924 resultados para Bouguer anomaly


Relevância:

60.00% 60.00%

Publicador:

Resumo:

During the first section of the "Meteor" cruise No. 2 a profile was run from the Azores to the south across the flanks of the Mid-Atlantic Ridge with a chain of seamounts. The profile extended between the Cruiser (living) and the Hyeres seamounts, which, according to our soundings, form a connected massif, and across the centre of the Grosse Meteor Bank (30°N, 28.5 °W). These seamounts rise from a depth of more than 4000 m up till close to the surface of the sea forming there a large almost flat plateau. In the case of the Grosse Meteor Bank, this plateau has a N-S extension of approx. 30 nautical miles and an E-W extension of approx. 20 nautical miles and reaches a height of 275 m in water depth. The gravity measurements yielded a density of the topographic masses of 2.6 g/cm**3 for the Grosse Meteor Bank. Magnitude and shape of the measured free-air anomaly are very well shown in a model computation with this density. The theoretical gravity effects of the seismically detected swell of cristalline rock and of the Moho depression (mountain root) are not indicated by the observational data. It can, therefore, be assumed that the latter two neutralize each other. It seems, accordingly, that there is no local isostatic compensation of the topographic masses. Hence, the density of 2.6 g/cm**3 obtained would be about the true density of rock. In connection with the mean velocity of P waves (Aric et al., 1968) obtained by seismic refraction methods it must be concluded that the material of the 1200-4000 m thick surface layer of the Grosse Meteor Bank consists of consolidated sediments. This finding is supported by the total intensity of the Earth's magnetic field over the Grosse Meteor Bank. On the assumption of a homogeneous magnetization in the direction of the present Earth's field, the computed anomaly of the massif deviates considerably from the measured anomaly while the magnetic field of the seismically detected crystalline body is capable of interpreting the observed data. Deviating from the prevailing interpretation of the seamounts' plateau as a volcanic cone with submarine abrasion, the Grosse Meteor Bank and the seamounts in the vicinity are assumed to be of continental origin. The questions whether these seamounts submerged later on or whether the sealevel has risen subsequently are, therefore, largely nonexistent.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

