1,664 research outputs found

    A continuum model of multi-phase reactive transport in igneous systems

    Get PDF
    Multi-phase reactive transport processes are ubiquitous in igneous systems. A challenging aspect of modelling igneous phenomena is that they range from solid-dominated porous to liquid-dominated suspension flows and therefore entail a wide spectrum of rheological conditions, flow speeds, and length scales. Most previous models have been restricted to the two-phase limits of porous melt transport in deforming, partially molten rock and crystal settling in convecting magma bodies. The goal of this paper is to develop a framework that can capture igneous system from source to surface at all phase proportions including not only rock and melt but also an exsolved volatile phase. Here, we derive an n-phase reactive transport model building on the concepts of Mixture Theory, along with principles of Rational Thermodynamics and procedures of Non-equilibrium Thermodynamics. Our model operates at the macroscopic system scale and requires constitutive relations for fluxes within and transfers between phases, which are the processes that together give rise to reactive transport phenomena. We introduce a phase- and process-wise symmetrical formulation for fluxes and transfers of entropy, mass, momentum, and volume, and propose phenomenological coefficient closures that determine how fluxes and transfers respond to mechanical and thermodynamic forces. Finally, we demonstrate that the known limits of two-phase porous and suspension flow emerge as special cases of our general model and discuss some ramifications for modelling pertinent two- and three-phase flow problems in igneous systems.Comment: Revised preprint submitted for peer-reviewed publication: main text with 8 figures, 1 table; appendix with 3 figures and 2 table

    Volatiles beneath mid-ocean ridges: deep melting, channelised transport, focusing, and metasomatism

    Get PDF
    Deep-Earth volatile cycles couple the mantle with near-surface reservoirs. Volatiles are emitted by volcanism and, in particular, from mid-ocean ridges, which are the most prolific source of basaltic volcanism. Estimates of volatile extraction from the asthenosphere beneath ridges typically rely on measurements of undegassed lavas combined with simple petrogenetic models of the mean degree of melting. Estimated volatile fluxes have large uncertainties; this is partly due to a poor understanding of how volatiles are transported by magma in the asthenosphere. Here, we assess the fate of mantle volatiles through numerical simulations of melting and melt transport at mid-ocean ridges. Our simulations are based on two-phase, magma/mantle dynamics theory coupled to idealised thermodynamic model of mantle melting in the presence of water and carbon dioxide. We combine simulation results with catalogued observations of all ridge segments to estimate a range of likely volatile output from the global mid-ocean ridge system. We thus predict global MOR crust production of 66-73 Gt/yr (22-24 km3/yr) and global volatile output of 52-110 Mt/yr, corresponding to mantle volatile contents of 100--200~ppm. We find that volatile extraction is limited: up to half of deep, volatile-rich melt is not focused to the axis but is rather deposited along the LAB. As these distal melts crystallise and fractionate, they metasomatise the base of the lithosphere, creating rheological heterogeneity that could contribute to the seismic signature of the LAB.Comment: 42 pages; 8 figures; 2 appendices (incl 1 table); 7 suppl. figures; 1 suppl. tabl

    Metal oxides in fluidized bed conversion systems

    Get PDF
    Several fluidized bed conversion concepts utilizing metal oxide particles have been proposed in the last decade. The use of metal oxide particles in fluidized bed conversion systems stems largely from the research around chemical-looping combustion (CLC). Here, a metal oxide is used as an oxygen carrier for transport of oxygen from combustion air to the fuel. Although the concept was proposed already in the 1950’s, most of the research has been carried out after the turn of the century. The research was sparked by the need for viable technologies for carbon capture, and CLC is here a breakthrough technology with low costs for capture and a high carbon capture efficiency. Today a large number of oxygen carrier particles have been developed and tested and around 30 continuous units up to 3 MW have been operated around the world. The research around CLC and oxygen carriers has sparked the development of several other fluidized bed processes where oxygen carriers or metal oxide particles can be used to enhance performance. These include fluidized bed processes for gas, solid and liquid fuels for heat, power and syngas production. Chalmers has been active within CLC research for over 15 years and also has activities within these related processes. In addition to CLC, this paper will provide an overview of these technologies: i) Oxygen carrier aided combustion, ii) Dual-bed fluidized bed gasification (DFBG), iii) Chemical-looping reforming (CLR) and iv) gasification gas conditioning (CLTR). Some important criteria for metal oxides will be discussed in relation to the application

