Skip to main content
Log in

A new perspective in identifying the precursory patterns of eruptions

  • Research Article
  • Published:
Bulletin of Volcanology Aims and scope Submit manuscript

Abstract

The complexity of the processes responsible for volcanic eruptions makes a theoretical approach to forecasting the evolution of volcanic unrest rather difficult. A feasible strategy for this purpose appears to be the identification of possible repetitive schemes (patterns) in the pre-eruptive unrest of volcanoes. Nevertheless, the limited availability and the heterogeneity of pre-eruptive data, and the objective difficulty in quantitatively recognizing complex pre-eruptive patterns, make this task very difficult. In this work we address this issue by using a pattern recognition approach applied to the seismicity recorded during 217 volcanic episodes of unrest around the world. In particular, we use two non-parametric algorithms that have proven to give satisfactory results in dealing with a small amount of data, even if not normally distributed and/or characterized by discrete or categorical values. The results show evidence of a longer period of instability in the unrest preceding an eruption, compared to isolated unrest. This might indicate, even if not necessarily, a difference in the energy of processes responsible for the two types of unrest. However, if the unrest is followed by an eruption, it seems that the seismic energy released during the unrest (parameterized by the duration of the swarm and the maximum magnitude recorded) is not indicative of the magnitude of the impending eruption. We also found that, in general, unrest followed by the largest explosive eruptions have a longer repose time than those related to moderate eruptions. This evidence supports the fact that the occurrence of a large eruption needs a sufficient amount of time after the last event in order to re-charge the feeding system and to achieve a closed-conduit regime so that a sufficiently large amount of gas can be accumulated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.

Similar content being viewed by others

References

  • Aki K, Ferrazzini V (2000) Seismic monitoring and modeling of an active volcano for prediction. J Geophys Res 105(B7)16617–16640

    Google Scholar 

  • Bak P, Tang C, Wiesenfeld K (1988) Self-organized criticality. Phys Rev Am 38:364–374

    Article  Google Scholar 

  • Benoit JR, McNutt SR (1996) Global volcanic earthquake swarm database 1979–1989. USGS Open-File Report 1996, No 69, US Department of the Interior, Washington, DC

  • Buell RE, Stoiber M (1976) Eruption of Volcan Fuego: October 14th, 1974. Bull Volcanol 38:861–870

    Google Scholar 

  • Cammarata S (1997) Reti neuronali, 2nd edn. Etaslibri, Milano, pp 1–291

  • Decker R, Decker B (1981) The eruptions of Mount St Helens, vol 244, No 3. Scientific American, New York, pp 68–80

  • Duda RO, Hart PE (1973) Pattern classification and scene analysis. Wiley, New York, pp 1–482

  • Dziewonsky AM, Woodhouse JH (1983) An experiment in systematic study of global seismicity: centroid-moment tensor solutions for 201 moderate and large earthquakes of 1981. J Geophys Res 88:3247–3271

    Google Scholar 

  • Dziewonsky AM, Chou TA, Woodhouse JH (1981) Determination of earthquake source parameters from waveform data for studies of global and regional seismicity. J Geophys Res 86:2825–2852

    Google Scholar 

  • Faberov AI (1983) Activity of the Plosky Tolbachik volcano June–July 1975. In: Fedotov SA, Markhinin YEK (eds) The great Tolbachik fissure eruption: geological and geophysical data 1975–1976. Cambridge University Press, Cambridge, pp 36–40

  • Fedotov SA, Gorel'chik VI, Stepanov VV, Garbuzova VT (1983) The development of the great Tolbachik fissure eruption in 1975 from seismological data. In: Fedotov SA, Markhinin YEK (eds) The great Tolbachik fissure eruption: geological and geophysical data1975–1976. Cambridge University Press, Cambridge, pp 189–203

  • Fukunaga K (1990) Statistical pattern recognition, 2nd edn. Academic Press, San Diego, pp 1–591

  • Gorshkov GS (1959) Gigantic eruption of the volcano Bezymianny. Bull Vulcanol 20:77–109

    CAS  Google Scholar 

  • Gorshkov GS, Dubik YM (1970) Gigantic directed blast at Sheveluch volcano (Kamchatka). Bull Vulcanol 34:261–288