During GANOVEX VI new gravity data were collected along an east-west profile in North Victoria Land south of the Drygalski Ice Tongue, extending 150 km across the Transantarctic Mountains, and comprising 21 data points. Thirty five additional data points were collected over a small area near Brimstone Peak, near the western end of the regional profile. The survey south of the Drygalski has been connected to northern gravity data (GANOVEX V) by a survey line of 12 points. All data have been terrain corrected, and are further constrained by satellite elevation (GPS) and radar ice-thickness measurements. A pronounced regional Bouguer gravity gradient decreasing to the west by approximately 3 mgal/km is superimposed over a coast-parallel belt of granitoid basement rock. West of this belt the local gravity fields become mote variable. Over Beta Peak (Ferrar dolerite) a 50 mgal spike is obser- ved. Within this area, the Ferrar sills are exposed at the surface. West of Brimstone Peak (Ferrar/Kirk patrick sequences), a smooth regional gradient appears to reassert itself. We interpret the initial gradient east (oceanward) of the break-in-slope to be representative of the crust/mantle boundary within the study area. We interpret the initial break-in-slope and the apparent flattening of the regional gradient to be an effect of the N-S trending zone of dense Ferrar sills and associated deep crusttil fractionate replacing less dense basement. We attribute the variability of the local field to be the product of sub-glacial density contrasts that cannot be removed. The regional gravity gradient of the profile is steeper than that observed to the north (Mt. Melbourne quadrangle) and shallower than that reported to the south (McMurdo Sound). The absolute values of the coastal points of origin south of the Drygalski and within the Mt. Melbourne quadrangle differ by 60 to 100 mgal. In addition, topographic relief within the regional transect area is subdued relative to the Transantarctic Mountains to the north and south. We speculate that the root structure of the Transantarctic Mountains undergoes a change somewhere between the Mt. Melbourne quadrangle and the region south of the Drygalski Ice Tongue.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Although slow spreading ridges characterized by a deep axial valley and fast spreading ridges characterized by an axial bathymetric high have been extensively studied, the transition between these two modes of axial morphology is not well understood. We conducted a geophysical-survey of the intermediate spreading rate Southeast Indian Ridge between 88 degrees E and 118 degrees E, a 2300-km-long section of the ridge located between the Amsterdam hot spot and the Australian-Antarctic Discordance where satellite gravity data suggest that the Southeast Indian Ridge (SEIR) undergoes a change from an axial high in the west to an axial valley in the east. A basic change in axial morphology is found near 103 degrees 30'E in the shipboard data; the axis to the west is marked by an axial high, while a valley is found to the east. Although a well-developed axial high, characteristic of the East Pacific Rise (EPR), is occasionally present, the more common observation is a rifted high that is lower and pervasively faulted, sometimes with significant (> 50 m throw) faults within a kilometer of the axis. A shallow axial valley (< 700 m deep) is observed from 104 degrees E to 114 degrees E with a sudden change to a deep (>1200 m deep) valley across a transform at 114 degrees E. The changes in axial morphology along the SEIR are accompanied by a 500 m increase in near-axis ridge flank depth from 2800 m near 88 degrees E to 3300 m near 114 degrees E and by a 50 mGal increase in the regional level of mantle Bouguer gravity anomalies over the same distance, The regional changes in depth and mantle Bouguer anomaly (MBA) gravity can be both explained by a 1.7-2.4 km change in crustal thickness or by a mantle temperature change of 50 degrees C-90 degrees C. In reality, melt supply (crustal thickness) and mantle temperature are linked, so that changes in both may occur simultaneously and these estimates serve as upper bounds. The along-axis MBA gradient is not uniform. Pronounced steps in the regional level of the MBA gravity occur at 103 degrees 30'E-104 degrees E and at 114 degrees E-116 degrees E and correspond to the changes in the nature of the axial morphology and in the amplitude of abyssal hill morphology suggesting that the different forms of morphology do not grade into each other but rather represent distinctly different forms of axial (s)tructure and tectonics with a sharp transition between them. The change from an axial high to an axial valley requires a threshold effect in which the strength of the lithosphere changes quickly. The presence or absence of a quasi-steady state magma chamber may provide such a mechanism. The different forms of axial morphology are also associated with different intrasegment MBA gravity patterns. Segments with an axial high have an MBA low located at a depth minimum near the center of the segment, At EPR-like segments, the MBA low is about 10 mGal with along-axis gradients of 0.15-0.25 mGal/km, similar to those observed at the EPR, Rifted highs have a shallower low and lower gradients suggesting an attenuated composite magma chamber and a reduced and perhaps episodic melt supply. Segments with a shallow axial valley have very flat along-axis MBA profiles with little correspondence between axial depth and axial MBA gravity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Automated visual surveillance of crowds is a rapidly growing area of research. In this paper we focus on motion representation for the purpose of abnormality detection in crowded scenes. We propose a novel visual representation called textures of optical flow. The proposed representation measures the uniformity of a flow field in order to detect anomalous objects such as bicycles, vehicles and skateboarders; and can be combined with spatial information to detect other forms of abnormality. We demonstrate that the proposed approach outperforms state-of-the-art anomaly detection algorithms on a large, publicly-available dataset.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Pregnant women find themselves subject to comments and questions from people in public areas. Normally, becoming ‘public property’ is considered friendly and is relatively easy for pregnant women to deal with. However, following diagnosis of a fetal anomaly, the experience of being public property can exacerbate the emotional turmoil experienced by couples. Original research question: What is the experience of couples who continue pregnancy following the diagnosis of a fetal anomaly? Method: The study used an interpretive design informed by Merleau-Ponty and this paper reports on a subset of findings. Thirty-one interviews with pregnant women and their partners were undertaken following the diagnosis of a serious or lethal fetal anomaly. Women were between 25 and 38 weeks gestation at the time of their first interview. The non-directive interviews were audiotaped, transcribed verbatim and the transcripts were thematically analysed. Findings: A prominent theme that emerged during data analysis was that pregnancy is embodied therefore physically evident and ‘public’. Women found it difficult to deal with being public property when the fetus had a serious or lethal anomaly. Some women avoided social situations; others did not disclose the fetal condition but gave minimal or avoidant answers to minimise distress to themselves and others. The male participants were not visibly pregnant and they could continue life in public without being subject to the public’s gaze, but they were very aware and concerned about its impact on their partner. Conclusion: The public tend to assume that pregnancy is normal and will produce a healthy baby. This becomes problematic for women who have a fetus with an anomaly. Women use strategies to help them cope with becoming public property during pregnancy. Midwives can play an important role in reducing the negative consequences of a woman becoming public property following the diagnosis of a fetal anomaly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE: To explore the experience of couples who continued pregnancy following a diagnosis of serious or lethal fetal anomaly. STUDY DESIGN: Thirty-one male and female participants were recruited from a high-risk maternal–fetal medicine clinic in Washington State. Data were collected using in-depth interviews during pregnancy and after the birth of their baby. Transcribed interviews were thematically analyzed through the phenomenological lens of Merleau-Ponty. FINDINGS: Participants described how time became reconfigured and reconstituted as they tried to compress a lifetime of love for their future child into a limited period. Participants’ concepts of time became distorted and were related to their perceptual lived experience rather than the schedule-filled,regimented, linear clock time that governed the health professionals. CONCLUSION: Living in distorted time may be a mechanism parents use to cope with overwhelming and disorienting feelings when their unborn baby is diagnosed with a fetal anomaly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.