompts

    PubMed Central

    Baxter, Suzanne Domel; Hardin, James W.; Royer, Julie A.; Smith, Albert F.; Guinn, Caroline H.

    2008-01-01

    Validation-study data and foodservice production records were analyzed to test hypotheses concerning sources of intrusions (reports of uneaten items) in the school-meal parts of children’s dietary recalls. Each child was observed eating school meals on two days, and interviewed the morning after each observation day; one interview used forward-order (morning-to-evening) and one used reverse-order (evening-to-morning) prompts. Lunch intrusions were likelier to have been available in the foodservice environment at lunch as day before the interview came closer, and on days before than after the interview. Temporal dating errors are contributing sources of intrusions in the school-lunch parts of children’s recalls. PMID:18987088

  10. Thought-action fusion as a causal factor in the development of intrusions.

    PubMed

    Rassin, E; Merckelbach, H; Muris, P; Spaan, V

    1999-03-01

    Thought-action fusion refers to the tendency to treat thoughts and actions as equivalents. Some authors (e.g., Rachman, 1997; Behaviour Research and Therapy, 35, 793-802) have suggested that thought-action fusion plays a role in the etiology of obsessive intrusions. The present study sought to test this idea. Subjects (n = 19) in the experimental condition underwent a bogus EEG recording session. They were informed that the apparatus was able to pick up the word 'apple' and that thoughts of that word could result in the administration of electrical shocks to another person. After having spent 15 minutes in the EEG laboratory, experimental subjects and controls (n = 26) completed a short questionnaire containing items about characteristics of the target thought (e.g., frequency, aversiveness). Results indicate that thought-action fusion, indeed, promotes intrusive thinking in that it results in a higher frequency of target thoughts, more discomfort, and more resistance. Thus, the current findings support the idea that thought-action fusion may contribute to the development of obsessive intrusions.

  11. multiUQ: An intrusive uncertainty quantification tool for gas-liquid multiphase flows

    NASA Astrophysics Data System (ADS)

    Turnquist, Brian; Owkes, Mark

    2017-11-01

    Uncertainty quantification (UQ) can improve our understanding of the sensitivity of gas-liquid multiphase flows to variability about inflow conditions and fluid properties, creating a valuable tool for engineers. While non-intrusive UQ methods (e.g., Monte Carlo) are simple and robust, the cost associated with these techniques can render them unrealistic. In contrast, intrusive UQ techniques modify the governing equations by replacing deterministic variables with stochastic variables, adding complexity, but making UQ cost effective. Our numerical framework, called multiUQ, introduces an intrusive UQ approach for gas-liquid flows, leveraging a polynomial chaos expansion of the stochastic variables: density, momentum, pressure, viscosity, and surface tension. The gas-liquid interface is captured using a conservative level set approach, including a modified reinitialization equation which is robust and quadrature free. A least-squares method is leveraged to compute the stochastic interface normal and curvature needed in the continuum surface force method for surface tension. The solver is tested by applying uncertainty to one or two variables and verifying results against the Monte Carlo approach. NSF Grant #1511325.

  12. Orthodontic intrusion of maxillary incisors: a 3D finite element method study

    PubMed Central

    Saga, Armando Yukio; Maruo, Hiroshi; Argenta, Marco André; Maruo, Ivan Toshio; Tanaka, Orlando Motohiro

    2016-01-01

    Objective: In orthodontic treatment, intrusion movement of maxillary incisors is often necessary. Therefore, the objective of this investigation is to evaluate the initial distribution patterns and magnitude of compressive stress in the periodontal ligament (PDL) in a simulation of orthodontic intrusion of maxillary incisors, considering the points of force application. Methods: Anatomic 3D models reconstructed from cone-beam computed tomography scans were used to simulate maxillary incisors intrusion loading. The points of force application selected were: centered between central incisors brackets (LOAD 1); bilaterally between the brackets of central and lateral incisors (LOAD 2); bilaterally distal to the brackets of lateral incisors (LOAD 3); bilaterally 7 mm distal to the center of brackets of lateral incisors (LOAD 4). Results and Conclusions: Stress concentrated at the PDL apex region, irrespective of the point of orthodontic force application. The four load models showed distinct contour plots and compressive stress values over the midsagittal reference line. The contour plots of central and lateral incisors were not similar in the same load model. LOAD 3 resulted in more balanced compressive stress distribution. PMID:27007765