    CAS  Google Scholar 

  • Gorel'chik VI, Stepanov VV, Khanzutin VP (1983) Volcanic tremor during the great Tolbachik fissure eruption of 1975. In: Fedotov SA, Markhinin YEK (eds) The great Tolbachik fissure eruption: geological and geophysical data 1975–1976. Cambridge University Press, Cambridge, pp 204–212

  • Gottsmann J, Rymer H (2002) Deflation during caldera unrest: constraints on subsurface processes and hazard prediction from gravity-height data. Bull Volcanol 64:338–348

    Article  Google Scholar 

  • Harlow DH, Power JA, Laguerta EP, Ambubuyog G, White RA, Hoblitt RP (1996) Precursory seismicity and forecasting of the June 15, 1991, eruption of Mount Pinatubo. In: Newhall CG, Punongbayan RS (eds) Fire and mud: eruptions and lahars of Mount Pinatubo, Philippines. Philippines Institute of Volcanology and Seismology, Quezon City, University of Washington Press, Seattle, pp 285–308

  • Hill DP, Dzurisin D, Ellsworth WL, Endo ET, Galloway DL, Gerlach TM, Johnston MJS, Langbein J, McGee KA, Miller CD, Oppenheimer D, Sorey ML (2002) Response plan for volcano hazards in the Long Valley Caldera and Mono Craters region, California. USGS Bull 2185:58

    Google Scholar 

  • Hollander M, Wolfe DA (1973) Non-parametric statistical methods. Wiley, New York, 503 pp

  • Jensen JH, De La Cruz-Reina S, Singh SK, Medina-Martinez F, Gutierrez-Martinez C (1983) Actividad sismica relacionada con las erupciones del volcan Chichonal en marzo y abril de 1982, Chiapas. In: El volcan Chichonal, UNAM, Instituto de Geologia, pp 36–48

  • Keilis-Borok VI, Knopoff L, Rotwain IM, Allen CR (1988) Intermediate-term prediction of occurrence times of strong earthquakes. Nature 335:690–694

    Article  Google Scholar 

  • Keilis-Borok VI, Kossobokov V (1990) Premonitory activation of earthquake flow: algorithm M8. Phys Earth Planet Int 61:73–83

    Article  Google Scholar 

  • Londoño JM, Sudo Y (2002) A warning model based on temporal changes of coda Q for volcanic activity at Nevado Del Ruiz Volcano, Colombia. Bull Volcanol 64:303–315

    Article  Google Scholar 

  • Marzocchi W (2002) Remote seismic influence on large explosive eruptions. J Geophys Res 107:B1 DOI 10.1029/2001JB000307

    Google Scholar 

  • Mc Nutt, SR (1996) Seismic monitoring and eruption forecasting of volcanoes: a review of the state-of-the-art and case histories. In: Scarpa R, Tilling R (eds) Monitoring and mitigation of volcano hazards, Springer, Berlin Heidelberg New York, 99–146

  • Miller TP, McGimsey RG (1998) Catalog of the historically active volcanoes of Alaska. Department of the Interior USGS Open-File Report 1998 No 582

  • Mulargia F, Gasperini P, Marzocchi W (1991) Pattern recognition applied to volcanic activity: identification of the precursory patterns to Etna recent flank eruptions and periods of rest. J Volcanol Geotherm Res 45:187–196

    Article  Google Scholar 

  • Mulargia F, Marzocchi W, Gasperini P (1992) Statistical identification of physical patterns which accompany eruptive activity on Mount Etna, Sicily. J Volcanol Geotherm Res 53:289–296

    Article  Google Scholar 

  • Newhall CG, Dzurisin D (1988) Historical unrest at large calderas of the world. USGS Bull 1855:1108

    Google Scholar 

  • Newhall CG, Punongbayan RS (eds) (1996) Fire and mud: eruptions and lahars of Mount Pinatubo, Philippines. Philippines Institute of Volcanology and Seismology, Quezon City, University of Washington Press, Seattle, pp 1–1126

    Google Scholar 

  • Newhall CG, Decker R (2002) Can the VEI of an eruption be forecast? In: Proc IAVCEI Int. Congr., Martinique, 12–16 May 2002

  • Newhall CG, Hoblitt RP (2002) Constructing event trees for volcanic crises. Bull Volcanol 64:3–20

    Article  Google Scholar 

  • Pacheco JF, Sykes LR (1992) Seismic moment catalog of large shallow earthquakes, 1900–1989. Bull Seismol Soc Am 82:1306–1349

