نتایج جستجو برای: outflow intrusions

تعداد نتایج: 23227  

Journal: :Behaviour research and therapy 2007
Thomas R Lynch Kristin G Schneider M Zachary Rosenthal Jennifer S Cheavens

Two studies examined the relationships among trait negative affectivity, dispositional thought suppression, and intrusions in non-clinical samples. In Study 1 (N=87), participants were presented with a series of emotionally evocative images and intrusions were examined 48 h after presentation via self-report. In Study 2 (N=118), intrusions were examined using a behavioral Key-press and self-rep...

Journal: :JNW 2013
Lifang Wang Shuhai Zhang Yurong Li Ruijuan Wu Yi Yu

Intrusion detection system is automatic system which recognize intrusions of computers or computer network systems. The existing security detection systems have many problems such as wrong detection of intrusions, false intrusions, poor real-time performance. To solve these problems, this paper improves the particle swarm optimization algorithm and presents an attribute-weighted distance calcul...

Journal: :Public health nutrition 2009
Suzanne Domel Baxter Julie A Royer Caroline H Guinn James W Hardin Albert F Smith

OBJECTIVE To use data from a published validation study concerning retention interval and school food-service production records to examine intrusions (uneaten items reported eaten) in the school-meal parts of 24 h recalls. DESIGN For that study, children were observed eating two school meals (breakfast, lunch) and interviewed under one of six conditions from two target periods (previous day ...

2010
Gilbert Eric Horsman

Exceptional exposures of igneous intrusions of the Henry Mountains of southern Utah allow for the detailed study of three-dimensional pluton geometries as well as igneous emplacement and assembly processes. Examination of the geometry, fabric, and wallrock structures of relatively small intrusions (<3 km map-view diameter) suggests that several plutons in the region (Maiden Creek sill, Trachyte...

2002
A. BOEHM J. C. MOORE

The late Miocene sandstone intrusions of northern Santa Cruz County, California, are the largest subaerial exposures of clastic intrusions on earth. The intrusions are sourced from a sandstone, underlying mudstone, accumulated in an outer shelf to upper slope environment. Dikes are the most frequent intrusion type, reach the greatest thickness and tend to strike north-east and dip steeply. One ...

2016
Stefanie M. Jungmann Noelle Vollmer Edward A. Selby Michael Witthöft

OBJECTIVE The Emotional Cascade Model (ECM) by Selby et al. (2008) proposes that people often engage in dysregulated behaviors to end extreme, aversive emotional states triggered by a self-perpetuating vicious cycle of (excessive) rumination, negative affect, and attempts to suppress negative thoughts. METHOD Besides replicating the ECM, we introduced intrusions as a mediator between ruminati...

2014
Passarelli L. Rivalta E. Shuler A.

As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusio...

2002
Mei-Fu Zhou Allen K. Kennedy Min Sun John Malpas Michael Lesher

South China has been considered as part of the Rodinian supercontinent during Neoproterozoic time, although its paleogeographic position within this supercontinent is still a matter of debate. The Wangjiangshan and Bijigou complexes along the northern margin of South China are among the largest mafic intrusions in China. New SHRIMP zircon U-Pb results indicate that these two intrusions have cry...

2005
IN AN MAREK PIOTR ZIELINSKI

Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. In such an architecture, the root node is responsible for detecting intrusions and for issuing responses. However, an intrusion detection system (IDS) based on a hierarchical architecture has many single points of failure. For example, by disabling the root node, the intrusion-detection funct...

2006
WENHONG LI RONG FU

Using 15-yr data from the European Centre for Medium-Range Weather Forecasts Re-Analysis (ERA15), the authors found that rapid southeastward expansion of the rainy area from the western Amazon to southeastern Brazil is a result of midlatitude cold air intrusions. During austral spring, as the large-scale thermodynamic structure over Amazonia becomes destabilized, the incursions of extratropical...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید