30 resultados para granitic intrusions

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Across central Australia and south-west Queensland, a large (~800,000km2) subsurface temperature anomaly occurs (Figure 1). Temperatures are interpreted to be greater than 235°C at 5km depth, ca. 85°C higher than the average geothermal gradient for the upper continental crust (Chopra & Holgate, 2005; Holgate & Gerner, 2011). This anomaly has driven the development of Engineered Geothermal Systems (EGS) at Innamincka, where high temperatures have been related to the radiogenic heat production of High Heat Producing Granites (HHPG) at depth, below thermally insulative sedimentary cover (Chopra & Holgate, 2005; Draper & D’Arcy, 2006; Meixner & Holgate, 2009). To evaluate the role of granitic rocks at depth in generating the broader temperature anomaly in SW-Queensland, we sampled 25 granitic rocks from basement intervals of petroleum drill cores below thermal insulative cover along two transects (WNW–ESE and NNE–SSW — Figure 1) and performed a multidisciplinary study involving petrography, whole-rock chemistry, zircon dating and thermal conductivity measurements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several I- and A-type granite, syenite plutons and spatially associated, giant Fe–Ti–V deposit-bearing mafic ultramafic layered intrusions occur in the Pan–Xi(Panzhihua–Xichang) area within the inner zone of the Emeishan large igneous province (ELIP). These complexes are interpreted to be related to the Emeishan mantle plume. We present LA-ICP-MS and SIMS zircon U–Pb ages and Hf–Nd isotopic compositions for the gabbros, syenites and granites from these complexes. The dating shows that the age of the felsic intrusive magmatism (256.2 ± 3.0–259.8 ± 1.6 Ma) is indistinguishable from that of the mafic intrusive magmatism (255.4 ± 3.1–259.5 ± 2.7 Ma) and represents the final phase of a continuous magmatic episode that lasted no more than 10 Myr. The upper gabbros in the mafic–ultramafic intrusions are generally more isotopically enriched (lower eNd and eHf) than the middle and lower gabbros, suggesting that the upper gabbros have experienced a higher level of crustal contamination than the lower gabbros. The significantly positive eHf(t) values of the A-type granites and syenites (+4.9 to +10.8) are higher than those of the upper gabbros of the associated mafic intrusion, which shows that they cannot be derived by fractional crystallization of these bodies. They are however identical to those of the mafic enclaves (+7.0 to +11.4) and middle and lower gabbros, implying that they are cogenetic. We suggest that they were generated by fractionation of large-volume, plume-related basaltic magmas that ponded deep in the crust. The deep-seated magma chamber erupted in two stages: the first near a density minimum in the basaltic fractionation trend and the second during the final stage of fractionation when the magma was a low density Fe-poor, Si-rich felsic magma. The basaltic magmas emplaced in the shallowlevel magma chambers differentiated to form mafic–ultramafic layered intrusions accompanied by a small amount of crustal assimilation through roof melting. Evolved A-type granites (synenites and syenodiorites) were produced dominantly by crystallization in the deep crustal magma chamber. In contrast, the I-type granites have negative eNd(t) [-6.3 to -7.5] and eHf(t) [-1.3 to -6.7] values, with the Nd model ages (T Nd DM2) of 1.63-1.67 Ga and Hf model ages (T Hf DM2) of 1.56-1.58 Ga, suggesting that they were mainly derived from partial melting of Mesoproterozoic crust. In combination with previous studies, this study also shows that plume activity not only gave rise to reworking of ancient crust, but also significant growth of juvenile crust in the center of the ELIP.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study greatly enhanced our knowledge of the potential for geothermal energy development in Queensland as a viable clean energy source in the coming decades. Key outcomes of the project were understanding the first-order controls on the concentration of the heat-producing elements: uranium, thorium and potassium in granitic rocks, and constraining where rocks with the greatest heat-producing potential lie at depth in Queensland. Importantly, new temperature and heat flow maps for southwest Queensland were developed that will greatly assist future exploration efforts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The authors argue that human desire involves conscious cognition that has strong affective connotation and is potentially involved in the determination of appetitive behavior rather than being epiphenomenal to it. Intrusive thoughts about appetitive targets are triggered automatically by external or physiological cues and by cognitive associates. When intrusions elicit significant pleasure or relief, cognitive elaboration usually ensues. Elaboration competes with concurrent cognitive tasks through retrieval of target related information and its retention in working memory. Sensory images are especially important products of intrusion and elaboration because they simulate the sensory and emotional qualities of target acquisition. Desire images are momentarily rewarding but amplify awareness of somatic and emotional deficits. Effects of desires on behavior are moderated by competing incentives, target availability, and skills. The theory provides a coherent account of existing data and suggests new directions for research and treatment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the advent of improved pharmacological treatments to alleviate substance-related desires, psychological approaches will continue to be required. However, the current psychological treatment that most specifically focuses on desires and their management—cue exposure (CE)—has not lived up to its original promise. This paper argues that current psychological approaches to desire do not adequately incorporate our knowledge about the factors that trigger, maintain, and terminate episodes of desire. It asserts that the instigation and maintenance of desires involve both associative and elaborative processes. Understanding the processes triggering the initiation of intrusive thoughts may assist in preventing some episodes, but occasional intrusions will be inevitable. A demonstration of the ineffectiveness of thought suppression may discourage its use as a coping strategy for desire-related intrusions, and mindfulness meditation plus cognitive therapy may help in accepting their occurrence and letting them go. Competing tasks may be used to reduce elaboration of desires, and competing sensory images may have particular utility. The application of these procedures during episodes that are elicited in the clinic may allow the acquisition of more effective strategies to address desires in the natural environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A self-report measure of the emotional and behavioural reactions to intrusive thoughts was developed. The paper presents data that confirm the stability, reliability and validity of the new 7-item measure. Emotional and behavioural reactions to intrusions emerged as separate factors on the Emotional and Behavioural Reactions to Intrusions Questionnaire (EBRIQ), a finding confirmed by an independent stress study. Test retest reliability over 30-70 days was good. Expected relationships with other constructs were significant. Stronger negative responses to intrusions were associated with lower mindfulness scores and higher ratings of experiential avoidance, thought suppression and intensity and frequency of craving. The EBRIQ will help explore differences in reactions to intrusive thoughts in clinical and non clinical populations, and across different emotional and behavioural states. It will also be useful in assessing the effects of therapeutic approaches such as mindfulness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Reporting and Reception of Indigenous Issues in the Australian Media was a three year project financed by the Australian government through its Australian Research Council Large Grants Scheme and run by Professor John Hartley (of Murdoch and then Edith Cowan University, Western Australia). The purpose of the research was to map the ways in which indigeneity was constructed and circulated in Australia's mediasphere. The analysis of the 'reporting' element of the project was almost straightforward: a mixture of content analysis of a large number of items in the media, and detailed textual analysis of a smaller number of key texts. The discoveries were interesting - that when analysis approaches the media as a whole, rather than focussing exclusively on news or serious drama genres, then representation of indigeneity is not nearly as homogenous as has previously been assumed. And if researchers do not explicitly set out to uncover racism in every text, it is by no means guaranteed they will find it1. The question of how to approach the 'reception' of these issues - and particularly reception by indigenous Australians - proved to be a far more challenging one. In attempting to research this area, Hartley and I (working as a research assistant on the project) often found ourselves hampered by the axioms that underlie much media research. Traditionally, the 'reception' of media by indigenous people in Australia has been researched in ethnographic ways. This research repeatedly discovers that indigenous people in Australia are powerless in the face of new forms of media. Indigenous populations are represented as victims of aggressive and powerful intrusions: ‘What happens when a remote community is suddenly inundated by broadcast TV?’; ‘Overnight they will go from having no radio and television to being bombarded by three TV channels’; ‘The influence of film in an isolated, traditionally oriented Aboriginal community’2. This language of ‘influence’, ‘bombarded’, and ‘inundated’, presents metaphors not just of war but of a war being lost. It tells of an unequal struggle, of a more powerful force impinging upon a weaker one. What else could be the relationship of an Aboriginal audience to something which is ‘bombarding’ them? Or by which they are ‘inundated’? This attitude might best be summed up by the title of an article by Elihu Katz: ‘Can authentic cultures survive new media?’3. In such