Emplacement of intrusions

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Emplacement and Assembly of Shallow Intrusions, Henry Mountains, Southern Utah

Exceptional exposures of igneous intrusions of the Henry Mountains of southern Utah allow for the detailed study of three-dimensional pluton geometries as well as igneous emplacement and assembly processes. Examination of the geometry, fabric, and wallrock structures of relatively small intrusions (<3 km map-view diameter) suggests that several plutons in the region (Maiden Creek sill, Trachyte...

متن کامل

Analytical model of surface uplift above axisymmetric flat-lying magma intrusions: Implications for sill emplacement and geodesy

In this paper, we develop a new axisymmetric analytic model of surface uplift upon sills and laccoliths, based on the formulation of a thin bending plate lying on an elastic foundation. In contrast to most former models also based on thin bending plate formulation, our model accounts for (i) axi-symmetrical uplift, (ii) both upon and outside the intrusion. The model accounts for shallow intrusi...

متن کامل

Stratospheric intrusions

Stratospheric intrusions induced by a Rossby Wave breaking and its interaction with the subtropical jet during PICO3 campaign A. Carré, F. Ravetta, J.-P. Cammas, P. Mascart, J. Duron, G. Ancellet, and D. Lambert Laboratoire d’Aérologie, Observatoire Midi-Pyrénées, Toulouse, France Service d’Aéronomie, Institut Pierre Simon Laplace, Paris, France Received: 23 June 2005 – Accepted: 25 July 2005 –...

متن کامل

Characteristics of saccadic intrusions

Primary fixation is never perfectly stable, but is frequently interrupted by slow drifts, microsaccades and saccadic intrusions (SI). SI are involuntary, conjugate movements which take the form of an initial fast movement away from the desired eye position and followed after a short duration, by either a return secondary saccade or a drift. The purpose of this study was to examine the prevalenc...

متن کامل

Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions

For testing Intrusion Detection Systems (IDS), it is essential that we be able to simulate intrusions in diierent forms (both sequential and parallelized) in order to comprehensively test and evaluate the detection capability of an IDS. This paper presents an algorithm for automatically transforming a sequential intrusive script into a set of parallel intrusive scripts (formed by a group of par...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1975

ISSN: 0028-0836,1476-4687

DOI: 10.1038/254485b0