  13. Research on intrusion detection based on Kohonen network and support vector machine

    NASA Astrophysics Data System (ADS)

    Shuai, Chunyan; Yang, Hengcheng; Gong, Zeweiyi

    2018-05-01

    In view of the problem of low detection accuracy and the long detection time of support vector machine, which directly applied to the network intrusion detection system. Optimization of SVM parameters can greatly improve the detection accuracy, but it can not be applied to high-speed network because of the long detection time. a method based on Kohonen neural network feature selection is proposed to reduce the optimization time of support vector machine parameters. Firstly, this paper is to calculate the weights of the KDD99 network intrusion data by Kohonen network and select feature by weight. Then, after the feature selection is completed, genetic algorithm (GA) and grid search method are used for parameter optimization to find the appropriate parameters and classify them by support vector machines. By comparing experiments, it is concluded that feature selection can reduce the time of parameter optimization, which has little influence on the accuracy of classification. The experiments suggest that the support vector machine can be used in the network intrusion detection system and reduce the missing rate.

  14. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  15. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  16. Using a time lapse microgravity model for mapping seawater intrusion around Semarang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Supriyadi,, E-mail: supriyadi@mail.unnes.ac.id; Khumaedi; Yusuf, M.

    A modeling of time-lapse microgravity anomaly due to sea water intrusion has been conducted. It used field data of aquifer cross section, aquifer thickness and lithology of research area. Those data were then processed using Grav3D and Surfer. Modeling results indicated that the intrusion of sea water resulting in a time-lapse microgravity anomalies of 0.12 to 0.18 mGal, at soil layer density of 0.15 g/cm{sup 3} to 0.3 g/cm{sup 3} and at depth of 30 to 100 m. These imply that the areas experiencing seawater intrusion were Tanjung Mas, SPBE Bandarharjo, Brass, Old Market Boom and Johar as the microgravity measured there weremore » in the range of 0.12 to 0.18 mGal and the density contrast were at 0.15 g/cm{sup 3} to 0.28 g/cm{sup 3}. Areas that experienced fluid reduction were Puri Anjasmoro, Kenconowungu and Puspowarno with microgravity changes from -0.06 mGal to -0.18 mGal.« less

  17. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    NASA Astrophysics Data System (ADS)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    Observations during recent decades show that there is a greater near surface warming occurring in the Arctic, particularly during winter, than at lower latitudes. Understanding the mechanisms controlling surface temperature in the Arctic is therefore an important priority in climate research. The surface energy budget is a key proximate control on Arctic surface temperature. During winter, insolation is low or absent and the atmospheric boundary layer is typically very stable, limiting turbulent hear exchange, so that the surface energy budget is almost entirely governed by longwave radiation. The net surface longwave radiation (NetLW) at this time has a strikingly bimodal distribution: conditions oscillate between a 'radiatively clear' state with rapid surface heat loss and a "moist cloudy" state with NetLW ˜ 0 W m-2. Each state can persist for days or weeks at a time but transitions between them happen in a matter of hours. This distribution of NetLW has important implications for the Arctic climate, as even a small shift in the frequency of occupancy of each state would be enough to significantly affect the overall surface energy budget and thus winter sea ice thickness. The clear and cloudy states typically occur during periods of relatively high and low surface pressure respectively, suggesting a link with synoptic-scale dynamics. This suggestion is consistent with previous studies indicating that the formation of low-level and mid-level clouds over the Arctic Ocean is typically associated with cyclonic activity and passing frontal systems . More recent work has shown that intense filamentary moisture intrusion events are a common feature in the Arctic and can induce large episodic increases of longwave radiation into the surface. The poleward transport of water vapor across 70N during boreal winter is examined in the ERA-Interim reanalysis product and 16 of the Coupled Model Intercomparison Project Phase 5 (CMIP5) models, focusing on intense moisture

  18. Histologic evaluation of human pulp tissue after orthodontic intrusion.

    PubMed

    Lazzaretti, Dieison Nardi; Bortoluzzi, Gianna Steffens; Torres Fernandes, Lauren Fioreze; Rodriguez, Rubens; Grehs, Renésio Armindo; Martins Hartmann, Mateus Silveira

    2014-10-01

    The forces applied during orthodontic treatment bring about effects on the teeth and surrounding tissues. The aim of this study was to evaluate the possible changes in the human pulpal tissue resulting from orthodontic intrusion in a 21-day period using histologic examination. The sample consisted of 17 young individuals of both sexes between the ages of 12 and 19 years. A total of 34 premolars were evaluated with orthodontic indication of extraction. Because it is a split-mouth study, in each patient, intrusion force of 60 g was applied randomly on 1 of the dental elements experimental group for 21 days. The counterpart control group received no force. After extractions, these dental elements were fixed in 10% formaldehyde, processed automatically, submitted to histotechnical preparation, and stained with hematoxylin-eosin for analysis under optical microscope. The paired Fisher exact test (P ≤ .05) showed a significant increase of fibrous tissue in the experimental group. The nonparametric paired Wilcoxon test (P ≤ .05) showed a significant increase in the number of pulpal nodules in the elements of the experimental group and showed no difference in the number of blood vessels between the groups. Large-caliber vessels and congested elements were observed in 8 of the experimental group elements. The orthodontic intrusion force, in these conditions, caused vascular changes in the pulpal tissue and also increased the presence of fibrosis and the number of pulp calcifications in the experimental elements. Copyright © 2014 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  19. Shuttle Space Suit: Fabric/LCVG Model Validation. Chapter 8

    NASA Technical Reports Server (NTRS)

    Wilson, J. W.; Tweed, J.; Zeitlin, C.; Kim, M.-H. Y.; Anderson, B. M.; Cucinotta, F. A.; Ware, J.; Persans, A. E.

    2003-01-01

    A detailed space suit computational model is being developed at the Langley Research Center for radiation exposure evaluation studies. The details of the construction of the space suit are critical to estimation of exposures and assessing the risk to the astronaut on EVA. Past evaluations of space suit shielding properties assumed the basic fabric layup (Thermal Micrometeoroid Garment, fabric restraints, and pressure envelope) and LCVG could be homogenized as a single layer overestimating the protective properties over 60 percent of the fabric area. The present space suit model represents the inhomogeneous distributions of LCVG materials (mainly the water filled cooling tubes). An experimental test is performed using a 34-MeV proton beam and high-resolution detectors to compare with model-predicted transmission factors. Some suggestions are made on possible improved construction methods to improve the space suit s protection properties.

  20. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    PubMed

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P < 0.0001), and ATKLH (r = -0.44; P = 0.004), and with higher scores on the BHS (r = 0.58; P < 0.0001) and CES-D (r = 0.48; P < 0.0001). The authors compared IIRS scores from the ABMT survivors with scores from recipients of solid organ transplants. Scores were corrected for age, gender, and time from transplant to evaluation. Corrected mean IIRS scores for the marrow (37.5), kidney (38.9), heart (40.0), lung (30.1), and liver (32.3) transplant recipients differed significantly (P < 0.0001 by analysis of covariance). Higher scores among marrow, kidney, and heart transplant survivors were caused by increased scores in the instrumental domain of the IIRS that measures disruptions in health, work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue

  1. Geochronology and geochemistry of Mesozoic intrusive rocks in the Xing'an Massif of NE China: Implications for the evolution and spatial extent of the Mongol-Okhotsk tectonic regime

    NASA Astrophysics Data System (ADS)

    Li, Yu; Xu, Wen-Liang; Tang, Jie; Pei, Fu-Ping; Wang, Feng; Sun, Chen-Yang

    2018-04-01

    This study presents new zircon U-Pb-Hf and whole-rock geochemical data for intrusive rocks in the Xing'an Massif of NE China, with the aim of furthering our understanding of the evolution and spatial influence of the Mongol-Okhotsk tectonic regime. Zircon U-Pb dating indicates that five stages of Mesozoic magmatism are recorded in the Xing'an Massif, namely during the Middle Triassic ( 237 Ma), the Late Triassic ( 225 Ma), the Early Jurassic ( 178 Ma), the Middle Jurassic ( 168 Ma), and the late Early Cretaceous ( 130 Ma). The Middle Triassic-Early Jurassic intrusive rocks in the Xing'an Massif are dominantly granodiorites, monzogranites, and syenogranites that formed from magma generated by partial melting of newly accreted continental crust. Geochemistry of the Middle Triassic-Early Jurassic granitoid suites of the Xing'an Massif indicates their formation at an active continental margin setting, related to the southwards subduction of the Mongol-Okhotsk oceanic plate. The Middle Jurassic monzogranites in the Xing'an Massif are geochemically similar to adakites and have εHf(t) values (+3.8 to +5.8) and Hf two-stage model ages (TDM2; 979-850 Ma) that are indicative of derivation from magma generated by partial melting of thickened juvenile lower crust. The Middle Jurassic monzogranites formed in a compressional setting related to the closure of the Mongol-Okhotsk Ocean. The late Early Cretaceous intrusive rocks in the Xing'an Massif are dominated by A-type granitoids that are associated with bimodal volcanic rocks, suggesting their formation in an extensional environment related to either (i) delamination of a previously thickened region of the crust, associated with the Mongol-Okhotsk tectonic regime; (ii) the subduction of the Paleo-Pacific Plate; or (iii) the combined influence of these two tectonic regimes.

  2. Spinoff From a Moon Suit

    NASA Technical Reports Server (NTRS)

    1991-01-01

    Al Gross transferred expertise obtained as an ILC engineer for NASA's Apollo program to the manufacture of athletic shoes. Gross substituted DuPont's Hytrel plastic for foam materials in the shoe's midsole, eliminating cushioning loss caused by body weight. An external pressurized shell applied from space suit technology was incorporated into the shoe. Stiffness and cushioning properties of the midsole were "tuned" by varying material thickness and styling lines. A stress free "blow molding" process adapted from NASA space suit design was also utilized. The resulting compression chamber midsole performed well in tests. It allows AVIA to re-configure for specific sports and is a "first step" toward a durable, foamless, non-fatiguing midsole.

  3. Non-intrusive methods of characterizing vehicles on the highway.

    DOT National Transportation Integrated Search

    2003-06-01

    Over the past year we have worked on the development of a real-time laser-based non-intrusive field-deployable detection system for delineation of moving vehicles. The primary goal of the project is to develop a roadway detection system that can be u...

  4. Elastic-Tether Suits for Artificial Gravity and Exercise

    NASA Technical Reports Server (NTRS)

    Torrance, Paul; Biesinger, Paul; Rybicki, Daniel D.

    2005-01-01

    Body suits harnessed to systems of elastic tethers have been proposed as means of approximating the effects of normal Earth gravitation on crewmembers of spacecraft in flight to help preserve the crewmembers physical fitness. The suits could also be used on Earth to increase effective gravitational loads for purposes of athletic training. The suit according to the proposal would include numerous small tether-attachment fixtures distributed over its outer surface so as to distribute the artificial gravitational force as nearly evenly as possible over the wearer s body. Elastic tethers would be connected between these fixtures and a single attachment fixture on a main elastic tether that would be anchored to a fixture on or under a floor. This fixture might include multiple pulleys to make the effective length of the main tether great enough that normal motions of the wearer cause no more than acceptably small variations in the total artificial gravitational force. Among the problems in designing the suit would be equalizing the load in the shoulder area and keeping tethers out of the way below the knees to prevent tripping. The solution would likely include running tethers through rings on the sides. Body suits with a weight or water ballast system are also proposed for very slight spinning space-station scenarios, in which cases the proposed body suits will easily be able to provide the equivalency of a 1-G or even greater load.

  5. Web-based Tool Suite for Plasmasphere Information Discovery

    NASA Astrophysics Data System (ADS)

    Newman, T. S.; Wang, C.; Gallagher, D. L.

    2005-12-01

    A suite of tools that enable discovery of terrestrial plasmasphere characteristics from NASA IMAGE Extreme Ultra Violet (EUV) images is described. The tool suite is web-accessible, allowing easy remote access without the need for any software installation on the user's computer. The features supported by the tool include reconstruction of the plasmasphere plasma density distribution from a short sequence of EUV images, semi-automated selection of the plasmapause boundary in an EUV image, and mapping of the selected boundary to the geomagnetic equatorial plane. EUV image upload and result download is also supported. The tool suite's plasmapause mapping feature is achieved via the Roelof and Skinner (2000) Edge Algorithm. The plasma density reconstruction is achieved through a tomographic technique that exploits physical constraints to allow for a moderate resolution result. The tool suite's software architecture uses Java Server Pages (JSP) and Java Applets on the front side for user-software interaction and Java Servlets on the server side for task execution. The compute-intensive components of the tool suite are implemented in C++ and invoked by the server via Java Native Interface (JNI).

