Data generation for exploration geochemistry: Past, present and future

被引:3
|
作者
Bourdeau, Julie E. [1 ]
Zhang, Steven E. [1 ]
Nwaila, Glen T. [2 ]
Ghorbani, Yousef [3 ]
机构
[1] 39 Kiewiet St, Helikon Pk, ZA-1759 Randfontein, South Africa
[2] Univ Witwatersrand, Sch Geosci, 1 Jan Smuts Ave, ZA-2000 Johannesburg, South Africa
[3] Univ Lincoln, Coll Hlth & Sci, Sch Nat Sci, Joseph Banks Labs, Green Lane, Lincoln LN6 7DL, England
关键词
Exploration; Geochemistry; Sampling; Future; Data generation; MINERAL PROSPECTIVITY; QUALITY-CONTROL; GROUNDWATER; ANOMALIES; GEOSCIENCE; SEPARATION; PREDICTION; DEPOSITS; MODELS; NOISE;
D O I
10.1016/j.apgeochem.2024.106124
中图分类号
P3 [地球物理学]; P59 [地球化学];
学科分类号
0708 ; 070902 ;
摘要
Geochemical surveys are a cornerstone for data generation in geosciences, facilitating resource exploration. Geochemical data is essential for identifying mineralized areas, understanding local geology and assessing environmental impacts. This paper aims to: (1) review the process of geochemical data generation to gain an appreciation of the characteristics of traditional geochemical data; (2) review recent developments in the usage of geochemical data, particularly the disruption brought forth by those in data science and artificial intelligence; and (3) envision a future specification of geochemical data that would be fit-for-purpose for modern and emerging data users. This review reveals that benefits brought by advancements in automation, analytical technique and computing capability have unlocked unprecedented insights from geochemical data. However, the sustainability of re-purposing small geochemical data for big data methods is intrinsically questionable. The mismatch stems from rapidly changing data requirements in geochemistry, which is brought forth by: (1) a pivot away from scientific reduction through the adoption of system-level methods; (2) developments in geometallurgy; (3) skill gaps in geoscientific education; and (4) a growing demand of raw materials. While traditional methods will likely continue to serve many scientific needs, new strategies and techniques must be developed and implemented to cost effectively and efficiently generate bigger geochemical data. Bigger geochemical data must emerge in response to the already changing landscape of geochemical data usage. Solutions are multidimensional, from evolving geoscientific education, leveraging modern technology, explicating and differentiating data user and generator roles and responsibilities, to modernizing data management.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] The processing methods of geochemical exploration data: past, present, and future
    Zuo, Renguang
    Wang, Jian
    Xiong, Yihui
    Wang, Ziye
    APPLIED GEOCHEMISTRY, 2021, 132
  • [2] The processing methods of geochemical exploration data: past, present, and future
    Zuo, Renguang
    Wang, Jian
    Xiong, Yihui
    Wang, Ziye
    Applied Geochemistry, 2021, 132
  • [3] The exploration of Mars Past, present and future
    Rodriguez Manfredi, Jose Antonio
    REVISTA DE OCCIDENTE, 2012, (368) : 7 - 21
  • [4] The geochemistry of carbonate diagenesis: The past, present and future
    Swart, Peter K.
    SEDIMENTOLOGY, 2015, 62 (05) : 1233 - 1304
  • [5] Open Access in Geochemistry from Preprints to Data Sharing: Past, Present, and Future
    Pourret, Olivier
    Irawan, Dasapta Erwin
    PUBLICATIONS, 2022, 10 (01)
  • [6] Past, present, and future of fruit germplasm exploration
    Hummer, Kim E.
    HORTSCIENCE, 2007, 42 (02) : 203 - 204
  • [7] Grid generation: Past, present, and future
    Soni, BK
    APPLIED NUMERICAL MATHEMATICS, 2000, 32 (04) : 361 - 369
  • [8] Data mining: past, present and future
    Coenen, Frans
    KNOWLEDGE ENGINEERING REVIEW, 2011, 26 (01): : 25 - 29
  • [9] The Web of Data: Past, Present and Future?
    Herrera-Cubides, Jhon F.
    Gaona-Garcia, Paulo Alonso
    Sanchez-Alonso, Salvador
    2016 XI LATIN AMERICAN CONFERENCE ON LEARNING OBJECTS AND TECHNOLOGY (LACLO), 2016, : 434 - 441
  • [10] Data security: Past, present and future
    Turle, Marcus
    Computer Law and Security Review, 2009, 25 (01): : 51 - 58