Feeds

Boffins: Japan was hit by 'double-wave' tsunami

Two became one

High performance access to file storage

Boffins from NASA and Ohio State University have discovered that the tsunami that hit Japan in March 2011 was a so-called ‘merging tsunami’.

Merging tsunami data from two satellites. Credit: NASA/JPL-Caltech/Ohio State University (click to enlarge)

The idea of a merging tsunami, where two or more wave fronts join to form a single wave capable of travelling long distances, has long been hypothesised, but never before confirmed.

NASA and European radar satellites captured at least two wave fronts on the day of the Japanese tsunami, which merged to form a single double-high wave far out at sea that could travel to the coast without losing power.

The two fronts were pushed together by ocean ridges and undersea mountain chains near the tsunami’s origin.

The data gathered could help scientists to improve tsunami forecasts.

"It was a one in 10 million chance that we were able to observe this double wave with satellites," principal investigator Y Tony Song said.

"Researchers have suspected for decades that such 'merging tsunamis' might have been responsible for the 1960 Chilean tsunami that killed about 200 people in Japan and Hawaii, but nobody had definitively observed a merging tsunami until now," he added.

"It was like looking for a ghost. A NASA-French Space Agency satellite altimeter happened to be in the right place at the right time to capture the double wave and verify its existence."

The trouble with tsunami forecasts now is that while the underwater earthquake that is the origin of the event can be pinpointed, the waves themselves often seem to go off in random directions, causing massive destruction in some places but leaving nearby areas unharmed.

The researchers think that ridges and underwater mountains can deflect parts of the initial tsunami wave to form a number of wave fronts.

Current hazard maps that try to predict where tsunamis will hit only take into consideration sea-floor topography near shorelines, but this research suggests scientists might be able to create maps that also take into account ridges and mountains far from shore.

"Tools based on this research could help officials forecast the potential for tsunami jets to merge," Song said. "This, in turn, could lead to more accurate coastal tsunami hazard maps to protect communities and critical infrastructure." ®

High performance access to file storage

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.