  6. Multifunctional Cooling Garment for Space Suit Environmental Control

    NASA Technical Reports Server (NTRS)

    Izenson, Michael; Chen, Weibo; Phillips, Scott; Chepko, Ariane; Bue, Grant; Ferl, Janet; Cencer, Daniel

    2015-01-01

    Future manned space exploration missions will require space suits with capabilities beyond the current state of the art. Portable Life Support Systems for these future space suits face daunting challenges, since they must maintain healthy and comfortable conditions inside the suit for long-duration missions while minimizing weight and water venting. We have demonstrated the feasibility of an innovative, multipurpose garment for thermal and humidity control inside a space suit pressure garment that is simple, rugged, compact, and lightweight. The garment is a based on a conventional liquid cooling and ventilation garment (LCVG) that has been modified to directly absorb latent heat as well as sensible heat. This hybrid garment will prevent buildup of condensation inside the pressure garment, prevent loss of water by absorption in regenerable CO2 removal beds, and conserve water through use of advanced lithium chloride absorber/radiator (LCAR) technology for nonventing heat rejection. We have shown the feasibility of this approach by sizing the critical components for the hybrid garment, developing fabrication methods, building and testing a proof-of-concept system, and demonstrating by test that its performance is suitable for use in space suit life support systems.

  7. Multifunctional Cooling Garment for Space Suit Environmental Control

    NASA Technical Reports Server (NTRS)

    Izenson, Michael G.; Chen, Weibo; Phillips, Scott; Chepko, Ariane; Bue, Grant; Ferl, Janet

    2014-01-01

    Future manned space exploration missions will require space suits with capabilities beyond the current state of the art. Portable Life Support Systems for these future space suits face daunting challenges, since they must maintain healthy and comfortable conditions inside the suit for longduration missions while minimizing weight and water venting. We have demonstrated the feasibility of an innovative, multipurpose garment for thermal and humidity control inside a space suit pressure garment that is simple, rugged, compact, and lightweight. The garment is a based on a conventional liquid cooling and ventilation garment (LCVG) that has been modified to directly absorb latent heat as well as sensible heat. This hybrid garment will prevent buildup of condensation inside the pressure garment, prevent loss of water by absorption in regenerable CO2 removal beds, and conserve water through use of advanced lithium chloride absorber/radiator (LCAR) technology for nonventing heat rejection. We have shown the feasibility of this approach by sizing the critical components for the hybrid garment, developing fabrication methods, building and testing a proof-of-concept system, and demonstrating by test that its performance is suitable for use in space suit life support systems.

  8. Preliminary Shuttle Space Suit Shielding Model. Chapter 9

    NASA Technical Reports Server (NTRS)

    Anderson, Brooke M.; Nealy, J. E.; Qualls, G. D.; Staritz, P. J.; Wilson, J. W.; Kim, M.-H. Y.; Cucinotta, F. A.; Atwell, W.; DeAngelis, G.; Ware, J.; hide

    2003-01-01

    There are two space suits in current usage within the space program: EMU [2] and Orlan-M Space Suit . The Shuttle space suit components are discussed elsewhere [2,5,6] and serve as a guide to development of the current model. The present model is somewhat simplified in details which are considered to be second order in their effects on exposures. A more systematic approach is ongoing on a part-by-part basis with the most important ones in terms of exposure contributions being addressed first with detailed studies of the relatively thin space suit fabric as the first example . Additional studies to validate the model of the head coverings (bubble, helmet, visors.. .) will be undertaken in the near future. The purpose of this paper is to present the details of the model as it is now and to examine its impact on estimates of astronaut health risks. In this respect, the nonuniform distribution of mass of the space suit provides increased shielding in some directions and some organs. These effects can be most important in terms of health risks and especially critical to evaluation of potential early radiation effects .

  9. Use of behavioral biometrics in intrusion detection and online gaming

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  10. Adaptive top-down suppression of hippocampal activity and the purging of intrusive memories from consciousness.

