Academic literature on the topic 'Basic intrusions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Basic intrusions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Basic intrusions"

1

Simavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.

Full text
Abstract:
The subject of the research is the problem of identifying and countering intrusions (attacks) in information security systems (ISS) based on the system-conceptual approach, developed within the framework of the RFBR funded project No. 19-01-00383. The object of the research is neural networks and information security systems (ISS) of automated data processing systems (ADPS). The authors proceed from the basic conceptual requirements for intrusion detection systems - adaptability, learnability and manageability. The developed intrusion detection procedure considers both internal and external th
APA, Harvard, Vancouver, ISO, and other styles
2

Boyd, R., and W. A. Ashcroft. "Significance of the cumulate mineralogy of the Belhelvie mafic-ultramafic intrusion—comments on: Silicate mineralogy of the Belhelvie cumulates, NE Scotland, by W. J. Wadsworth." Mineralogical Magazine 56, no. 384 (1992): 329–33. http://dx.doi.org/10.1180/minmag.1992.056.384.04.

Full text
Abstract:
AbstractNew data on the composition of cumulus phases in the Belhelvie intrusion presented by Wadsworth (1991) are discussed in the light of existing data and of knowledge on the form and internal structure of the intrusion. The relevance of the Rustenburg Layered suite of the Bushveld Complex as a model for the 'single intrusion' hypothesis for the layered basic intrusions in NE Scotland is examined: current knowledge of the Rustenburg Layered Suite and related intrusions suggests that similar crystallisation sequences of cumulus phases and ranges of cryptic variation do not give any case for
APA, Harvard, Vancouver, ISO, and other styles
3

Kanaris-Sotiriou, R., and F. G. F. Gibb. "Hybridization and the petrogenesis of composite intrusions: the dyke at An Cumhann, Isle of Arran, Scotland." Geological Magazine 122, no. 4 (1985): 361–72. http://dx.doi.org/10.1017/s0016756800031800.

Full text
Abstract:
AbstractThe composite dyke at An Cumhann, Arran consists of a central unit of quartz-feldspar porphyry flanked by narrow marginal dolerites containing xenocrysts of quartz, plagioclase and alkali feldspar identical to the phenocrysts in the porphyry. The chemistry of the marginal dolerites indicates that they formed by the crystallization of a hybrid magma produced at depth by the incorporation of the porphyritic acid magma in a basic liquid. During the intrusion of the hybrid magma, flow caused a differential distribution of the xenocrysts across the initial basic dyke. Subsequent intrusion o
APA, Harvard, Vancouver, ISO, and other styles
4

Devi, V. Brindha, and K. L. Shunmuganathan. "Neural KDE Based Behaviour Model for Detecting Intrusions in Network Environment." IAES International Journal of Artificial Intelligence (IJ-AI) 6, no. 4 (2017): 166. http://dx.doi.org/10.11591/ijai.v6.i4.pp166-173.

Full text
Abstract:
Network intrusion is one of the growing concern throughout the globe about the information stealing and data exfiltration. In recent years this was coupled with the data exfiltration and infiltration through the internal threats. Various security encounters have been taken in order to reduce the intrusion and to prevent intrusion, since the stats reveals that every 4 seconds, at least one intrusion is detected in the detection engines. An external software mechanism is required in order to detect the network intrusions. Based on the above stated problem, here we proposed a new hybrid behaviour
APA, Harvard, Vancouver, ISO, and other styles
5

Veselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.

Full text
Abstract:
Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purpose, Intrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to the known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching for an abnormal system activity. Most IDS commercial
APA, Harvard, Vancouver, ISO, and other styles
6

NICOLL, GRAEME R., MARIAN B. HOLNESS, VALENTIN R. TROLL, et al. "Early mafic magmatism and crustal anatexis on the Isle of Rum: evidence from the Am Màm intrusion breccia." Geological Magazine 146, no. 3 (2009): 368–81. http://dx.doi.org/10.1017/s0016756808005864.

Full text
Abstract:
AbstractThe Rum Igneous Centre comprises two early marginal felsic complexes (the Northern Marginal Zone and the Southern Mountains Zone), along with the later central ultrabasic–basic layered intrusions. These marginal complexes represent the remnants of near-surface to eruptive felsic magmatism associated with caldera collapse, examples of which are rare in the North Atlantic Igneous Province. Rock units include intra-caldera collapse breccias, rhyolitic ignimbrite deposits and shallow-level felsic intrusions, as well the enigmatic ‘Am Màm intrusion breccia’. The latter comprises a dacitic m
APA, Harvard, Vancouver, ISO, and other styles
7

Birkenmajer, Krzysztof, Krzysztof P. Krajewski, Zoltán Pécskay, and Marek W. Lorenc. "K-Ar dating of basic intrusions at Bellsund, Spitsbergen, Svalbard." Polish Polar Research 31, no. 1 (2010): 3–16. http://dx.doi.org/10.4202/ppres.2010.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Balan, E. "The oxidation state of vanadium in titanomagnetite from layered basic intrusions." American Mineralogist 91, no. 5-6 (2006): 953–56. http://dx.doi.org/10.2138/am.2006.2192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Elming, Sten-Åke, Mohsen Oveisy Moakhar, and Ol Of Martinsson. "A palaeomagnetic and geochemical study of basic intrusions in northern Sweden." GFF 126, no. 2 (2004): 243–52. http://dx.doi.org/10.1080/11035890401262243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

HUGHES, HANNAH S. R., KATHRYN M. GOODENOUGH, ABIGAIL S. WALTERS, MICHAEL MCCORMAC, A. GUS GUNN, and ALICJA LACINSKA. "The structure and petrology of the Cnoc nan Cuilean Intrusion, Loch Loyal Syenite Complex, NW Scotland." Geological Magazine 150, no. 5 (2013): 783–800. http://dx.doi.org/10.1017/s0016756812000957.

Full text
Abstract:
AbstractIn NW Scotland, several alkaline intrusive complexes of Silurian age intrude the Caledonian orogenic front. The most northerly is the Loch Loyal Syenite Complex, which is divided into three separate intrusions (Ben Loyal, Beinn Stumanadh and Cnoc nan Cuilean). Mapping of the Cnoc nan Cuilean intrusion shows two main zones: a Mixed Syenite Zone (MZ) and a Massive Leucosyenite Zone (LZ), with a gradational contact. The MZ forms a lopolith, with multiple syenitic lithologies, including early basic melasyenites and later felsic leucosyenites. Leucosyenite melts mixed and mingled with melas
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Basic intrusions"

1

Patton, David James Stanley. "The petrography and petrochemistry of the Tertiary basic hypabyssal intrusions of northeast Ireland." Thesis, Queen's University Belfast, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.356968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barbosa, Laércio Dal Olmo. "Petrografia e geoquímica das rochas intrusivas básicas da porção sudeste do Cinturão Dom Feliciano, RS." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/153358.

Full text
Abstract:
A participação de líquidos magmáticos extraídos do manto, registrados sob a forma de intrusões dioríticas, gabroicas e de rochas máficas-ultramáficas, tem sido apontada como uma componente determinante na geração de magmas intermediários a ácidos, em ambientes orogênicos a pós-colisionais. Neste contexto, a colocação de líquidos basálticos hidratados na base da crosta também é considerada um importante marcador petrogenético, já que além de fornecer calor, pode ainda contribuir com líquidos residuais fracionados, essenciais à geração de magmas evoluídos. Além disso, magmas pouco diferenciados
APA, Harvard, Vancouver, ISO, and other styles
3

Santos, Larissa dos. "Pirometamorfismo nos arenitos da Forma??o A?u, Bacia Potiguar, NE do Brasil." Universidade Federal do Rio Grande do Norte, 2013. http://repositorio.ufrn.br:8080/jspui/handle/123456789/18840.

Full text
Abstract:
Made available in DSpace on 2015-03-13T17:08:39Z (GMT). No. of bitstreams: 1 LarissaS_DISSERT.pdf: 4305557 bytes, checksum: 7f5031ea79015e9573b6354a457ad4a9 (MD5) Previous issue date: 2013-12-19<br>Conselho Nacional de Desenvolvimento Cient?fico e Tecnol?gico<br>Pyrometamorphism results from conditions of high temperatures and very low pressures provoked by the intrusion of hypabyssal basic bodies into sedimentary or metassedimentary hosting rocks. The onshore portion of the Potiguar Basin in NE Brazil offers examples of this type of metamorphism nearby the contacts of Paleogene to Neogene p
APA, Harvard, Vancouver, ISO, and other styles
4

Jim, Nilsson. "Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina)." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411548.

Full text
Abstract:
There are many examples worldwide were fossil magmatic intrusions influence the local water and energy supply. Due to that intrusions can act as a conductor and a reservoir, but also as a barrier for fluids and gases in the ground. The decisive feature between conductor or barrier in an intrusion is its fracture network. Hence it is of paramount importance to characterize an intrusion’s fracture network and thus its permeability. However, other than through boreholes magmatic intrusions are rather inaccessible and very little is known about their influence on aquifers and reservoir rocks in th
APA, Harvard, Vancouver, ISO, and other styles
5

Gade, Vaibhav. "Intrusion Detection System as a Service : Providing intrusion detection system on a subscription basis for cloud deployment." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Shenghong, and 杨胜洪. "The permian Pobei mafic-ultramafic intrusion (NE Tarim, NW China) and associated sulfide mineralization." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45874219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Adriasola, Muñoz Yvonne. "The thermal history of the Western Lower Saxony Basin, Germany." Aachen Mainz, 2006. http://d-nb.info/99793090X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Filho, André Palóczy. "Intrusions of South Atlantic Central Water on the Espírito Santo Basin shelf (18ºS-22ºS, Brazil)." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/21/21135/tde-28082015-141105/.

Full text
Abstract:
The intrusion pathways and physical mechanisms associated with intrusions of cold, nutrient-rich South Atlantic Central Water (SACW) onto the continental shelf of the Espírito Santo Basin (ESB), off southeast Brazil (18°S-22°S), are investigated. The approach consists of analyses of a set of simplified, process-oriented, primitive-equation numerical models supported by the analyses of an independent, more realistic numerical model and available observations. The cross-isobath circulation is found to be strongly dominated by wind-driving, consistent with previous findings. In the model experime
APA, Harvard, Vancouver, ISO, and other styles
9

Hauser, Christophe. "A basis for intrusion detection in distributed systems using kernel-level data tainting." Phd thesis, Supélec, 2013. http://tel.archives-ouvertes.fr/tel-01066750.

Full text
Abstract:
Modern organisations rely intensively on information and communicationtechnology infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport agents or blogs to complex e-commerce platforms,banking systems or service hosting, and all of these depend on distributedsystems. The security of these systems, with their increasing complexity, isa challenge. Cloud services are replacing traditional infrastructures byproviding lower cost alternatives for storage and computational power, butat the risk of relying on third party companies. This risk becomesparticularly critic
APA, Harvard, Vancouver, ISO, and other styles
10

Kamat, Sai Shyamsunder. "Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259187.

Full text
Abstract:
In the 21st century, information is the new currency. With the omnipresence of devices connected to the internet, humanity can instantly avail any information. However, there are certain are cybercrime groups which steal the information. An Intrusion Detection System (IDS) monitors a network for suspicious activities and alerts its owner about an undesired intrusion. These commercial IDS’es react after detecting intrusion attempts. With the cyber attacks becoming increasingly complex, it is expensive to wait for the attacks to happen and respond later. It is crucial for network owners to emplo
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Basic intrusions"

1

Osadetz, K. G. Basic volcanics in the Hassel Formation (mid-Cretaceous) and associated intrusives, Ellesmere Island, District of Franklin, Northwest Territories. Energy, Mines and Resources Canada, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Esposito, Kenneth J. Thermal effects of thin igneous intrusions on diagenetic reactions in a Tertiary basin of southwestern Washington. U.S. G.P.O., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Canada, Geological Survey of. Basic Volcanics in the Hassel Formation (Mid-Cretaceous) and Associated Intrusives, Ellesmere Island, District of Franklin, Northwest Territories. s.n, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reynolds, Richard L. Paleomagnetic and ⁴⁰Ar/³⁹Ar results from the Grant intrusive breccia and comparison to the Permian Downeys Bluff sill--evidence for Permian igneous activity at Hicks Dome, southern Illinois Basin. U.S. G.P.O., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

McCulloh, Thane Hubert. Mountain Meadows dacite: Oligocene intrusive complex that welds together the Los Angeles Basin, northwestern Peninsular Ranges, and central Transverse Ranges, California. U.S. GPO, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

McCulloh, Thane Hubert. Mountain Meadows dacite: Oligocene intrusive complex that welds together the Los Angeles Basin, northwestern Peninsular Ranges, and central Transverse Ranges, California. U.S. Department of the Interior, U.S. Geological Survey, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Buchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.

Full text
Abstract:
This chapter shows how any network intrusion into a strategically-important network is threatening. Hacking is thus a key part of international relations. This is true regardless of whether or not the intrusion was launched with offensive or defensive intent. The risk of misperception is real, and the threats enabled by a network intrusion are significant. Network intrusions offer the capacity for tailored cyber attacks, for more basic wiper attacks, for general intelligence collection and espionage, and for counterintelligence work. It is very difficult to determine the intentions of an intru
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Basic intrusions"

1

Regan, Peter Frederick. "The early basic intrusions." In Magmatism at a Plate Edge. Springer US, 1985. http://dx.doi.org/10.1007/978-1-4899-5820-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hatton, C. J., and G. von Gruenewaldt. "Early Precambrian layered intrusions." In Early Precambrian Basic Magmatism. Springer Netherlands, 1990. http://dx.doi.org/10.1007/978-94-009-0399-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krivolutskaya, Nadezhda A. "Basic–Ultrabasic Intrusions in the Kola-Karelia Area." In Siberian Traps and Pt-Cu-Ni Deposits in the Noril’sk Area. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-17205-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Di Giandomenico, Felicita, and Giulio Masetti. "Basic Aspects in Redundancy-Based Intrusion Tolerance." In 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87872-6_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Hui, Zhaowen Wan, Jianmei Zhou, and Xiang Chen. "Research on Basic Problems of Cognitive Network Intrusion Prevention." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40618-8_86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Galushkin, Yurii. "Duration of the Intrusion Formation and Its Relation to the Size of Thermal and Maturity Aureoles of the Intrusion Bodies." In Non-standard Problems in Basin Modelling. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33882-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gao, Meijuan, Jingwen Tian, and Shiru Zhou. "Community Intrusion Detection System Based on Radial Basic Probabilistic Neural Network." In Advances in Neural Networks – ISNN 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01510-6_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Svensen, Henrik H., Stéphane Polteau, Grant Cawthorn, and Sverre Planke. "Erratum to: Sub-volcanic Intrusions in the Karoo Basin, South Africa." In Physical Geology of Shallow Magmatic Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/11157_2016_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Svensen, Henrik H., Stéphane Polteau, Grant Cawthorn, and Sverre Planke. "Erratum to: Sub-volcanic Intrusions in the Karoo Basin, South Africa." In Physical Geology of Shallow Magmatic Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-14084-1_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Samareh Ghasem, Meisam, and Marjan Kuchaki Rafsanjani. "A Practical Review on Intrusion Detection Systems by Known Data Mining Methods." In Algorithms as a Basis of Modern Applied Mathematics. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-61334-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Basic intrusions"

1

Awodele, Oludele, Sunday Idowu, Omotola Anjorin, and Vincent Joshua. "A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3370.

Full text
Abstract:
Ignoring security threats can have serious consequences; therefore host machines in network must continually be monitored for intrusions since they are the final endpoint of any network. As a result, this paper presents an Intelligent Intrusion Detection and Prevention System (IIDPS), which monitors a single host system from three different layers; files analyzer, system resource and connection layers. The approach introduced, a multi - layered approach, in which each layer harnesses both aspects of existing approach, signature and anomaly approaches, to achieve a better detection and preventi
APA, Harvard, Vancouver, ISO, and other styles
2

Karamperidou, C., E. Karamperidou, and K. L. Katsifarakis. "Seawater intrusion into the aquifer of Eleftherae-N. Peramos, Kavala, Greece." In RIVER BASIN MANAGEMENT 2007. WIT Press, 2007. http://dx.doi.org/10.2495/rm070011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Hui, Xiang Chen, Jiangmei Zhou, Zhaowen Wang, and Huanxiao Xu. "Research on Basic Problems of Cognitive Network Intrusion Prevention." In 2013 Ninth International Conference on Computational Intelligence and Security (CIS). IEEE, 2013. http://dx.doi.org/10.1109/cis.2013.114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raut, Madhav G. "Introduction of intrusion detection system by particle swam optimization." In INTERNATIONAL CONFERENCE ON “MULTIDIMENSIONAL ROLE OF BASIC SCIENCE IN ADVANCED TECHNOLOGY” ICMBAT 2018. Author(s), 2019. http://dx.doi.org/10.1063/1.5100445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tong, Chaofeng, Jinhai Zheng, Cheng Zhang, and Claude Guilbaud. "Salinity Response to the Runoff From Yangtze River Basin at Qingcaosha Reservoir Area in Yangtze Estuary." In ASME 2010 29th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/omae2010-20422.

Full text
Abstract:
Qingcaosha Reservoir locates in the Yangtze Estuary of China is an estuary reservoir. As the third water source region of Shanghai city, about 717,000 m3/d raw water will be supplied from the Reservoir when the project is finished. In order to avoid salt water from saltwater intrusion, it is necessary to reveal the rule of salinity variation in the Qingcaosha Reservoir area. Saltwater intrusion in the Yangtze Estuary is mainly impacted by the fresh water discharge from the Yangtze River and the open sea tides. The salinity response of Qingcaosha Reservoir area to the runoff will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

COLEMAN, N. J., and M. A. THOMAS. "A NEW GEL-DERIVED MESOPOROUS GAS SORPTION REFERENCE MATERIAL: SUPPORTING MERCURY INTRUSION DATA." In Proceedings of the Second Pacific Basin Conference. WORLD SCIENTIFIC, 2000. http://dx.doi.org/10.1142/9789812793331_0121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tian, Jingwen, Meijuan Gao, and Fan Zhang. "Network Intrusion Detection Method Based on Radial Basic Function Neural Network." In 2009 International Conference on E-Business and Information System Security (EBISS). IEEE, 2009. http://dx.doi.org/10.1109/ebiss.2009.5138016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Langlois, J., Z. Yuan, H. Li, R. Kumar, and B. Bai. "Pre-salt Imaging Beneath Volcanic Intrusions in Brazils Santos Basin." In 76th EAGE Conference and Exhibition 2014. EAGE Publications BV, 2014. http://dx.doi.org/10.3997/2214-4609.20140682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

AbuGhazleh, Alia, Muder Almiani, Basel Magableh, and Abdul Razaque. "Intelligent Intrusion Detection Using Radial Basis Function Neural Network." In 2019 Sixth International Conference on Software Defined Systems (SDS). IEEE, 2019. http://dx.doi.org/10.1109/sds.2019.8768575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ardali, A., A. Gurer, and B. Tezkan. "Geoelectrical Mapping of Seawater Intrusion in Durusu Basin, Istanbul." In Near Surface Geoscience 2016 - 22nd European Meeting of Environmental and Engineering Geophysics. EAGE Publications BV, 2016. http://dx.doi.org/10.3997/2214-4609.201602067.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Basic intrusions"

1

Haggart, J. W., G. J. Woodsworth, and V. J. McNicoll. Uranium-lead geochronology of two intrusions in the southern Bowser Basin, British Columbia. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2006. http://dx.doi.org/10.4095/222882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

GOETZ, T. G. Technical basis document for the steam intrusion from interfacing systems accident. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/810647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Osadetz, K. G., and P. R. Moore. Basic volcanics in the Hassel formation [Mid-Cretaceous] and associated intrusives, Ellesmere Island, district of Franklin, Northwest Territories. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1988. http://dx.doi.org/10.4095/126101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Winkelman, W. D. ,. Westinghouse Hanford. Technical basis and spreadsheet documentation for correcting waste tank core samples for water intrusion based on a LiBr tracer. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/659216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thermal effects of thin igneous intrusions on diagenetic reactions in a Tertiary basin of southwestern Washington. US Geological Survey, 1995. http://dx.doi.org/10.3133/b2085c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!