    On the lifetime of bioinformatics web services

    Get PDF
    Web services are used through all disciplines in life sciences and the online landscape is growing by hundreds of novel servers annually. However, availability varies, and maintenance practices are largely inconsistent. We screened the availability of 2396 web tools published during the past 10 years. All servers were accessed over 133 days and 318 668 index files were stored in a local database. The number of accessible tools almost linearly increases in time with highest availability for 2019 and 2020 (∼90%) and lowest for tools published in 2010 (∼50%). In a 133-day test frame, 31% of tools were always working, 48.4% occasionally and 20.6% never. Consecutive downtimes were typically below 5 days with a median of 1 day, and unevenly distributed over the weekdays. A rescue experiment on 47 tools that were published from 2019 onwards but never accessible showed that 51.1% of the tools could be restored in due time. We found a positive association between the number of citations and the probability of a web server being reachable. We then determined common challenges and formulated categorical recommendations for researchers planning to develop web-based resources. As implication of our study, we propose to develop a repository for automatic API testing and sustainability indexing

    Immersive Storytelling for Information Security Awareness Training in Virtual Reality

    Get PDF
    Due to the central role of the human factor in information security, the need for information security awareness (ISA) is constantly increasing. In order to maintain a high level of ISA, trainings have to be carried out frequently to ensure sustainability. Since education via VR has led to a sustainable learning effect in other fields, we evaluated the use of VR for ISA trainings. Moreover, we combined our VR training with immersive storytelling. For the evaluation we used two sets of participants. The first used a traditional e-Learning method to answer the questionnaire. The second used our VR training. After one week we repeated the questionnaires. The results showed that the VR group could achieve higher scores than the noVR group. Moreover, the VR group achieved even higher scores after one week which might be due to the sustained learning effect from the VR training

    Periodic outgassing as a result of unsteady convection in Ray Lava Lake, Mount Erebus, Antarctica

    Full text link
    Persistently active lava lakes show continuous outgassing and open convection over years to decades. Ray Lake, the lava lake at Mount Erebus, Ross Island, Antarctica, maintains long-term, near steady-state behavior in temperature, heat flux, gas flux, lake level, and composition. This activity is superposed by periodic small pulses of gas and hot magma every 5-18 minutes and disrupted by sporadic Strombolian eruptions. The periodic pulses have been attributed to a variety of potential processes including unstable bidirectional flow in the conduit feeding the lake. In contrast to hypotheses invoking a conduit source for the observed periodicity, we test the hypothesis that the behavior could be the result of dynamics within the lake itself, independent of periodic influx from the conduit. We perform numerical simulations of convection in Ray Lake driven by both constant and periodic inflow of gas-rich magma from the conduit to identify whether the two cases have different observational signatures at the surface. Our simulations show dripping diapirs or pulsing plumes leading to observable surface behavior with periodicities in the range of 5-20 minutes. We conclude that a convective speed faster than the inflow speed can result in periodic behavior without requiring periodicity in conduit dynamics. This finding suggests that the surface behavior of lava lakes might be less indicative of volcanic conduit processes in persistently outgassing volcanoes than previously thought, and that dynamics within the lava lake itself may modify or overprint patterns emerging from the conduit

    DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data

    Full text link
    Covert channels are unforeseen and stealthy communication channels that enable manifold adversary scenarios. However, they can also allow the exchange of confidential information by journalists. All covert channels described until now therefore need to craft seemingly legitimate information flows for their information exchange, mimicking unsuspicious behavior. In this paper, we present DYST, which represents a new class of covert channels we call history covert channels jointly with the new paradigm of covert channel amplification. History covert channels can communicate almost exclusively by pointing to unaltered legitimate traffic created by regular network nodes. Only a negligible fraction of the covert communication process requires the transfer of actual covert channel information by the covert channel's sender. This allows, for the first time, an amplification of the covert channel's message size, i.e., minimizing the fraction of actually transferred secret data by a covert channel's sender in relation to the overall secret data being exchanged. We extend the current taxonomy for covert channels to show how history channels can be categorized. We describe multiple scenarios in which history covert channels can be realized, theoretically analyze the characteristics of these channels and show how their configuration can be optimized for different implementations. We further evaluate the robustness and detectability of history covert channels.Comment: 18 pages, rev
    corecore