    PubMed

    Benoit, Roland G; Hulbert, Justin C; Huddleston, Ean; Anderson, Michael C

    2015-01-01

    When reminded of unwanted memories, people often attempt to suppress these experiences from awareness. Prior work indicates that control processes mediated by the dorsolateral prefrontal cortex (DLPFC) modulate hippocampal activity during such retrieval suppression. It remains unknown whether this modulation plays a role in purging an intrusive memory from consciousness. Here, we combined fMRI and effective connectivity analyses with phenomenological reports to scrutinize a role for adaptive top-down suppression of hippocampal retrieval processes in terminating mnemonic awareness of intrusive memories. Participants either suppressed or recalled memories of pictures depicting faces or places. After each trial, they reported their success at regulating awareness of the memory. DLPFC activation was greatest when unwanted memories intruded into consciousness and needed to be purged, and this increased engagement predicted superior control of intrusive memories over time. However, hippocampal activity was decreased during the suppression of place memories only. Importantly, the inhibitory influence of the DLPFC on the hippocampus was linked to the ensuing reduction in intrusions of the suppressed memories. Individuals who exhibited negative top-down coupling during early suppression attempts experienced fewer involuntary memory intrusions later on. Over repeated suppressions, the DLPFC-hippocampus connectivity grew less negative with the degree that they no longer had to purge unwanted memories from awareness. These findings support a role of DLPFC in countermanding the unfolding recollection of an unwanted memory via the suppression of hippocampal processing, a mechanism that may contribute to adaptation in the aftermath of traumatic experiences.

  11. Immersion Suit Usage Within the RAAF

    DTIC Science & Technology

    1992-01-01

    IMMERSION SUIT USED UVIC QDIS HOLDINGS 202. in 12 Sizes, held by ALSS 492SQN REQUIREMENTS No comment USAGE POLICY REFERENCE DIRAF) AAP 7215.004-1 (P3C...held by ALSS 492SQN. REQUIREMENTS No comment ISACE POLICY REFERENCE DIIAF) AAP 7215.004-1 (P3C Flight Manual) RAAF Supplement No 92 USAGE POUICY UVIC...TYPE P3C REFERENCE Telecon FLTLT Toft I I SQNfRESO AVMED Dated 22 Mar 91 IMMERSION SUIT USED UVIC QDIS HOLDINGS No comment REQUIREMENTS No comment USAGE

  12. A Simulation-Optimization Model for the Management of Seawater Intrusion

    NASA Astrophysics Data System (ADS)

    Stanko, Z.; Nishikawa, T.

    2012-12-01

    Seawater intrusion is a common problem in coastal aquifers where excessive groundwater pumping can lead to chloride contamination of a freshwater resource. Simulation-optimization techniques have been developed to determine optimal management strategies while mitigating seawater intrusion. The simulation models are often density-independent groundwater-flow models that may assume a sharp interface and/or use equivalent freshwater heads. The optimization methods are often linear-programming (LP) based techniques that that require simplifications of the real-world system. However, seawater intrusion is a highly nonlinear, density-dependent flow and transport problem, which requires the use of nonlinear-programming (NLP) or global-optimization (GO) techniques. NLP approaches are difficult because of the need for gradient information; therefore, we have chosen a GO technique for this study. Specifically, we have coupled a multi-objective genetic algorithm (GA) with a density-dependent groundwater-flow and transport model to simulate and identify strategies that optimally manage seawater intrusion. GA is a heuristic approach, often chosen when seeking optimal solutions to highly complex and nonlinear problems where LP or NLP methods cannot be applied. The GA utilized in this study is the Epsilon-Nondominated Sorted Genetic Algorithm II (ɛ-NSGAII), which can approximate a pareto-optimal front between competing objectives. This algorithm has several key features: real and/or binary variable capabilities; an efficient sorting scheme; preservation and diversity of good solutions; dynamic population sizing; constraint handling; parallelizable implementation; and user controlled precision for each objective. The simulation model is SEAWAT, the USGS model that couples MODFLOW with MT3DMS for variable-density flow and transport. ɛ-NSGAII and SEAWAT were efficiently linked together through a C-Fortran interface. The simulation-optimization model was first tested by using a

  13. Procrastination as a Self-Regulation Failure: The Role of Impulsivity and Intrusive Thoughts.

    PubMed

    Rebetez, Marie My Lien; Rochat, Lucien; Barsics, Catherine; Van der Linden, Martial

    2018-02-01

    Procrastination has been described as the quintessence of self-regulatory failure. This study examines the relationships between this self-regulatory failure and other manifestations of self-regulation problems, namely impulsivity and intrusive thoughts. One hundred and forty-one participants completed questionnaires assessing procrastination, impulsivity (in particular, the urgency and lack of perseverance dimensions), and intrusive thoughts (i.e., rumination and daydreaming). Main results show that urgency mediated the association between rumination and procrastination, whereas rumination did not mediate the relation between urgency and procrastination. Lack of perseverance mediated the association between daydreaming and procrastination, and daydreaming mediated the relation between lack of perseverance and procrastination. This study highlights the role of impulsivity and intrusive thoughts in procrastination, specifies the links between these self-regulation problems, and provides insights into their (potential) underlying mechanisms. It also opens interesting prospects for management strategies for implementing targeted psychological interventions to reduce impulsive manifestations and/or thought control difficulties accompanying procrastination.

