291 resultados para layered intrusion
Resumo:
Several I- and A-type granite, syenite plutons and spatially associated, giant Fe–Ti–V deposit-bearing mafic ultramafic layered intrusions occur in the Pan–Xi(Panzhihua–Xichang) area within the inner zone of the Emeishan large igneous province (ELIP). These complexes are interpreted to be related to the Emeishan mantle plume. We present LA-ICP-MS and SIMS zircon U–Pb ages and Hf–Nd isotopic compositions for the gabbros, syenites and granites from these complexes. The dating shows that the age of the felsic intrusive magmatism (256.2 ± 3.0–259.8 ± 1.6 Ma) is indistinguishable from that of the mafic intrusive magmatism (255.4 ± 3.1–259.5 ± 2.7 Ma) and represents the final phase of a continuous magmatic episode that lasted no more than 10 Myr. The upper gabbros in the mafic–ultramafic intrusions are generally more isotopically enriched (lower eNd and eHf) than the middle and lower gabbros, suggesting that the upper gabbros have experienced a higher level of crustal contamination than the lower gabbros. The significantly positive eHf(t) values of the A-type granites and syenites (+4.9 to +10.8) are higher than those of the upper gabbros of the associated mafic intrusion, which shows that they cannot be derived by fractional crystallization of these bodies. They are however identical to those of the mafic enclaves (+7.0 to +11.4) and middle and lower gabbros, implying that they are cogenetic. We suggest that they were generated by fractionation of large-volume, plume-related basaltic magmas that ponded deep in the crust. The deep-seated magma chamber erupted in two stages: the first near a density minimum in the basaltic fractionation trend and the second during the final stage of fractionation when the magma was a low density Fe-poor, Si-rich felsic magma. The basaltic magmas emplaced in the shallowlevel magma chambers differentiated to form mafic–ultramafic layered intrusions accompanied by a small amount of crustal assimilation through roof melting. Evolved A-type granites (synenites and syenodiorites) were produced dominantly by crystallization in the deep crustal magma chamber. In contrast, the I-type granites have negative eNd(t) [-6.3 to -7.5] and eHf(t) [-1.3 to -6.7] values, with the Nd model ages (T Nd DM2) of 1.63-1.67 Ga and Hf model ages (T Hf DM2) of 1.56-1.58 Ga, suggesting that they were mainly derived from partial melting of Mesoproterozoic crust. In combination with previous studies, this study also shows that plume activity not only gave rise to reworking of ancient crust, but also significant growth of juvenile crust in the center of the ELIP.
Resumo:
The matrix of volcaniclastic kimberlite (VK) from the Muskox pipe (Northern Slave Province, Nunavut, Canada) is interpreted to represent an overprint of an original clastic matrix. Muskox VK is subdivided into three different matrix mineral assemblages that reflect differences in the proportions of original primary matrix constituents, temperature of formation and nature of the altering fluids. Using whole rock X-ray fluorescence (XRF), whole rock X-ray diffraction (XRD), microprobe analyses, back-scatter electron (BSE) imaging, petrography and core logging, we find that most matrix minerals (serpentine, phlogopite, chlorite, saponite, monticellite, Fe-Ti oxides and calcite) lack either primary igneous or primary clastic textures. The mineralogy and textures are most consistent with formation through alteration overprinting of an original clastic matrix that form by retrograde reactions as the deposit cools, or, in the case of calcite, by precipitation from Ca-bearing fluids into a secondary porosity. The first mineral assemblage consists largely of serpentine, phlogopite, calcite, Fe-Ti oxides and monticellite and occurs in VK with relatively fresh framework clasts. Alteration reactions, driven by deuteric fluids derived from the juvenile constituents, promote the crystallisation of minerals that indicate relatively high temperatures of formation (> 400 °C). Lower-temperature minerals are not present because permeability was occluded before the deposit cooled to low temperatures, thus shielding the facies from further interaction with fluids. The other two matrix mineral assemblages consist largely of serpentine, phlogopite, calcite, +/- diopside, and +/- chlorite. They form in VK that contains more country rock, which may have caused the deposit to be cooler upon emplacement. Most framework components are completely altered, suggesting that larger volumes of fluids drove the alteration reactions. These fluids were likely of meteoric provenance and became heated by the volcaniclastic debris when they percolated into the VK infill. Most alteration reactions ceased at temperatures > 200 °C, as indicated by the absence or paucity of lower-temperature phases in most samples, such as saponite. Recognition that Muskox VK contains an original clastic matrix is a necessary first step for evaluating the textural configuration, which is important for reconstructing the physical processes responsible for the formation of the deposit.
