850 resultados para Explosive events
Resumo:
A much-revised Quaternary stratigraphy is presented for ignimbrites and pumice fall deposits of the Bandas del Sur, in southern Tenerife. New Ar-41/Ar-39 data obtained for the Arico, Granadilla, Fasnia, Poris, La Caleta and Abrigo formations are presented, allowing correlation with previously dated offshore marine ashfall layers and volcaniclastic sediments. We also provide a minimum age of 287 +/- 7 ka for a major sector collapse event at the Gaimar valley. The Bandas del Sur succession includes more than seven widespread ignimbrite sheets that have similar characteristics, including widespread basal Plinian layers, predominantly phonolite composition, ignimbrites with similar extensive geographic distributions, thin condensed veneers with abundant diffuse bedding and complex lateral and vertical grading patterns, lateral gradations into localized massive facies within palaeo-wadis, and widespread lithic breccia layers that probably record caldera-forming eruptions. Each ignimbrite sheet records substantial bypassing of pyroclastic material into the ocean. The succession indicates that Las Canadas volcano underwent a series of major explosive eruptions, each starting with a Plinian phase followed by emplacement of ignimbrites and thin ash layers, some of coignimbrite origin. Several of the ignimbrite sheets are compositionally zoned and contain subordinate mafic pumices and banded pumices indicative of magma mingling immediately prior to eruption. Because passage of each pyroclastic density current was characterized by phases of non-deposition and erosion, the entire course of each eruption is incompletely recorded at any one location, accounting for some previously perceived differences between the units. Because each current passed into the ocean, estimating eruption volumes is virtually impossible. Nevertheless, the consistent widespread distributions and the presence of lithic breccias within most of the ignimbrite sheets suggest that at least seven caldera collapse eruptions are recorded in the Bandas del Sur succession and probably formed a complex, nested collapse structure. Detailed field relationships show that extensive ignimbrite sheets (e.g. the Arico, Poris and La Caleta formations) relate to previously unrecognized caldera collapse events. We envisage that the evolution of the nested Las Cahadas caldera is more complex than previously thought and involved a protracted history of successive ignimbrite-related caldera collapse events, and large sector collapse events, interspersed with edifice-building phases.
Resumo:
A new influx of sea-rafted pumice reached the eastern coast of Australia in October 2002, approximately 1 year after a felsic, shallow-marine explosive eruption at a previously unknown volcano (0403-091) along the Tofua volcanic arc (Tonga). The eruption produced floating pumice rafts that first became stranded in Fiji in November 2001, approximately I month after the eruption. Strandings of sea-rafted pumice along shorelines have been the only record of products from this submarine explosive eruption at the remote, submerged volcano. Computed drift trajectories of the sea-rafted pumice using numerical models of southwest Pacific surface wind fields and ocean currents indicate two cyclonic systems disturbed the drift of pumice to eastern Australia, as well as the importance of the combined wave and direct wind effect on pumice trajectory. Pumice became stranded along at least two-thirds (>2000 km) of the coastline of eastern Australia, being deposited on beaches during a sustained period of fresh onshore winds. Typical amounts of pumice initially stranded on beaches were 500-4000 individual clasts per in, and a minimum volume estimate of pumice that arrived to eastern Australia is 1.25 x 10(5) m(3). Pumice was beached below maximum tidal/storm surge levels and was quickly reworked back into the ocean, such that the concentration of beached pumice rapidly dissipated within weeks of the initial stranding, and little record of this stranding event now exists. Most stranded pumice clasts ranged in size from 2 to 5 cm in diameter; the largest measured clasts were 10 cm in Australia and 20 cm in Fiji. The pumice has a low phenocryst content (3500 km) and period of pumice floatation (greater than or equal to1 year), confirm the importance of sea-rafted pumice as a long-distance dispersal mechanism for marine organisms including marine pests and harmful invasive species. Billions of individual rafting pumice clasts can be generated in a single small-volume eruption, such as observed here, and the geological implications for the transport of sessile taxa over large distances are significant. An avenue for future research is to examine whether speciation events and volcanicity are linked; the periodic development of globalism for some taxa (e.g., corals, gastropods, bryozoa) may correlate in time and/or space with voluminous silicic igneous events capable of producing >10(6) km(3) of silicic pumice-rich pyroclastic material and emplaced into ocean basins. (C) 2004 Elsevier B.V. All rights reserved.
Resumo:
The occurrence of and conditions favourable to nucleation were investigated at an industrial and commercial coastal location in Brisbane, Australia during five different campaigns covering a total period of 13 months. To identify potential nucleation events, the difference in number concentration in the size range 14-30 nm (N14-30) between consecutive observations was calculated using first-order differencing. The data showed that nucleation events were a rare occurrence, and that in the absence of nucleation the particle number was dominated by particles in the range 30-300 nm. In many instances, total particle concentration declined during nucleation. There was no clear pattern in change in NO and NO2 concentrations during the events. SO2 concentration, in the majority of cases, declined during nucleation but there were exceptions. Most events took place in summer, followed by winter and then spring, and no events were observed for the autumn campaigns. The events were associated with sea breeze and long-range transport. Roadside emissions, in contrast, did not contribute to nucleation, probably due to the predominance of particles in the range 50-100 nm associated with these emissions.
Resumo:
This research project set out to explore Unitary Authority (UA) involvement in festivals and special events across Wales. It considers the level and nature of UA involvement and investigates activity by event purpose; reasons for, and characteristics of, UA engagement; and, crucially, the extent and nature of event evaluation. The study’s aim was to begin the development of a baseline of information for further research into the growing use of festivals and special events as a strategy for local economic development in Wales. A quantitative survey approach facilitated a comprehensive snapshot of UA responses whilst also incorporating discursive elements. A telephone survey was designed and undertaken with representatives of all 22 UA departments responsible for festivals and events in Wales. The research reveals a significant level of festival and special event activity across Wales, supported primarily for its perceived socio-cultural value. However, evaluation would appear to be focused on improving processes and measuring economic outputs rather than assessing whether socio-cultural objectives are being achieved. Whilst overwhelmingly positive about efforts to improve approaches to evaluation, respondents held clear views about the complications most likely to hamper any such efforts. These responses focused upon the need for flexibility, cost effectiveness and comparability across festival and special event typologies.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.
Resumo:
Multi-purpose Community Entertainment and Recreation Venue, catering for the Mount Isa Rodeo; including campdraft, equine sports, shows, exhibition, trade events, concerts and other community activities. The design involved redevelopment of a portion of the Buchanan Park Race Course located in Mount Isa. The project included community infrastructure planning, major landscaping and the construction of built facilities.