961 resultados para igneous intrusion
Resumo:
A paleomagnetic study was made of 12 samples of trachytic basalt from the base of ODP Hole 698A on the Northeast Georgia Rise (southwest Atlantic) and four samples of andesitic basalt and nine samples of volcanic breccia from the base of ODP Hole 703A on the Meteor Rise (southeast Atlantic). The magnetic intensities of the Hole 703A samples are anomalously low, possibly reflecting alteration effects. The mean magnetic intensity of the Hole 698A samples is high, and compatible with the model of Bleil and Petersen (1983) for the variation of magnetic intensity with age in oceanic basalts, involving progressive low-temperature oxidation of titanomagnetite to titanomaghemite for some 20 m.y. followed by inversion to intergrowths of magnetite and other Fe-Ti oxides during the subsequent 100 m.y. These results support the interpretation of the Hole 698A basalts as true oceanic basement of Late Cretaceous age rather than a younger intrusion. Well-defined stable components of magnetization were identified from AF and thermal demagnetization of the Hole 698A basalts, and less well-defined components were identified for the Hole 703A samples. Studies of the magnetic homogeneity of the Hole 698A basalts, involving harmonic analysis of the spinner magnetometer output, indicate the presence of an unevenly distributed low-coercivity component superimposed on the more homogeneous high-coercivity characteristic magnetization. The former component is believed to reside in irregularly distributed multidomain magnetite grains formed along cracks within the basalt, whilst the latter resides in more uniformly distributed finer magnetic grains. The inclination values for the high-coercivity magnetization of five Hole 698A basalt samples form an internally consistent set with a mean value of 59° ± 5°. The corresponding Late Cretaceous paleolatitude of 40° ± 5° is shallower than expected for this site but is broadly compatible with models for the opening of the South Atlantic involving pivoting of South America away from Africa since the Early Cretaceous. The polarity of the stable characteristic magnetization of the Site 698 basalts is normal. This is consistent with their emplacement during the long Campanian to Maestrichtian normal polarity Chron C33N.
Resumo:
Major and trace element analyses are presented for 110 samples from the DSDP Leg 60 basement cores drilled along a transect across the Mariana Trough, arc, fore-arc, and Trench at about 18°N. The igneous rocks forming breccias at Site 453 in the west Mariana Trough include plutonic cumulates and basalts with calc-alkaline affinities. Basalts recovered from Sites 454 and 456 in the Mariana Trough include types with compositions similar to normal MORB and types with calc-alkaline affinities within a single hole. At Site 454 the basalts show a complete compositional transition between normal MORB and calc-alkaline basalts. These basalts may be the result of mixing of the two magma types in small sub-crustal magma reservoirs or assimilation of calc-alkaline, arc-derived vitric tuffs by normal MORB magmas during eruption or intrusion. A basaltic andesite clast in the breccia recovered from Site 457 on the active Mariana arc and samples dredged from a seamount in the Mariana arc are calc-alkaline and similar in composition to the basalts recovered from the Mariana Trough and West Mariana Ridge. Primitive island arc tholeiites were recovered from all four sites (Sites 458-461) drilled on the fore-arc and arc-side wall of the trench. These basalts form a coherent compositional group distinct from the Mariana arc, West Mariana arc, and Mariana Trough calc-alkaline lavas, indicating temporal (and perhaps spatial?) chemical variations in the arc magmas erupted along the transect. Much of the 209 meters of basement cored at Site 458 consists of endiopside- and bronzite-bearing, Mg-rich andesites with compositions related to boninites. These andesites have the very low Ti, Zr, Ti/Zr, P, and rare-earthelement contents characteristic of boninites, although they are slightly light-rare-earth-depleted and have lower MgO, Cr, Ni, and higher CaO and Al2O3 contents than those reported for typical boninites. The large variations in chemistry observed in the lavas recovered from this transect suggest that diverse mantle source compositions and complex petrogenetic process are involved in forming crustal rocks at this intra-oceanic active plate margin.
Resumo:
Objectives. We tested predictions from the elaborated intrusion (EI) theory of desire, which distinguishes intrusive thoughts and elaborations, and emphasizes the importance of imagery. Secondarily, we undertook preliminary evaluations of the Alcohol Craving Experience (ACE) questionnaire, a new measure based on EI Theory. Methods. Participants (N ¼ 232) were in correspondence-based treatment trials for alcohol abuse or dependence. The study used retrospective reports obtained early in treatment using the ACE, and daily self-monitoring of urges, craving, mood and alcohol consumption. Results. The ACE displayed high internal consistency and test – retest reliability and sound relationships with self-monitored craving, and was related to Baseline alcohol dependence, but not to consumption. Imagery during craving was experienced by 81%,with 2.3 senses involved on average. More frequent imagery was associated with longer episode durations and stronger craving. Transient intrusive thoughts were reported by 87% of respondents, and were more common if they frequently attempted to stop alcohol cognitions. Associations between average daily craving and weekly consumption were seen. Depression and negative mood were associated with more frequent, stronger and longer lasting desires for alcohol. Conclusions. Results supported the distinction of automatic and controlled processes in craving, together with the importance of craving imagery. They were also consistent with prediction of consumption from cross-situational averages of craving, and with positive associations between craving and negative mood. However, this study’s retrospective reporting and correlational design require that its results be interpreted cautiously. Research using ecological momentary measures and laboratory manipulations is needed before confident inferences about causality can be made.
Resumo:
The authors argue that human desire involves conscious cognition that has strong affective connotation and is potentially involved in the determination of appetitive behavior rather than being epiphenomenal to it. Intrusive thoughts about appetitive targets are triggered automatically by external or physiological cues and by cognitive associates. When intrusions elicit significant pleasure or relief, cognitive elaboration usually ensues. Elaboration competes with concurrent cognitive tasks through retrieval of target related information and its retention in working memory. Sensory images are especially important products of intrusion and elaboration because they simulate the sensory and emotional qualities of target acquisition. Desire images are momentarily rewarding but amplify awareness of somatic and emotional deficits. Effects of desires on behavior are moderated by competing incentives, target availability, and skills. The theory provides a coherent account of existing data and suggests new directions for research and treatment.
Resumo:
The equations governing saltwater intrusion in coastal aquifers are complex. Backward Euler time stepping approaches are often used to advance the solution to these equations in time, which typically requires that small time steps be taken in order to ensure that an accurate solution is obtained. We show that a method of lines approach incorporating variable order backward differentiation formulas can greatly improve the efficiency of the time stepping process.
Resumo:
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.