temporary network
Recently Published Documents


TOTAL DOCUMENTS

32
(FIVE YEARS 0)

H-INDEX

9
(FIVE YEARS 0)

Author(s):  
Andrey Goev ◽  
Sergey Volosov ◽  
Irina Sanina ◽  
Nataliya Konstantinovskaya ◽  
Margarita Nesterkina

In 2017, as a part of the study of the deep structure of the central part of the East European craton (EEC), three temporary seismic observation points were installed. They were equipped with broadband three-component sensors. The position of the stations is due to the need to build a seismic section in the sub-latitudinal direction in order to study the collision zone of the triple junction of mega blocks in the central part of the EEC. Together with the small-aperture seismic array "Mikhnevo" (MHVAR), temporary seismic stations form an area observation system with distances between stations of the order of 100 km. In 2018, the stations of the temporary network of the IDG RAS had registered 765 events of various nature: 222 industrial explosions and 543 earthquakes. During the year, the "Mikhnevo" array records about 5000 events, of which about 1000 are earthquakes at teleseismic and regional distances, and about 900 are identified as industrial explosions. Mutual processing of observed data on the temporary network and on the "Mikhnevo" in some cases (17%) made it possible to specify the results of the location of industrial explosions obtained previously at the "Mikhnevo" over 10 km.


Geosciences ◽  
2020 ◽  
Vol 10 (6) ◽  
pp. 230 ◽  
Author(s):  
Sergei Abramenkov ◽  
Nikolaï M. Shapiro ◽  
Ivan Koulakov ◽  
Ilyas Abkadyrov

Gorely is one of the most active volcanoes in Kamchatka with a rich magmatic and eruptive history reflected in its composite structure. In 2013–2014, a temporary network of 20 seismic stations was installed on Gorely for one year. During the four months of its high degassing rate, seismic activity was mostly expressed in the form of a long-period (LP) seismic tremor. In this study, we have developed a workflow based on the combination of back-projection (BP), cluster analysis, and matched-filter (MF) methods. By applying it to continuous seismic records for the study period, we were able to identify discrete LP events within the tremor sequence automatically and individually investigate their properties. A catalog obtained using the BP detection algorithm consist of 1741 high-energy events. Cluster analysis revealed that the entire variety of LP earthquakes in this catalog could be grouped into five families, which are sequentially organized in time. Utilizing templates of these families in the MF search resulted in the complementary catalog of 80,615 low-energy events. The long-term occurrence of highly repetitive LP events in the same location may correspond to resonating conduits behaving in response to the high-pressure gases flowing from the decompressed magma chamber up to the volcano’s crater.


The improved edition of conventional wireless networks provides a mobile temporary network (MANET), which is extremely appropriate for urgent situations. However, in a similar instance, its infra-low and resource limit creates many challenges in its performance. The growing security risks are probable to take place due to dynamic behavior and the absolute communication cycle which are based on unnoticed nodes, which dropped packets as they desire. Reliable and trusted nodes can reduce communications overhead and many past security schemes have suggested that high turnover can be achieved. Several security studies are expected to be trustworthy and less expensive. This paper aims to propose a self-assured approach (SAA) based on trust assessment for secure routing to secure high-security constancy and security for reliable database delivery based probability assessment. The assessment will be evaluated and the node maintains and identifies among random momentary errors and deliberate malicious actions and asses a node total trustworthiness to have secure and safe communication.


2020 ◽  
Author(s):  
Marco Brönner ◽  
Claudia Pavez

<p>A receiver function analysis was carried out along two profiles located in north- and southwestern Norway. We selected and processed 801 teleseismic events registered by twelve seismic stations belonging to the 2002-2005 Geofon/Aarhus temporary network. The HK (depth vs Vp/Vs) stacking procedure and a Reversible jump Markov chain Monte Carlo (Rj-McMC) inversion were applied independently with the objective to reveal new crustal and crust-mantle transitional contrasts gaining a better understanding of the geology. In the southern profile, the most noticeable feature corresponds to a Moho offset of about ~5 km ca. 85 km to the east of the Norwegian coast: That feature was previously observed in several occasions and is also well-supported from this research. Furthermore, a very deep Moho discontinuity – at between 45 – 50 km depth - was found beneath the northern profile, approximately 70 km inland from the coast, and dipping about 30° to the northwest. Even when this deep structure was previously inferred through other methods, its presence was not certainly confirmed and so far, the origin of this feature is still disputed. We discuss two hypotheses, which are valid to explain the occurrence of the noticeable anomaly. First, a gradual and wide crust-mantle transition zone, which is also reflected in the velocity model or second, the presence of a paleo-slab of Fennoscandian basement subducted and deformed during the Caledonian Orogen (490-390 Ma).</p>


Mobile Ad hoc network is a temporary network. It helps to communicate two or more devices for short range. Routing Protocols are use to establish a communication in MANET. As it is a open network , it has many vulnerabilities from security point. Black hole Attack is one of the major concern in MANET. In this paper, we have implemented Black hole Attack in random mobility environment and analyse its impact on MANET using various parameters for single and multiple connection in MANET. Black hole attack disturbs one of the connection in the network while remaining connection are unaffected. During our analysis, we found that performance result of black hole attack in multiple connection network give a similar kind of output mentioned in various research paper related to gray hole attack, which will make difficult to analysis the type of attack in the network.


