نتایج جستجو برای: outflow intrusions

تعداد نتایج: 23227  

2008
E. E. Brodsky C. D. Rowe F. Meneghini J. C. Moore

6 [1] The absolute value of stress on a fault during slip is a critical unknown quantity in 7 earthquake physics. One of the reasons for the uncertainty is a lack of geological 8 constraints in real faults. Here we calculate the slip rate and stress on an ancient fault 9 in a new way based on rocks preserved in an unusual exposure. The study area consists of 10 a fault core on Kodiak Island tha...

2018
David A Kalmbach Vivek Pillai Christopher L Drake

Nearly half of US adults endorse insomnia symptoms. Sleep problems increase risk for depression during stress, but the mechanisms are unclear. During high stress, individuals having difficulty falling or staying asleep may be vulnerable to cognitive intrusions after stressful events, given that the inability to sleep creates a period of unstructured and socially isolated time in bed. We investi...

2015
Meiyun Lin Arlene M. Fiore Larry W. Horowitz Andrew O. Langford Samuel J. Oltmans David Tarasick Harald E. Rieder

Evidence suggests deep stratospheric intrusions can elevate western US surface ozone to unhealthy levels during spring. These intrusions can be classified as 'exceptional events', which are not counted towards non-attainment determinations. Understanding the factors driving the year-to-year variability of these intrusions is thus relevant for effective implementation of the US ozone air quality...

2017
Leif Karlstrom Scott R. Paterson Mark Jellinek

Direct constraints on the ascent, storage and eruption of mantle melts come primarily from exhumed, long-frozen intrusions. These structures, relics of a dynamic magma transport network, encode how Earth’s crust grows and di erentiates over time. Furthermore, they connect mantle melting to an evolving distribution of surface volcanism. Disentangling magma transport processes from the plutonic r...

Journal: :Cortex; a journal devoted to the study of the nervous system and behavior 2008
Francesca De Anna Eve Attali Laurence Freynet Lucie Foubert Aurore Laurent Bruno Dubois Gianfranco Dalla Barba

Patients with Alzheimer's disease (AD) suffer from distortions of memory. Among such distortions, intrusions in memory tests are frequently observed. In this study we describe the performance of a group of mild AD patients and a group of normal controls on the recall of three different types of stories: a previously unknown story, a well-known fairy-tale (Cinderella), and a modified well-known ...

2006
Marco Giunti

The ability to prevent and to detect intrusions in computer systems is often heavily conditioned by having some knowledge of the security flaws of the system under analysis. Discover intrusions is particularly hard in concurrent systems, which contain several interactions among their components; suspicious interactions are usually studied manually by security experts which need to establish if ...

2000
Alec Yasinsac

Secure electronic communication relies on the application of cryptography. However, even with perfect encryption, communication may be compromised without effective security protocols for key exchange, authentication, privacy, etc. We are beginning to see environments characterized by high volume encrypted traffic between large numbers of communicating principals, facilitated by heterogeneous i...

2002
Luis J. Gonzalez LUIS J. GONZALEZ

Before the flourishing of the Internet, computers were limited to the walls of the organization where computers were linked to each other but had little contact with computer systems outside. Now, we can reach farther, and can expose and link our computers to the entire world; however, such capabilities have made our privacy and assets vulnerable to cyber space attackers. Fortunately, attacks c...

Journal: :IJWIS 2008
Christie I. Ezeife Jingyu Dong Akshai K. Aggarwal

Purpose of this Paper: Paper proposes a web intrusion detection system, SensorWebIDS, which applies data mining, anomaly and misuse intrusion detection on web environment. Design Approach: SensorWebIDS has three main components: the Network Sensor for extracting parameters from real-time network traffic, the Log Digger for extracting parameters from web log files and the Audit Engine for analyz...

Journal: :Remote Sensing 2013
Lei Liu Jun Zhou Dong Jiang Dafang Zhuang Lamin R. Mansaray Bing Zhang

The Xiemisitai area, West Junggar, Xinjiang, China, is situated at a potential copper mineralization zone in association with small granitic intrusions. In order to identify the alteration zones and mineralization characteristics of the intrusions, Landsat Enhanced Thematic Mapper (ETM+) and Quickbird data of the study area were evaluated in mapping lithological units, small intrusions, and alt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید