2,728 research outputs found

    Diurnal Range of the Barometer in Fine and in Cloudy Weather

    Get PDF
    n/

    Igneous Rock Associations in Canada 3. Large Igneous Provinces (LIPs) in Canada and Adjacent Regions: 3 Ga to Present

    Get PDF
    Earth history is punctuated by numerous periods during which large volumes of mafic magma were emplaced. Such magmas not generated by a 'normal' spreading ridge or by subduction are termed Large Igneous Provinces (LIPs), and consist of continental flood basalts, volcanic rifted margins, oceanic plateaus, ocean basin flood basalts, submarine ridges, and seamount chains. Associated felsic rocks may also be present. LIPs of Mesozoic and Cenozoic age are typically the best preserved. Those of Paleozoic and Proterozoic age are usually more deeply eroded, and consist of flood basalt remnants and a deep-level plumbing system (of giant dyke swarms, sill provinces and layered intrusions). In the Archean the most promising LIP candidates are greenstone belts containing komatiites. Many LIPs have been linked to regional-scale uplift, continental rifting and breakup, and climatic crises. They can be used as precisely dated time markers in the stratigraphic record, and are key targets for Ni-Cu-PGE exploration. LIPs have also become a focus in the debate on the existence and nature of mantle plumes. Canada has a rich record of LIPs. At least 80 candidates are recognized in Canada and adjacent regions, with ages ranging from 3100 to 17 Ma. We review proposed links between the LIP record of Canada and mantle plumes, continental breakup, regional uplift, and ore deposits. However, given that many mafic units in Canada remain poorly characterized, a concerted geochronology campaign with integrated paleomagnetism and geochemistry would be invaluable in expanding the application of the Canadian LIP record to solving major geological problems. RÉSUMÉ L'histoire de la Terre est ponctuée de nombreuses périodes de mise en place de forts volumes de magma mafiques. De tels magmas qui ne sont pas issus de zones d'expansion « normale » ou de subduction sont appelés Grandes provinces ignées (GPI), et celles-ci sont constituées de basaltes d'épanchements continentaux, de marges de fosse volcaniques, de plateaux océaniques, d'épanchements de basaltes de bassins océaniques, de crêtes sous-marines, et de chaînes de monts sous-marines. Peuvent également y être associées des suites de roches felsiques. Généralement, les GPI du Mésozoïque et du Cénozoïque sont les mieux préservées. Celles du Protérozoïque et du Paléozoïque sont généralement plus fortement érodées et sont constituées de vestiges de basaltes d'épanchement et des réseaux de conduits d'origine (réseaux géants de dykes, provinces de filons-couches et d'intrusifs stratifiées). Dans l'Archéen, les meilleurs candidats sont représentés par les bandes de roches vertes à komatiites. De nombreuses GPI ont été associées à des épisodes de soulèvement régionaux, de dérives ou de fragmentations continentales, ainsi qu'à des crises climatiques. Elles peuvent servir de marqueurs temporels stratigraphiques et sont des cibles de première importance dans l'exploration de gisements de Cu-Ni-ÉGP. Les GPI sont aussi devenues des arguments très considérés dans le débat sur l'existence et la nature des panaches mantelliques. Le Canada possède de riches archives de GPI, et au moins 80 candidatures ont été isolées sur le territoire canadien et dans les régions adjacentes, leur âge délimitant une fourchette allant de 3 100 Ma à 17 Ma. Nous passons en revue les liens proposés entre la suite des GDI canadiennes d'une part, et celle des panaches mantelliques, des fragmentations continentales, des soulèvements régionaux, et des gisements minéraux, d'autre part. Toutefois, vu le piètre état de caractérisation des unités mafiques au Canada, une campagne de caractérisation géochronologique, paléomagnétique et géochimique serait d'une valeur inestimable pour favoriser l'utilisation des GDI canadiennes pour nous aider à solutionner de grands problèmes géologiques

    Beyond Justice, Beyond Peace? Colombia, the Interests of Justice, and the Limits of International Criminal Law

    Get PDF
    This paper explores the role of Article 53 of the Rome Statute and its ‘interest of justice’ standard in Colombia. After first providing some background to the ICC’s involvement in Colombia in the context of the so-called Justice and Peace Law and the more recent Legal Framework for Peace, we critically explore the reasons why the principle of complementarity is the focus of contemporary debates on the ICC in that country. We suggest that this discussion often ends in stalemate, with little space to move forward. In light of this, in this article we propose an alternative way to advance the discussion; namely, Article 53. We then consider whether, in order to protect transitional justice mechanisms adopted by states in order to end conflicts and move towards national reconciliation, the OTP has the power under Article 53(1)(c) to stop a prosecution on the basis that it is not in the interests of justice. Much here depends upon whether justice is interpreted broadly or narrowly. Two questions are central: First, should transitional justice arrangements be permissible under the legal framework established by the Rome Statute? Second, should the OTP concern itself with matters pertaining to domestic politics or should it understand its role as being completely independent from national processes? We advocate a narrow reading of the concept of justice, meaning that the OTP cannot use Article 53(1)(c) to prevent ICC intervention on the basis that it risks disrupting a transitional justice mechanism

    Social identity mediates the positive effect of globalization on individual cooperation: Results from international experiments

