870 resultados para Statherian and Calymmian extension events


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The results of geological mapping, chemical analysis and radiometric dating of metabasic rocks of Betara Formation, and mapping and dating of those present in the Betara basement nucleus together with mylonitic granodiorite and syenogranite are reported here. U-Pb analysis of bulk zircon fractions from the metabasic rocks of the basement nucleus yielded a Statherian age of 1790 +/- 22 Ma, while the metabasic rocks from the upper part of the Betara Formation yielded a Calymmian age between 1500 and 1450 Ma. This age is a minimum for the deposition of the Betara Formation. The older metabasic rocks are associated with post-tectonic, possibly anorogenic syenogranite, while the younger ones are gabbro or very porphyritic ankaramite whose REE patterns are consistent with crystallization from an N-MORB parent magma. The observations and data point to the probable events associated with extensional processes of the end of Paleoproterozoic and early Mesoproterozoic. Similar registers of Statherian (1.80-1.75 Ga) and Calymmian (1.50-1.45 Ga) extensional events are recorded in other parts of the South American and African continents. The Neoproterozoic witnessed the formation and junction of the tectonic slices which formed the Apiai domain during the assemblage of western Gondwana. (C) 2010 International Association for Gondwana Research. Published by Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several studies of the surface effect on bending properties of a nanowire (NW) have been conducted. However, these analyses are mainly based on theoretical predictions, and there is seldom integration study in combination between theoretical predictions and simulation results. Thus, based on the molecular dynamics (MD) simulation and different modified beam theories, a comprehensive theoretical and numerical study for bending properties of nanowires considering surface/intrinsic stress effects and axial extension effect is conducted in this work. The discussion begins from the Euler-Bernoulli beam theory and Timoshenko beam theory augmented with surface effect. It is found that when the NW possesses a relatively small cross-sectional size, these two theories cannot accurately interpret the true surface effect. The incorporation of axial extension effect into Euler-Bernoulli beam theory provides a nonlinear solution that agrees with the nonlinear-elastic experimental and MD results. However, it is still found inaccurate when the NW cross-sectional size is relatively small. Such inaccuracy is also observed for the Euler-Bernoulli beam theory augmented with both contributions from surface effect and axial extension effect. A comprehensive model for completely considering influences from surface stress, intrinsic stress, and axial extension is then proposed, which leads to good agreement with MD simulation results. It is thus concluded that, for NWs with a relatively small cross-sectional size, a simple consideration of surface stress effect is inappropriate, and a comprehensive consideration of the intrinsic stress effect is required.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Evidence from population-based studies of women increasingly points to the inter-related nature of reproductive health, lifestyle, and chronic disease risk. This paper describes the recently established International Collaboration for a Life Course Approach to Reproductive Health and Chronic Disease. InterLACE aims to advance the evidence base for women's health policy beyond associations from disparate studies by means of systematic and culturally sensitive synthesis of longitudinal data. Currently InterLACE draws on individual level data for reproductive health and chronic disease among 200,000 women from over thirteen studies of women's health in seven countries. The rationale for this multi-study research programme is set out in terms of a life course perspective to reproductive health. The research programme will build a comprehensive picture of reproductive health through life in relation to chronic disease risk. Although combining multiple international studies poses methodological challenges, InterLACE represents an invaluable opportunity to strength evidence to guide the development of timely and tailored preventive health strategies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study presents an analysis aimed at choosing between off-grid solar photovoltaic, biomass gasifier based power generation and conventional grid extension for remote village electrification. The model provides a relation between renewable energy systems and the economical distance limit (EDL) from the existing grid point, based on life cycle cost (LCC) analysis, where the LCC of energy for renewable energy systems and grid extension will match. The LCC of energy feed to the village is arrived at by considering grid availability and operating hours of the renewable energy systems. The EDL for the biomass gasifier system of 25 kW capacities is 10.5 km with 6 h of daily operation and grid availability. However, the EDL for a similar 25 kW capacity photovoltaic system is 35 km for the same number of hours of operation and grid availability. The analysis shows that for villages having low load demand situated far away from the existing grid line, biomass gasification based systems are more cost competitive than photovoltaic systems or even compared to grid extension. (C) 2012 Elsevier Inc. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents the advanced analytical methodologies such as Double- G and Double - K models for fracture analysis of concrete specimens made up of high strength concrete (HSC, HSC1) and ultra high strength concrete. Brief details about characterization and experimentation of HSC, HSC1 and UHSC have been provided. Double-G model is based on energy concept and couples the Griffith's brittle fracture theory with the bridging softening property of concrete. The double-K fracture model is based on stress intensity factor approach. Various fracture parameters such as cohesive fracture toughness (4), unstable fracture toughness (K-Ic(c)), unstable fracture toughness (K-Ic(un)) and initiation fracture toughness (K-Ic(ini)) have been evaluated based on linear elastic fracture mechanics and nonlinear fracture mechanics principles. Double-G and double-K method uses the secant compliance at the peak point of measured P-CMOD curves for determining the effective crack length. Bi-linear tension softening model has been employed to account for cohesive stresses ahead of the crack tip. From the studies, it is observed that the fracture parameters obtained by using double - G and double - K models are in good agreement with each other. Crack extension resistance has been estimated by using the fracture parameters obtained through double - K model. It is observed that the values of the crack extension resistance at the critical unstable point are almost equal to the values of the unstable fracture toughness K-Ic(un) of the materials. The computed fracture parameters will be useful for crack growth study, remaining life and residual strength evaluation of concrete structural components.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The behaviors of a crack in body-centered-cubic metal Mo under different loading modes were studied using the molecular dynamics method. Dislocation emission was observed near the crack tip in response to mode II loading with theta = 0 degrees in which theta is the inclination angle of the slip plane with respect to the crack plane, and two full dislocations were observed at the stress level of K-II = 1.17 MPa m(1/2) without any evidence of crack extension. Within the range of 0 degrees less than or equal to theta less than or equal to 45 degrees, crack extension was observed in response to mode I loading, and the effect of crystal orientation on the crack propagation was studied, The crack propagated along the [111] slip direction without any evidence of dislocations emission.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The simple model relating food conversion efficiency (K sub(1)) to body weight derived from the theoretical concepts behind von Bertalanffy's growth model, is extended here in the context of Pauly's generalization of that model. The exponent, which was fixed to 1/3 in the simple model, is in the extended model equivalent to 1-d, with d being the weight exponent of the anabolism term in Pauly's growth model. This makes the model applicable to fish for which the assumptions of the original (special) version of von Bertalanffy's growth model are violated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Generic object-oriented programming languages combine parametric polymorphism and nominal subtype polymorphism, thereby providing better data abstraction, greater code reuse, and fewer run-time errors. However, most generic object-oriented languages provide a straightforward combination of the two kinds of polymorphism, which prevents the expression of advanced type relationships. Furthermore, most generic object-oriented languages have a type-erasure semantics: instantiations of type parameters are not available at run time, and thus may not be used by type-dependent operations. This dissertation shows that two features, which allow the expression of many advanced type relationships, can be added to a generic object-oriented programming language without type erasure: 1. type variables that are not parameters of the class that declares them, and 2. extension that is dependent on the satisfiability of one or more constraints. We refer to the first feature as hidden type variables and the second feature as conditional extension. Hidden type variables allow: covariance and contravariance without variance annotations or special type arguments such as wildcards; a single type to extend, and inherit methods from, infinitely many instantiations of another type; a limited capacity to augment the set of superclasses after that class is defined; and the omission of redundant type arguments. Conditional extension allows the properties of a collection type to be dependent on the properties of its element type. This dissertation describes the semantics and implementation of hidden type variables and conditional extension. A sound type system is presented. In addition, a sound and terminating type checking algorithm is presented. Although designed for the Fortress programming language, hidden type variables and conditional extension can be incorporated into other generic object-oriented languages. Many of the same problems would arise, and solutions analogous to those we present would apply.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over 2,000 adults in their sixties completed the Centrality of Event Scale (CES) for the traumatic or negative event that now troubled them the most and for their most positive life event, as well as measures of current PTSD symptoms, depression, well-being, and personality. Consistent with the notion of a positivity bias in old age, the positive events were judged to be markedly more central to life story and identity than were the negative events. The centrality of positive events was unrelated to measures of PTSD symptoms and emotional distress, whereas the centrality of the negative event showed clear positive correlations with these measures. The centrality of the positive events increased with increasing time since the events, whereas the centrality of the negative events decreased. The life distribution of the positive events showed a marked peak in young adulthood whereas the life distribution for the negative events peaked at the participants' present age. The positive events were mostly events from the cultural life script-that is, culturally shared representations of the timing of major transitional events. Overall, our findings show that positive and negative autobiographical events relate markedly differently to life story and identity. Positive events become central to life story and identity primarily through their correspondence with cultural norms. Negative events become central through mechanisms associated with emotional distress.