writing, there is little sense that what is being addressed might be seen as a series of discursive encounters, negotiations and acts of meaning-making in which indigenous people — communities and audiences —might be productive. Certainly, the points of concern in this type of writing are important. The question of what happens when a new communication medium is summarily introduced to a culture is certainly an important one. But the language used to describe this interaction is a misleading one. And it is noticeable that such writing is fascinated with the relationship of only traditionally-oriented Aboriginal communities to the media of mass communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two main deformational phases are recognised in the Archaean Boorara Domain of the Kalgoorlie Terrane, Eastern Goldfields Superterrane, Yilgarn Craton, Western Australia, primarily involving southover- north thrust faulting that repeated and thickened the stratigraphy, followed by east northeast – west-southwest shortening that resulted in macroscale folding of the greenstone lithologies. The domain preserves mid-greenschist facies metamorphic grade, with an increase to lower amphibolite metamorphic grade towards the north of the region. As a result of the deformation and metamorphism, individual stratigraphic horizons are difficult to trace continuously throughout the entire domain. Volcanological and sedimentological textures and structures, primary lithological contacts, petrography and geochemistry have been used to correlate lithofacies between faultbounded structural blocks. The correlated stratigraphic sequence for the Boorara Domain comprises quartzo-feldspathic turbidite packages, overlain by high-Mg tholeiitic basalt (lower basalt), coherent and clastic dacite facies, intrusive and extrusive komatiite units, an overlying komatiitic basalt unit (upper basalt), and at the stratigraphic top of the sequence, volcaniclastic quartz-rich turbidites. Reconstruction of the stratigraphy and consideration of emplacement dynamics has allowed reconstruction of the emplacement history and setting of the preserved sequence. This involves a felsic, mafic and ultramafic magmatic system emplaced as high-level intrusions, with localised emergent volcanic centres, into a submarine basin in which active sedimentation was occurring.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

High heat-producing granites (HHPGs) are reservoir rocks for enhanced geothermal systems (EGS), yet the origins of their anomalous chemistry remain poorly understood. To gain a better understanding of the characteristic distribution of elemental depletions and enrichments (focussing on U, Th & K) within granite suites of different heritage and tectonic setting, and the processes that lead to these enrichments, we are undertaking a systematic accessory-mineral chronochemical study of two suites of S- and I-type granites in northern Queensland, as well as two archetypal HHPGs in Cornwall, England (S-type) and Soultz-sous- Forêts, France (I-type). Novel zircon LA-ICP-MS chronochemical methods will later be underpinned by a systematic petrographic, scanning electron microscope (SEM), and electron microprobe (EPMA) study of all the REE-Y-Th-U-rich accessory minerals to fully characterise how the composition, textural distributions and associations change with rock chemistry between and among the suites. Preliminary results indicate that zircons with inherited ages do not have anomalously high U (>1000 ppm) & Th (>400 ppm) values (Ahrens, 1965). Instead, enrichment in these HPE is seen in zircons dated to around the time of magmatic emplacement. These results indicate that enrichment arose primarily through fractional crystallisation of the granitic magmas. Our results support the suggestion that a source pre-enriched in the HPEs does not appear to be fundamental for the formation of all HHPGs. Instead fractional crystallisation processes, and the accessory minerals formed in magmas of differing initial compositions, are the key controls on the levels of enrichment observed (e.g. Champion & Chappell, 1992; Chappell & Hine, 2006). One implication is that the most fractionated granites may not be the most enriched in the HPEs and therefore prospective to future EGS development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bermanite Mn2þMn3þ2 ðPO4Þ2ðOHÞ2 � 4ðH2OÞ is a mixed valent hydrated hydroxy phosphate mineral. The mineral is reddish-brown and occurs in crystal aggregates and as lamellar masses. Bermanite is a common mineral in granitic pegmatites. The chemical composition of bermanite was obtained using EDS techniques. We have studied the molecular structure of bermanite using vibrational spectroscopy. The mineral is characterized by a Raman doublet at 991 and 999 cm-1 attributed to the phosphate stretching mode of two non-equivalent phosphate units. Raman bands at 1071, 1117 and 1142 cm-1 are assigned to the phosphate antisymmetric stretching modes. The hydroxyl stretching spectral region is complex with overlapping bands attributed to water and hydroxyl stretching vibrations. Vibrational spectroscopy proves most useful for the study of the mineral bermanite.