    Get PDF
    Globalization is defined for individuals as their connectivity in global networks. Social identity is conceptualized as attachment and identification with a group. We measure individual involvement with global networks and local, national, and global social identity through a questionnaire. Propensity to cooperate is measured in experiments involving local and global others. Firstly, we analyze possible determinants of global social identity. Overall, attachment to global identity is significantly lower than national and local identity, but there is a significant positive correlation between global social identity and an index of individual global connectivity. Secondly, we find a significant mediating effect of global social identity between individual global connectivity and propensity to cooperate at the global level. This is consistent with a cosmopolitan hypothesis of how participation in global networks reshapes social identity: Increased participation in global networks increases global social identity and this in turn increases propensity to cooperate with others. We also show that this model receives more support than alternative models substituting either propensity to associate with others or general generosity for individual global connectivity. We further demonstrate that more globalized individuals do not reduce contributions to local accounts while increasing contributions to global accounts, but rather are overall more generous. Finally, we find that the effect of global social identity on cooperation is significantly stronger in countries at a relatively low stage of globalization, compared to more globalized countries

    The elements of a computational infrastructure for social simulation

    Get PDF
    Applications of simulation modelling in social science domains are varied and increasingly widespread. The effective deployment of simulation models depends on access to diverse datasets, the use of analysis capabilities, the ability to visualize model outcomes and to capture, share and re-use simulations as evidence in research and policy-making. We describe three applications of e-social science that promote social simulation modelling, data management and visualization. An example is outlined in which the three components are brought together in a transport planning context. We discuss opportunities and benefits for the combination of these and other components into an e-infrastructure for social simulation and review recent progress towards the establishment of such an infrastructure

    Non-forcible measures and the law of self-defence

    Get PDF
    The right of self-defence is usually presented as an exception to the principle of non-use of force. Conventional wisdom therefore holds that the right of self-defence can only be relied on to justify those measures constituting a threat or use of force. This article rejects that claim. It argues that self-defence is a general right under international law and, as such, can be invoked to justify all measures necessary to repel an armed attack regardless of whether they are forcible or non-forcible in nature. To support this argument, this article examines the genesis of the right of self-defence under customary international law, the text of Article 51 of the United Nations Charter, the structure of the United Nations Charter and State practice on Article 51

    Swift Neighbors and Persistent Strangers: A Cross‐Cultural Investigation of Trust and Reciprocity in Social Exchange

    Get PDF
    In four countries, levels of trust and reciprocity in direct-reciprocal exchange are compared with those in network-generalized exchanges among experimentally manipulated groups’ members (neighbors) or random experimental participants (strangers). Results show that cooperation decreases as social distance increases; and, that identical network-generalized exchanges generate different amounts of trusting behavior due solely to manipulated social identity between the actors. This study demonstrates the interaction of culture and social identity on the propensity to trust and reciprocate and also reveals differing relationships between trust and reciprocation in each of the four countries, bringing into question the theoretical relationship between these cooperative behaviors

    Cyber Warfare and the Status of Anonymous under International Humanitarian Law

    Get PDF
    Since its emergence in 2003 Anonymous has become an increasingly prominent actor on the international stage. Anonymous is an online collective comprising like-minded individuals that commit cyber-attacks against state and non-state actors that are allegedly involved in the abuse of fundamental human rights. In recent years Anonymous has demonstrated a preparedness to commit cyber-attacks against parties to an armed conflict and the cyber-attacks launched against Israel during its 2014 armed conflict with Hamas are such an example. Using Anonymous’s cyber-attacks against Israel as a lens, this article evaluates the status of online groups under international humanitarian law when they become embroiled in armed conflict and in particular under what circumstances members of these groups can be made the object of attack under the laws of targeting

    Outcome-sensitive multiple imputation: a simulation study.

    Get PDF
    BACKGROUND: Multiple imputation is frequently used to deal with missing data in healthcare research. Although it is known that the outcome should be included in the imputation model when imputing missing covariate values, it is not known whether it should be imputed. Similarly no clear recommendations exist on: the utility of incorporating a secondary outcome, if available, in the imputation model; the level of protection offered when data are missing not-at-random; the implications of the dataset size and missingness levels. METHODS: We used realistic assumptions to generate thousands of datasets across a broad spectrum of contexts: three mechanisms of missingness (completely at random; at random; not at random); varying extents of missingness (20-80% missing data); and different sample sizes (1,000 or 10,000 cases). For each context we quantified the performance of a complete case analysis and seven multiple imputation methods which deleted cases with missing outcome before imputation, after imputation or not at all; included or did not include the outcome in the imputation models; and included or did not include a secondary outcome in the imputation models. Methods were compared on mean absolute error, bias, coverage and power over 1,000 datasets for each scenario. RESULTS: Overall, there was very little to separate multiple imputation methods which included the outcome in the imputation model. Even when missingness was quite extensive, all multiple imputation approaches performed well. Incorporating a secondary outcome, moderately correlated with the outcome of interest, made very little difference. The dataset size and the extent of missingness affected performance, as expected. Multiple imputation methods protected less well against missingness not at random, but did offer some protection. CONCLUSIONS: As long as the outcome is included in the imputation model, there are very small performance differences between the possible multiple imputation approaches: no outcome imputation, imputation or imputation and deletion. All informative covariates, even with very high levels of missingness, should be included in the multiple imputation model. Multiple imputation offers some protection against a simple missing not at random mechanism
    corecore