Experiments on vertical basement fault reactivation below volcanoes
نویسندگان
چکیده
منابع مشابه
Global observation of vertical-CLVD earthquakes at active volcanoes
[1] Some of the largest and most anomalous volcanic earthquakes have non-double-couple focal mechanisms. Here, we investigate the link between volcanic unrest and the occurrence of non-double-couple earthquakes with dominant vertical tension or pressure axes, known as vertical compensated-linear-vector-dipole (vertical-CLVD) earthquakes. We determine focal mechanisms for 313 target earthquakes ...
متن کاملPhysical mechanisms for vertical-CLVD earthquakes at active volcanoes
[1] Many volcanic earthquakes large enough to be detected globally have anomalous focal mechanisms and frequency content. In a previous study, we examined the relationship between active volcanism and the occurrence of a specific type of shallow, non-double-couple earthquake. We identified 101 earthquakes with vertical compensated-linear-vector-dipole (vertical-CLVD) focal mechanisms that took ...
متن کاملLearning to Recognize Volcanoes on
Dramatic improvements in sensor and image acquisition technology have created a demand for automated tools that can aid in the analysis of large image databases. We describe the development of JARtool, a trainable software system that learns to recognize volcanoes in a large data set of Venusian imagery. A machine learning approach is used because it is much easier for geologists to identify ex...
متن کاملExperiments on Six Commercial TCP Implementations Using aSoftware Fault Injection
TCP has become the de facto standard transport protocol in today's operating systems. It is a very robust protocol which can adapt to various network characteristics, packet loss, link congestion, and even signiicant diierences in vendor implementations. This paper, presents an implementation of a tool, called orchestra, that can be used for testing distributed protocols such as TCP, and a set ...
متن کاملOn Avoiding ZVP-Attacks Using Isogeny Volcanoes
The usage of elliptic curve cryptography in smart cards has been shown to be efficient although, when considering curves, one should take care about their vulnerability against the Zero-Value Point Attacks (ZVP). In this paper, we present a new procedure to find elliptic curves which are resistant against these attacks. This algorithm finds, in an efficient way, a secure curve by means of volca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Geophysical Research: Solid Earth
سال: 2001
ISSN: 0148-0227
DOI: 10.1029/2000jb900352