    Google Scholar 

  • Reeder JW, Lahr JC, Thomas J, Conens S, Blackford M (1977) Seismological aspects of the recent eruption of Augustine volcano. EOS Transact 58:12

    Google Scholar 

  • Rounds EM (1980) A combined nonparametric approach to feature selection and binary decision tree design. Pattern Recogn 12:313–317

    Article  Google Scholar 

  • Sandri L, Marzocchi W (2003) Testing the performance of some nonparametric pattern recognition algorithms in realistic cases. Pattern Recogn (in press)

  • Shibata T, Akita F (2001) Precursory changes in well water level prior to the March, 2000 eruption of Usu volcano, Japan. Geophys Res Lett 28(9):1799–1802

    Google Scholar 

  • Shimozuru D (1972) A seismological approach to the prediction of volcanic eruptions. In: The surveillance and prediction of volcanic activity, vol 8. UNESCO Earth Sci Monograph, Paris, pp 19–45

  • Simkin T, Howard KA (1970) Caldera collapse in the Galapagos Islands, 1968. Science 169(3944):428–437

    Google Scholar 

  • Simkin T, Siebert L (1994) Volcanoes of the world, 2nd edn. Geoscience Press, Tucson, Arizona, pp 1–349

  • Smithsonian Institution's Global Volcanism Network (1990) Summary of recent volcanic activity. Bull Volcanol 52:407

    Google Scholar 

  • Sparks RSJ (2003) Forecasting volcanic eruptions. Earth Planet Sci Lett 210:1–15

    Article  CAS  Google Scholar 

  • Swanson SE, Kienle J (1988) The 1986 eruption of Mt. St. Augustine: field test of a hazard evaluation. J Geophys Res 93:4500–4520

    CAS  Google Scholar 

  • Tarassenko L (1998) A Guide to neural computing applications. Wiley, New York, pp 1–139

  • Taylor GA (1957) The 1951 eruption of Lamington, Papua Commonwealth of Australia. Bureau of Mineral Resources. Geol Geophys Bull 38:117

    Google Scholar 

  • Tokarev PI (1985) The prediction of large explosions of andesitic volcanoes. J Geodyn 3:219–244

    Article  Google Scholar 

  • Vinciguerra S, Latora V, Bicciato S, Kamimura RT (2001) Identifying and discriminating seismic patterns leading flank eruptions at Mt. Etna volcano during 1981–1996. J Volcanol Geotherm Res 106:211–228

    Article  CAS  Google Scholar 

  • Voight B, Sparks RSJ, Miller AD, Stewart RC, Hoblitt RP, Clarke A, Ewart J, Aspinall WP, Baptie B, Druitt TH, Herd RA, Jackson P, Lockhart AB, Loughlin SC, Lynch L, McMahon J, Norton GE, Robertson R, Watson IM, Young SR (1999) Magma flow instability and cyclic activity at Soufriere Hills Volcano, Montserrat, BWI. Science 283:1138–1142

    CAS  PubMed  Google Scholar 

  • Volcanological Society of Japan (1960–1993) Bull volc eruptions, vols 1–30. Published in Bull Volcanol since 1986

  • Zobin VM (1971) Mechanism of volcanic earthquake of the Sheveluch volcano, Kamchatka. Bull Vulcanol 35(1):225–229

    Google Scholar 

  • Zobin VM (1983) The focal mechanism and dynamic parameters of volcanic earthquakes preceding the great Tolbachik fissure eruption of 1975. In: Fedotov SA, Markhinin YEK (eds) The great Tolbachik fissure eruption: geological and geophysical data 1975–1976. Cambridge University Press, Cambridge pp 243–256

Download references

Acknowledgements

We thank Lee Siebert for his help with the largest volcanic eruptions, which for us has been essential to our work. We also wish to thank Paolo Papale for the information regarding the 2002 Nyiragongo eruption and the related unrest episode. Finally, we thank Christopher Newhall and an anonymous reviewer for helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laura Sandri.

Additional information

Editorial responsibility: T. Druitt

Appendices

Appendix A: Binary decision tree

This method was developed by Rounds (1980) and, slightly modified, successfully applied to volcanic data by Mulargia et al. (1992). It can be used only in the 2-class problem and it was originally designed for hierarchically ordered datasets, even though tests on synthetic data have shown very good behavior also on different types of datasets.

Once the data have been collected, and objects and classes have been defined, BDT integrates feature selection and binary decision tree according to the following steps:

  1. 1.

    The fixing of a level α for the decision rule. This level represents the risk we accept of a wrong attribution at each step. We used α=0.1.

  2. 2.

    The computation of the cumulative distribution in both classes for each feature taken one at a time, and the identification of the feature and the relative threshold value for which the statistical difference between the cumulative of the two classes is the largest. This means that the significance level of this statistical difference must be (a) lower than the level α and (b) lower than the significance level of the statistical difference calculated for any other feature. The feature (if any) for which both the (a) and (b) conditions are satisfied is the first-order feature, often called the "root" of the pattern. On the basis of the root feature and its threshold value, each object is assigned to either one of two subsets formed respectively by data with a value of the root feature lower/higher than the threshold.

  3. 3.

    The identification of the second-order features and their thresholds for which the statistical difference again satisfies the (a) and (b) conditions. These features, which are at most two (i.e., one for each subset), are found by reanalyzing all the features in the two subsets separately, as in step 2.

  4. 4.

    The repeating of step 3 for each second-order feature in order to identify progressively higher orders, as long as it is possible to find a feature for which the cumulatives in the two classes are statistically different at a significance level lower than α. The progressive branching of the tree gives all the possible patterns. The procedure automatically terminates when no further branching is possible at the given level α.

Steps 2–4 are performed by means of non-parametric Kolmogorov-Smirnov two-sample statistics (Hollander and Wolfe 1973). Note that the use of an a priori fixed level α reduces the possibility of obtaining overfitting patterns.

Appendix B: Fisher's discriminant analysis

This method (see e.g., Duda and Hart 1973) is based on the reduction of the n-dimensional space of the objects (where n is the number of variables describing the objects, i.e., the dimension of the vectors) to an L-1 dimensional space (where L is the number of classes). In our 2-class problem (L=2), Fisher's method simply projects the objects onto a line. The basic idea, called Fisher criterion, is to project the objects onto the direction that maximizes the ratio of the dispersion between the classes to the dispersion within the classes. More rigorously, suppose we have N objects x, each represented by a vector consisting of n components x k (k=1,...n). Of these, N 1 belong to class 1 and N 2 to class 2. We linearly combine the components of x, i.e., the x k (k=1,...n), in order to obtain a one-dimensional vector y=(y):

$$y = w^{T}_{k} x_{k} $$
(2)

where w k are the elements of an n-dimensional vector that projects x onto y. In this way, we obtain N objects y=(y) spread over the two classes.

The unknown in Eq.(2) is the projector, i.e., the vector w. As mentioned above, we would like to choose the projection for which the ratio of the dispersion between the classes to the dispersion within the classes is maximum. In order to do this, first we need to define some quantities.

We define m i as the average vector of class i:

$${\mathbf{m}}_{i} = \frac{1}{{N_{i} }}{\sum\limits_{{\mathbf{x}} \in {\text{class }}i} {\mathbf{x}} }$$
(3)

We also define m as the average of all the x:

$${\mathbf{m}} = \frac{1}{N}{\sum\limits_{\mathbf{x}} {\mathbf{x}} }$$
(4)

Thus, the dispersion matrix within the class i is given by:

$$S_{i} = {\sum\limits_{{\mathbf{x}} \in {\text{class }}i} {({\mathbf{x}} - {\mathbf{m}}_{i} )} }({\mathbf{x}} - {\mathbf{m}}_{i} )^{T} $$
(5)

and the dispersion within all of the classes is

$$S_{w} = {\sum\limits_{i = 1}^2 {S_{i} } }$$
(6)

The total dispersion matrix is given by

$$S_{T} = {\sum\limits_{\mathbf{x}} {({\mathbf{x}} - {\mathbf{m}})} }({\mathbf{x}} - {\mathbf{m}})^{T} $$
(7)

It follows that

$$ \begin{array}{*{20}l} {{S_{T} } \hfill} & {{ = {\sum\limits_{i = 1}^2 {{\sum\limits_{{\mathbf{x}} \in {\text{class }}i} {({\mathbf{x}} - {\mathbf{m}}_{i} + {\mathbf{m}}_{i} - {\mathbf{m}})({\mathbf{x}} - {\mathbf{m}}_{i} + {\mathbf{m}}_{i} - {\mathbf{m}})} }^{T} } }} \hfill} \\ {{} \hfill} & {{ = {\sum\limits_{i = 1}^2 {{\sum\limits_{{\mathbf{x}} \in {\text{class }}i} {({\mathbf{x}} - {\mathbf{m}}_{i} )({\mathbf{x}} - {\mathbf{m}}_{i} )} }^{T} + {\sum\limits_{i = 1}^2 {{\sum\limits_{{\mathbf{x}} \in {\text{class }}i} {({\mathbf{m}}_{i} - {\mathbf{m}})({\mathbf{m}}_{i} - {\mathbf{m}})} }^{T} } }} }} \hfill} \\ {{} \hfill} & {{ = S_{w} + {\sum\limits_{i = 1}^2 {N_{i} } }({\mathbf{m}}_{i} - {\mathbf{m}})({\mathbf{m}}_{i} - {\mathbf{m}})^{T} } \hfill} \\ \end{array} $$
(8)

The second addendum of the right side term of Eq. (8) is a dispersion matrix S b that gives an idea of the dispersion between the partial means m i over the different classes and the total mean m:

$$S_{b} = {\sum\limits_{i = 1}^2 {N_{i} } }({\mathbf{m}}_{i} - {\mathbf{m}})({\mathbf{m}}_{i} - {\mathbf{m}})^{T} $$
(9)

In order to achieve the vector w * that maximizes the ratio of the S b to the S w , we need to project these matrixes onto the y space and compute the w * such that:

$$\frac{{|w^{{*T}} S_{b} w^{*} |}}{{|w^{{*T}} S_{w} w^{*} |}} = {\mathop {\max }\limits_w }\frac{{|w^{T} S_{b} w|}}{{|w^{T} S_{w} w|}}$$
(10)

Once the maximization has been carried out, Fisher's analysis projects the x vectors onto the y space, which is a line. Then, each object y is assigned to the class i whose mean m i , projected onto the same line, is closest to y.

Appendix C: Branch-and-bound technique

This technique (see e.g., Fukunaga 1990) allows us to select the subset of relevant features among those available. In fact, given n features for each object, apart from few statistical PR algorithms (e.g., BDT) that automatically provide the subset of features by which the classification is carried out (named optimal subset), most of the statistical PR algorithms just perform the pattern recognition and the classification of the objects, but do not explicitly provide the optimal subset. The basic concept in the selection of the optimal subset of features is to find, among all possible subset of the n features, the one leading to the lowest classification error and consisting of the smallest number of features. In such a situation, we are confident that we are considering all of the important variables (otherwise the classification error would not be the lowest) and we are excluding the irrelevant ones (otherwise the number of features in the optimal subset would not be the smallest).

A simple, but very time consuming way to find such an optimal subset consists of exploring the performance of the chosen statistical PR algorithm on all the possible subsets of the n features. This becomes prohibitive as n increases, since we have to explore \({\sum\nolimits_{k = 1}^n {{\left( {\begin{array}{*{20}c} {n} \\ {k} \\ \end{array} } \right)}} }\) subsets. In order to avoid the application of the chosen statistical PR algorithm to all the possible subsets of features, the branch-and-bound technique was developed. This technique is applied iteratively n times; at each iteration k (k=1,...n), it allows for the identification of the suboptimal subset consisting of k features by applying the statistical PR algorithm only to the "most promising" subsets of k features. The suboptimal subset is then the one consisting of k features and leading to the lowest classification error.

The branch-and-bound method relies on a basic assumption; i.e., it assumes that the noise introduced by irrelevant features does not deteriorate the signal given by the relevant features. In a previous study we have tested the validity of this assumption for algorithms BDT and FIS. Based on this assumption, when a certain subset of k features does not produce a good discrimination rule, the branch-and-bound method assumes that any other subset of k+l (l=1,...n-k) features containing those k features will not be the optimal one. In this way, a considerable portion of all the possible subsets is discarded a priori thus saving computation time and effort.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sandri, L., Marzocchi, W. & Zaccarelli, L. A new perspective in identifying the precursory patterns of eruptions. Bull Volcanol 66, 263–275 (2004). https://doi.org/10.1007/s00445-003-0309-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00445-003-0309-7

Keywords

Navigation