Resumo:
The crystal structure of the hydrated proton-transfer compound of the drug quinacrine [rac-N'-(6-chloro-2-methoxyacridin-9-yl)-N,N-diethylpentane-1,4-diamine] with 4,5-dichlorophthalic acid, C23H32ClN3O2+ . 2(C8H3Cl2O4-).4H2O (I), has been determined at 200 K. The four labile water molecules of solvation form discrete ...O--H...O--H... hydrogen-bonded chains parallel to the quinacrine side chain, the two N--H groups of which act as hydrogen-bond donors for two of the water acceptor molecules. The other water molecules, as well as the acridinium H atom, also form hydrogen bonds with the two anion species and extend the structure into two-dimensional sheets. Between these sheets there are also weak cation--anion and anion--anion pi-pi aromatic ring interactions. This structure represents only the third example of a simple quinacrine derivative for which structural data are available but differs from the other two in that it is unstable in the X-ray beam due to efflorescence, probably associated with the destruction of the unusual four-membered water chain structures.
Resumo:
Objectives. We tested predictions from the elaborated intrusion (EI) theory of desire, which distinguishes intrusive thoughts and elaborations, and emphasizes the importance of imagery. Secondarily, we undertook preliminary evaluations of the Alcohol Craving Experience (ACE) questionnaire, a new measure based on EI Theory. Methods. Participants (N ¼ 232) were in correspondence-based treatment trials for alcohol abuse or dependence. The study used retrospective reports obtained early in treatment using the ACE, and daily self-monitoring of urges, craving, mood and alcohol consumption. Results. The ACE displayed high internal consistency and test – retest reliability and sound relationships with self-monitored craving, and was related to Baseline alcohol dependence, but not to consumption. Imagery during craving was experienced by 81%,with 2.3 senses involved on average. More frequent imagery was associated with longer episode durations and stronger craving. Transient intrusive thoughts were reported by 87% of respondents, and were more common if they frequently attempted to stop alcohol cognitions. Associations between average daily craving and weekly consumption were seen. Depression and negative mood were associated with more frequent, stronger and longer lasting desires for alcohol. Conclusions. Results supported the distinction of automatic and controlled processes in craving, together with the importance of craving imagery. They were also consistent with prediction of consumption from cross-situational averages of craving, and with positive associations between craving and negative mood. However, this study’s retrospective reporting and correlational design require that its results be interpreted cautiously. Research using ecological momentary measures and laboratory manipulations is needed before confident inferences about causality can be made.
Resumo:
The authors argue that human desire involves conscious cognition that has strong affective connotation and is potentially involved in the determination of appetitive behavior rather than being epiphenomenal to it. Intrusive thoughts about appetitive targets are triggered automatically by external or physiological cues and by cognitive associates. When intrusions elicit significant pleasure or relief, cognitive elaboration usually ensues. Elaboration competes with concurrent cognitive tasks through retrieval of target related information and its retention in working memory. Sensory images are especially important products of intrusion and elaboration because they simulate the sensory and emotional qualities of target acquisition. Desire images are momentarily rewarding but amplify awareness of somatic and emotional deficits. Effects of desires on behavior are moderated by competing incentives, target availability, and skills. The theory provides a coherent account of existing data and suggests new directions for research and treatment.
Resumo:
The equations governing saltwater intrusion in coastal aquifers are complex. Backward Euler time stepping approaches are often used to advance the solution to these equations in time, which typically requires that small time steps be taken in order to ensure that an accurate solution is obtained. We show that a method of lines approach incorporating variable order backward differentiation formulas can greatly improve the efficiency of the time stepping process.
Resumo:
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
Resumo:
Silylated layered double hydroxides (LDHs) were synthesized through a surfactant-free method involving an in situ condensation of silane with the surface hydroxyl group of LDHs during its reconstruction in carbonate solution. X-ray diffraction (XRD) patterns showed the silylation reaction occurred on the external surfaces of LDHs layers. The successful silylation was evidenced by 29Si cross-polarization magic-angle spinning nuclear magnetic resonance (29Si CP/MAS NMR) spectroscopy, attenuated total reflection Fourier transform infrared (ATR FTIR) spectroscopy, and infrared emission spectroscopy (IES). The ribbon shaped crystallites with a “rodlike” aggregation were observed through transmission electron microscopy (TEM) images. The aggregation was explained by the T2 and T3 types of linkage between adjacent silane molecules as indicated in the 29Si NMR spectrum. In addition, the silylated products show high thermal stability by maintained Si related bands even when the temperature was increased to 1000 °C as observed in IES spectra.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.