We have been studying the stratigraphy of core LWB4-1 taken in 2001 in the Hudson River about 100 meters north of the calculated transit path of the Peekskill meteorite in October 1992. We measured magnetic susceptibility at 1cm intervals from 0 -70 cm depth and found a layer with a magnetic susceptibility of 11 cgs units at 6 cm depth. This is the highest susceptibility in the top 40 cm of the core. Scanning X-Ray Fluorescence spectroscopy revealed the high susceptibility layer at 6 cm depth is part of a 3 cm interval with a high Ni/Cr ratio, but the depth of the peak in the Ni/Cr ratio is poorly resolved due to measurement error. We plan to dry and homogenize discreet samples for analysis on bench top XRF to reduce Ni and Cr error. Based on our identification of the base of modern Pb at 68 cm depth, the top 40 cm of the core covers the time interval from 2001 to 1930. From previous work on Central Park Lake, the base of modern Pb represents the year 1880 A.D. A uniform sedimentation rate model is supported a peak in Pb and As at 8 cm depth. The peakmore »
This content will become publicly available on June 1, 2023
Bone hydration: How we can evaluate it, what can it tell us, and is it an effective therapeutic target?
- Award ID(s):
- 1952993
- Publication Date:
- NSF-PAR ID:
- 10322785
- Journal Name:
- Bone Reports
- Volume:
- 16
- Issue:
- C
- ISSN:
- 2352-1872
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Mobile fitness tracking apps allow users to track their workouts and share them with friends through online social networks. Although the sharing of personal data is an inherent risk in all social networks, the dangers presented by sharing personal workouts comprised of geospatial and health data may prove especially grave. While fitness apps offer a variety of privacy features, at present it is unclear if these countermeasures are sufficient to thwart a determined attacker, nor is it clear how many of these services’ users are at risk. In this work, we perform a systematic analysis of privacy behaviors and threats in fitness tracking social networks. Collecting a month-long snapshot of public posts of a popular fitness tracking service (21 million posts, 3 million users), we observe that 16.5% of users make use of Endpoint Privacy Zones (EPZs), which conceal fitness activity near user-designated sensitive locations (e.g., home, office). We go on to develop an attack against EPZs that infers users’ protected locations from the remaining available information in public posts, discovering that 95.1% of moderately active users are at risk of having their protected locations extracted by an attacker. Finally, we consider the efficacy of state-of-the-art privacy mechanisms through adaptingmore »