Structural signatures of igneous sheet intrusion propagation

被引:36
|
作者
Magee, Craig [1 ]
Muirhead, James [2 ]
Schofield, Nick [3 ]
Walker, Richard J. [4 ]
Galland, Olivier [5 ]
Holford, Simon [6 ]
Spacapan, Juan [7 ]
Jackson, Christopher A-L. [1 ]
McCarthy, William [8 ]
机构
[1] Imperial Coll London, Dept Earth Sci & Engn, Basins Res Grp, London SW7 2BP, England
[2] Syracuse Univ, Dept Earth Sci, Syracuse, NY 13244 USA
[3] Univ Aberdeen, Geol & Petr Geol, Sch Geosci, Aberdeen AB24 3UE, Scotland
[4] Univ Leicester, Sch Geog Geol & Environm, Leicester LE1 7RH, Leics, England
[5] Univ Oslo, Dept Geosci, Njord Ctr, PGP, Postbox 1048, N-0316 Oslo, Norway
[6] Univ Adelaide, Australian Sch Petr, Adelaide, SA 5005, Australia
[7] Univ Nacl La Plata, CONICET, Fdn YPF, RA-1900 La Plata, Buenos Aires, Argentina
[8] Univ St Andrews, Dept Earth Sci, St Andrews KY16 9AL, Fife, Scotland
基金
美国国家科学基金会;
关键词
Magma; Sheet intrusion; Dyke; Sill; Flow; Structure; TRACHYTE MESA INTRUSION; MAGMA-FLOW; SILL EMPLACEMENT; HENRY MOUNTAINS; CONE SHEETS; FRACTURE; INSIGHTS; ROCK; GEOMETRY; GROWTH;
D O I
10.1016/j.jsg.2018.07.010
中图分类号
P [天文学、地球科学];
学科分类号
07 ;
摘要
The geometry and distribution of planar igneous bodies (i.e. sheet intrusions), such as dykes, sills, and inclined sheets, has long been used to determine emplacement mechanics, define melt source locations, and reconstruct palaeostress conditions to shed light on various tectonic and magmatic processes. Since the 1970's we have recognised that sheet intrusions do not necessarily display a continuous, planar geometry, but commonly consist of segments. The morphology of these segments and their connectors is controlled by, and provide insights into, the behaviour of the host rock during emplacement. For example, tensile brittle fracturing leads to the formation of intrusive steps or bridge structures between adjacent segments. In contrast, brittle shear faulting, cataclastic and ductile flow processes, as well as heat-induced viscous flow or fluidization, promotes magma finger development. Textural indicators of magma flow (e.g., rock fabrics) reveal that segments are aligned parallel to the initial sheet propagation direction. Recognising and mapping segment long axes thus allows melt source location hypotheses, derived from sheet distribution and orientation, to be robustly tested. Despite the information that can be obtained from these structural signatures of sheet intrusion propagation, they are largely overlooked by the structural and volcanological communities. To highlight their utility, we briefly review the formation of sheet intrusion segments, discuss how they inform interpretations of magma emplacement, and outline future research directions.
引用
收藏
页码:148 / 154
页数:7
相关论文
共 50 条
  • [41] The Sudbury Igneous Complex: A differentiated impact melt sheet
    Therriault, AM
    Fowler, AD
    Grieve, RAF
    ECONOMIC GEOLOGY AND THE BULLETIN OF THE SOCIETY OF ECONOMIC GEOLOGISTS, 2002, 97 (07): : 1521 - 1540
  • [42] Case study of igneous intrusion effects on coal nitrogen functionalities
    Valentim, Bruno
    Guedes, Alexandra
    Rodrigues, Sandra
    Flores, Deolinda
    INTERNATIONAL JOURNAL OF COAL GEOLOGY, 2011, 86 (2-3) : 291 - 294
  • [43] The Sudbury Igneous Complex: A differentiated impact melt sheet
    Therriault, Ann M.
    Fowler, Anthony D.
    Grieve, Richard A.F.
    Economic Geology, 2002, 97 (07) : 1521 - 1540
  • [44] ELECTRICAL AND EM PROPAGATION CHARACTERISTICS OF IGNEOUS ROCKS
    KATSUBE, TJ
    COLLETT, LS
    GEOPHYSICS, 1973, 38 (01) : 179 - &
  • [45] Variable-length signatures for intrusion detection
    Li, Zhuowei
    Das, Amitabha
    Zhou, Jianying
    Patra, Jagdish C.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 183 - 191
  • [46] ISDTM: An intrusion signatures description temporal model
    Ouyang, Ming-Guang
    Zhou, Yang-Bo
    Wuhan University Journal of Natural Sciences, 2003, 8 (02) : 373 - 378
  • [47] ISDTM:An Intrusion Signatures Description Temporal Model
    Ou Yang Ming-guang
    College of Business
    Wuhan University Journal of Natural Sciences, 2003, (02) : 373 - 378
  • [48] Formal specification of intrusion signatures and detection rules
    Pouzol, JP
    Ducassé, M
    15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 64 - 74
  • [49] Time language analysis and implementation of intrusion signatures
    Ouyang, Mingguang
    Pan, Feng
    Wang, Weinong
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (10):
  • [50] Packet Space Analysis of Intrusion Detection Signatures
    Massicotte, Frederic
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 365 - 366