Monitoring of induced distributed double-couple sources using Marchenko-based virtual receivers

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Source-receiver Marchenko redatuming: Obtaining virtual receivers and virtual sources in the subsurface

By solving the Marchenko equations, one can retrieve the Green’s function (Marchenko Green’s function) between a virtual receiver in the subsurface and points at the surface (no physical receiver is required at the virtual location). We extend the idea behind these equations to retrieve the Green’s function between any two points in the subsurface, i.e., between a virtual source and a virtual r...

متن کامل

Beyond Marchenko – Obtaining virtual receivers and virtual sources in the subsurface

By solving the Marchenko equations, the Green’s function can be retrieved between a virtual receiver in the subsurface to points at the surface (no physical receiver is required at the virtual location). We extend the idea of these equations to retrieve the Green’s function between any two points in the subsurface; i.e, between a virtual source and a virtual receiver (no physical source or phys...

متن کامل

An Introduction to Non-Double-Couple Sources

Robert Anthony Department of Earth and Environmental Science, New Mexico Institute of Mining and Technology Abstract Since the early 1960s when Maruyama and Burridge and Knopoff convincingly demonstrated that the elastodynamic radiation patterns exhibited by shear faulting in an isotropic, elastic medium were consistent with a pair of force couples, it has become standard practice amongst seism...

متن کامل

Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors

In computing environment, failures are not the exception. Computers are subject to operating system bugs, hardware failures or malware attacks. In a clustering or grid environment, management tools are needed to improve the reliability of the system (detecting failures and recovering from them), load-balancing and intrusion detection. The backdoor architecture is a mechanism for external monito...

متن کامل

Virtual Table-Simulator for Monitoring Distributed Objects

There is presented a determination to the concept of "a distributed subobject for monitoring". There are revealed the common features of such objects. There are analyzed the virtual and hardware cloud computing technologies. There is described the technical structure of the "table simulator" based on the "Cloud technology" of the KSTU automation of production processes department. The basic pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Solid Earth

سال: 2019

ISSN: 1869-9529

DOI: 10.5194/se-10-1301-2019