2019 ◽  
Vol 6 (1) ◽  
Author(s):  
Fabrizio Cara ◽  
Giovanna Cultrera ◽  
Gaetano Riccio ◽  
Sara Amoroso ◽  
Paola Bordoni ◽  
...  

Abstract In August 2016, a magnitude 6.0 earthquake struck Central Italy, starting a devastating seismic sequence, aggravated by other two events of magnitude 5.9 and 6.5, respectively. After the first mainshock, four Italian institutions installed a dense temporary network of 50 seismic stations in an area of 260 km2. The network was registered in the International Federation of Digital Seismograph Networks with the code 3A and quoted with a Digital Object Identifier (10.13127/SD/ku7Xm12Yy9). Raw data were converted into the standard binary miniSEED format, and organized in a structured archive. Then, data quality and completeness were checked, and all the relevant information was used for creating the metadata volumes. Finally, the 99 Gb of continuous seismic data and metadata were uploaded into the INGV node of the European Integrated Data Archive repository. Their use was regulated by a Memorandum of Understanding between the institutions. After an embargo period, the data are now available for many different seismological studies.


2019 ◽  
Vol 2 (2) ◽  
pp. 27-35
Author(s):  
Aleksey Emanov ◽  
Alexander Emanov ◽  
Alexander Fateev

According to the results of monitoring with a temporary network of seismological stations in the south of Kuzbass in the area of seismic activation of technogenic nature, formed under the simultaneous influence of open and underground coal mining, the spatial structure of activation, its development in time and connection with tectonic disturbances are studied in detail. Seismic activation near underground workings is distinguished by locality in area, a large number of earthquakes with magnitudes Ml ≤ 2. For three closely spaced coal mines, there is a general seismic activation, inside of which, as a local zone, there is the activation of underground workings, characterized by the strongest earthquakes with Ml in the range of 3 ÷ 4. Depths of foci have a two-modal distribution with maxima in the range of 1 ÷ 1,5 km and in the range of 2 ÷ 3 km. Both in the area of mines and in the area of open mine workings, the subsoil is significantly deeper than the mine workings seismically activated. The seismic process in time is not stationary and pulsating.


2018 ◽  
Vol 7 (2.26) ◽  
pp. 35
Author(s):  
Miss Divya ◽  
Dr R. Gobinath

This paper describes the characteristics and techniques of Ad Hoc network. Ad Hoc networks are temporary network, set anywhere with-out any need of external infrastructure like wires. The essential premise of this paper is to exchange confidential message over wireless medium without route break and unauthorized eavesdroppers. In recent years, the research of routing protocol for AdHoc network has caused public concern widely. The multi hopping routing protocol has failed to meet the needs of network topology and route restructure. It must also consider the bandwidth and high error rate. The new routing protocol suitable for solving these problems in Ad Hoc network is AODV. 


2017 ◽  
Vol 47 (2) ◽  
pp. 563 ◽  
Author(s):  
Ch. Kkallas ◽  
C.B. Papazachos ◽  
E.M. Scordilis ◽  
B.N. Margaris

We have employed the data of EGELADOS temporary network (October 2005-April 2007) to determine 88 focal mechanism solutions from Southern Aegean Sea using the RAPIDINV algorithm (Cesca et al., 2010). The new focal mechanism solutions determined, complemented with the previously available ones for Southern Aegean Seα provide the basis for a detailed examination of the stress field, using the distribution of P and T axes. To obtain the stress field we applied the method of Gephart and Forsyth (1984), namely the grid search inversion approach of Gephart (1990a,b), which incorporates the P and T axes of selected focal mechanisms. For the inversion, the initial stress solutions were computed by the “average” kinematic P and T-axis approach of Papazachos and Kiratzi (1992). The stress-inversion allows choosing the "ideal" fault plane corresponding to the minimum misfit rotation about an axis of general orientation which is needed to match an observed fault plane/slip direction with one consistent with the final stress model.


Sign in / Sign up

Export Citation Format

Share Document