Feeds

Boffins: Japan was hit by 'double-wave' tsunami

Two became one

SANS - Survey on application security programs

Boffins from NASA and Ohio State University have discovered that the tsunami that hit Japan in March 2011 was a so-called ‘merging tsunami’.

Merging tsunami data from two satellites. Credit: NASA/JPL-Caltech/Ohio State University (click to enlarge)

The idea of a merging tsunami, where two or more wave fronts join to form a single wave capable of travelling long distances, has long been hypothesised, but never before confirmed.

NASA and European radar satellites captured at least two wave fronts on the day of the Japanese tsunami, which merged to form a single double-high wave far out at sea that could travel to the coast without losing power.

The two fronts were pushed together by ocean ridges and undersea mountain chains near the tsunami’s origin.

The data gathered could help scientists to improve tsunami forecasts.

"It was a one in 10 million chance that we were able to observe this double wave with satellites," principal investigator Y Tony Song said.

"Researchers have suspected for decades that such 'merging tsunamis' might have been responsible for the 1960 Chilean tsunami that killed about 200 people in Japan and Hawaii, but nobody had definitively observed a merging tsunami until now," he added.

"It was like looking for a ghost. A NASA-French Space Agency satellite altimeter happened to be in the right place at the right time to capture the double wave and verify its existence."

The trouble with tsunami forecasts now is that while the underwater earthquake that is the origin of the event can be pinpointed, the waves themselves often seem to go off in random directions, causing massive destruction in some places but leaving nearby areas unharmed.

The researchers think that ridges and underwater mountains can deflect parts of the initial tsunami wave to form a number of wave fronts.

Current hazard maps that try to predict where tsunamis will hit only take into consideration sea-floor topography near shorelines, but this research suggests scientists might be able to create maps that also take into account ridges and mountains far from shore.

"Tools based on this research could help officials forecast the potential for tsunami jets to merge," Song said. "This, in turn, could lead to more accurate coastal tsunami hazard maps to protect communities and critical infrastructure." ®

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Melting permafrost switches to nasty, high-gear methane release
Result? 'Way more carbon being released into the atmosphere as methane'
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.