  14. Children’s recalls from five dietary-reporting validation studies: Intrusions in correctly reported and misreported options in school breakfast reports

    PubMed Central

    Baxter, Suzanne Domel; Hardin, James W.; Royer, Julie A.; Guinn, Caroline H.; Smith, Albert F.

    2008-01-01

    For school breakfast each day, many elementary schools offer a choice between a cold option that includes ready-to-eat (RTE) cereal and a hot option that includes a non-RTE-cereal entrée such as waffles. For breakfast reports, intrusions (reports of uneaten items) in correctly reported and misreported breakfast options were examined using data from five dietary-reporting validation studies. In each study, fourth-grade children were observed eating school breakfast and school lunch and then interviewed to obtain a dietary recall. A breakfast option was correctly reported in 240 breakfast reports for 203 intrusions total, and misreported in 97 breakfast reports for 189 intrusions total. Asymmetry was evident in misreported options; specifically, children observed eating a cold option almost never misreported a hot option, but children observed eating a hot option often misreported a cold option. Proportionately more breakfast reports were intrusion-free when a breakfast option was correctly reported than misreported. Linking of intrusions (i.e., multiple intrusions from the same option in a breakfast report) was especially evident with misreported breakfast options. Methodological aspects of dietary recalls such as target period (prior 24 hours; previous day), interview time (morning; afternoon; evening), and interview format (meal; open) had implications for intrusions and misreported breakfast options. PMID:18501992

  15. Alterations in MAST suit pressure with changes in ambient temperature.

    PubMed

    Sanders, A B; Meislin, H W; Daub, E

    1983-01-01

    A study was undertaken to test the hypothesis that change in ambient air temperature has an effect on MAST suit pressure according to the ideal gas law. Two different MAST suits were tested on Resusci-Annie dummies. The MAST suits were applied in a cold room at 4.4 degrees C and warmed to 44 degrees C. Positive linear correlations were found in nine trials, but the two suits differed in their rate of increase in pressure. Three trials using humans were conducted showing increased pressure with temperature but at a lesser rate than with dummies. A correlation of 0.5 to 1.0 mm Hg increase in MAST suit pressure for each 1.0 degrees C increase in ambient temperature was found. Implications are discussed for the use of the MAST suit in environmental conditions where the temperature changes.

  16. Passive intrusion detection system

    NASA Technical Reports Server (NTRS)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  17. Characterizing and Improving Distributed Intrusion Detection Systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizingmore » and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.« less

  18. Stratospheric Intrusion Catalog: A 10-year Compilation of Events Identified By Using an Objective Feature Tracking Model With NASA's MERRA-2 Reanalysis

    NASA Astrophysics Data System (ADS)

    Knowland, K. E.; Ott, L. E.; Duncan, B. N.; Wargan, K.; Hodges, K.

    2017-12-01

    Stratospheric intrusions - the introduction of ozone-rich stratospheric air into the troposphere - have been linked with surface ozone air quality exceedances, especially at the high elevations in the western USA in springtime. However, the impact of stratospheric intrusions in the remaining seasons and over the rest of the USA is less clear. A new approach to the study of stratospheric intrusions uses NASA's Goddard Earth Observing System Model (GEOS) model and assimilation products with an objective feature tracking algorithm to investigate the atmospheric dynamics that generate stratospheric intrusions and the different mechanisms through which stratospheric intrusions may influence tropospheric chemistry and surface air quality seasonally over both the western and the eastern USA. A catalog of stratospheric intrusions identified in the MERRA-2 reanalysis was produced for the period 2005-2014 and validated against surface ozone observations (focusing on those which exceed the national air quality standard) and a recent data set of stratospheric intrusion-influenced air quality exceedance flags from the US Environmental Protection Agency (EPA). Considering not all ozone exceedances have been flagged by the EPA, a collection of stratospheric intrusions can support air quality agencies for more rapid identification of the impact of stratospheric air on surface ozone and demonstrates that future operational analyses may aid in forecasting such events. An analysis of the spatiotemporal variability of stratospheric intrusions over the continental US was performed, and while the spring over the western USA does exhibit the largest number of stratospheric intrusions affecting the lower troposphere, the number of intrusions in the remaining seasons and over the eastern USA is sizable. By focusing on the major modes of variability that influence weather in the USA, such as the Pacific North American (PNA) teleconnection index, predicative meteorological patterns

