Experiments on vertical basement fault reactivation below volcanoes

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Global observation of vertical-CLVD earthquakes at active volcanoes

[1] Some of the largest and most anomalous volcanic earthquakes have non-double-couple focal mechanisms. Here, we investigate the link between volcanic unrest and the occurrence of non-double-couple earthquakes with dominant vertical tension or pressure axes, known as vertical compensated-linear-vector-dipole (vertical-CLVD) earthquakes. We determine focal mechanisms for 313 target earthquakes ...

متن کامل

Physical mechanisms for vertical-CLVD earthquakes at active volcanoes

[1] Many volcanic earthquakes large enough to be detected globally have anomalous focal mechanisms and frequency content. In a previous study, we examined the relationship between active volcanism and the occurrence of a specific type of shallow, non-double-couple earthquake. We identified 101 earthquakes with vertical compensated-linear-vector-dipole (vertical-CLVD) focal mechanisms that took ...

متن کامل

Learning to Recognize Volcanoes on

Dramatic improvements in sensor and image acquisition technology have created a demand for automated tools that can aid in the analysis of large image databases. We describe the development of JARtool, a trainable software system that learns to recognize volcanoes in a large data set of Venusian imagery. A machine learning approach is used because it is much easier for geologists to identify ex...

متن کامل

Experiments on Six Commercial TCP Implementations Using aSoftware Fault Injection

TCP has become the de facto standard transport protocol in today's operating systems. It is a very robust protocol which can adapt to various network characteristics, packet loss, link congestion, and even signiicant diierences in vendor implementations. This paper, presents an implementation of a tool, called orchestra, that can be used for testing distributed protocols such as TCP, and a set ...

متن کامل

On Avoiding ZVP-Attacks Using Isogeny Volcanoes

The usage of elliptic curve cryptography in smart cards has been shown to be efficient although, when considering curves, one should take care about their vulnerability against the Zero-Value Point Attacks (ZVP). In this paper, we present a new procedure to find elliptic curves which are resistant against these attacks. This algorithm finds, in an efficient way, a secure curve by means of volca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Geophysical Research: Solid Earth

سال: 2001

ISSN: 0148-0227

DOI: 10.1029/2000jb900352