منابع مشابه
Emplacement and Assembly of Shallow Intrusions, Henry Mountains, Southern Utah
Exceptional exposures of igneous intrusions of the Henry Mountains of southern Utah allow for the detailed study of three-dimensional pluton geometries as well as igneous emplacement and assembly processes. Examination of the geometry, fabric, and wallrock structures of relatively small intrusions (<3 km map-view diameter) suggests that several plutons in the region (Maiden Creek sill, Trachyte...
متن کاملAnalytical model of surface uplift above axisymmetric flat-lying magma intrusions: Implications for sill emplacement and geodesy
In this paper, we develop a new axisymmetric analytic model of surface uplift upon sills and laccoliths, based on the formulation of a thin bending plate lying on an elastic foundation. In contrast to most former models also based on thin bending plate formulation, our model accounts for (i) axi-symmetrical uplift, (ii) both upon and outside the intrusion. The model accounts for shallow intrusi...
متن کاملStratospheric intrusions
Stratospheric intrusions induced by a Rossby Wave breaking and its interaction with the subtropical jet during PICO3 campaign A. Carré, F. Ravetta, J.-P. Cammas, P. Mascart, J. Duron, G. Ancellet, and D. Lambert Laboratoire d’Aérologie, Observatoire Midi-Pyrénées, Toulouse, France Service d’Aéronomie, Institut Pierre Simon Laplace, Paris, France Received: 23 June 2005 – Accepted: 25 July 2005 –...
متن کاملCharacteristics of saccadic intrusions
Primary fixation is never perfectly stable, but is frequently interrupted by slow drifts, microsaccades and saccadic intrusions (SI). SI are involuntary, conjugate movements which take the form of an initial fast movement away from the desired eye position and followed after a short duration, by either a return secondary saccade or a drift. The purpose of this study was to examine the prevalenc...
متن کاملSimulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions
For testing Intrusion Detection Systems (IDS), it is essential that we be able to simulate intrusions in diierent forms (both sequential and parallelized) in order to comprehensively test and evaluate the detection capability of an IDS. This paper presents an algorithm for automatically transforming a sequential intrusive script into a set of parallel intrusive scripts (formed by a group of par...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1975
ISSN: 0028-0836,1476-4687
DOI: 10.1038/254485b0