  19. Safety Precautions and Operating Procedures in an (A)BSL-4 Laboratory: 1. Biosafety Level 4 Suit Laboratory Suite Entry and Exit Procedures

    PubMed Central

    Janosko, Krisztina; Holbrook, Michael R.; Adams, Ricky; Barr, Jason; Bollinger, Laura; Newton, Je T'aime; Ntiforo, Corrie; Coe, Linda; Wada, Jiro; Pusl, Daniela; Jahrling, Peter B.; Kuhn, Jens H.; Lackemeyer, Matthew G.

    2016-01-01

    Biosafety level 4 (BSL-4) suit laboratories are specifically designed to study high-consequence pathogens for which neither infection prophylaxes nor treatment options exist. The hallmarks of these laboratories are: custom-designed airtight doors, dedicated supply and exhaust airflow systems, a negative-pressure environment, and mandatory use of positive-pressure (“space”) suits. The risk for laboratory specialists working with highly pathogenic agents is minimized through rigorous training and adherence to stringent safety protocols and standard operating procedures. Researchers perform the majority of their work in BSL-2 laboratories and switch to BSL-4 suit laboratories when work with a high-consequence pathogen is required. Collaborators and scientists considering BSL-4 projects should be aware of the challenges associated with BSL-4 research both in terms of experimental technical limitations in BSL-4 laboratory space and the increased duration of such experiments. Tasks such as entering and exiting the BSL-4 suit laboratories are considerably more complex and time-consuming compared to BSL-2 and BSL-3 laboratories. The focus of this particular article is to address basic biosafety concerns and describe the entrance and exit procedures for the BSL-4 laboratory at the NIH/NIAID Integrated Research Facility at Fort Detrick. Such procedures include checking external systems that support the BSL-4 laboratory, and inspecting and donning positive-pressure suits, entering the laboratory, moving through air pressure-resistant doors, and connecting to air-supply hoses. We will also discuss moving within and exiting the BSL-4 suit laboratories, including using the chemical shower and removing and storing positive-pressure suits. PMID:27768063

  20. Safety Precautions and Operating Procedures in an (A)BSL-4 Laboratory: 1. Biosafety Level 4 Suit Laboratory Suite Entry and Exit Procedures.

    PubMed

    Janosko, Krisztina; Holbrook, Michael R; Adams, Ricky; Barr, Jason; Bollinger, Laura; Newton, Je T'aime; Ntiforo, Corrie; Coe, Linda; Wada, Jiro; Pusl, Daniela; Jahrling, Peter B; Kuhn, Jens H; Lackemeyer, Matthew G

    2016-10-03

    Biosafety level 4 (BSL-4) suit laboratories are specifically designed to study high-consequence pathogens for which neither infection prophylaxes nor treatment options exist. The hallmarks of these laboratories are: custom-designed airtight doors, dedicated supply and exhaust airflow systems, a negative-pressure environment, and mandatory use of positive-pressure ("space") suits. The risk for laboratory specialists working with highly pathogenic agents is minimized through rigorous training and adherence to stringent safety protocols and standard operating procedures. Researchers perform the majority of their work in BSL-2 laboratories and switch to BSL-4 suit laboratories when work with a high-consequence pathogen is required. Collaborators and scientists considering BSL-4 projects should be aware of the challenges associated with BSL-4 research both in terms of experimental technical limitations in BSL-4 laboratory space and the increased duration of such experiments. Tasks such as entering and exiting the BSL-4 suit laboratories are considerably more complex and time-consuming compared to BSL-2 and BSL-3 laboratories. The focus of this particular article is to address basic biosafety concerns and describe the entrance and exit procedures for the BSL-4 laboratory at the NIH/NIAID Integrated Research Facility at Fort Detrick. Such procedures include checking external systems that support the BSL-4 laboratory, and inspecting and donning positive-pressure suits, entering the laboratory, moving through air pressure-resistant doors, and connecting to air-supply hoses. We will also discuss moving within and exiting the BSL-4 suit laboratories, including using the chemical shower and removing and storing positive-pressure suits.