Petrochemistry of Lan Sang metamorphic suites
نویسندگان
چکیده
منابع مشابه
Remote Optimization in Petrochemistry
In order to extend worldwide the processing business of the petrochemical plant, its potential business partners can themselves concurrently simulate production plans with high quality technical and economic features. In the simulation process, a large number of divergent goals are under attention. Therefore, the plant computer will use the multi-objective linear programming as a tool for negot...
متن کامل2 Sang
Given two pseudo-Anosov homeomorphisms with distinct invariant measured foliations, some powers of their isotopy classes generate a rank two free subgroup of the mapping class group of the surface [6]. This construction gives an example of all pseudo-Anosov subgroup of the mapping class group. Whittlesey [13] gives a positive answer to the natural question of the existence of all pseudo-Anosov ...
متن کاملThe petrochemistry of Jake_M: a martian mugearite.
"Jake_M," the first rock analyzed by the Alpha Particle X-ray Spectrometer instrument on the Curiosity rover, differs substantially in chemical composition from other known martian igneous rocks: It is alkaline (>15% normative nepheline) and relatively fractionated. Jake_M is compositionally similar to terrestrial mugearites, a rock type typically found at ocean islands and continental rifts. B...
متن کاملNature or petrochemistry?-biologically degradable materials.
Naturally occurring polymers have been utilized for a long time as materials, however, their application as plastics has been restricted because of their limited thermoplastic processability. Recently, the microbial synthesis of polyesters directly from carbohydrate sources has attracted considerable attention. The industrial-scale production of poly(lactic acid) from lactic acid generated by f...
متن کاملSang Kil Cha
Many computer security problems stem from buggy software. Attackers exploit software bugs to infiltrate systems and install malicious software (malware) such as viruses. Therefore, it is imperative to find bugs before an attacker can exploit them and to detect malware prior to infection. The primary goal of my research is to assure software security. I analyze programs to find bugs and to detec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ScienceAsia
سال: 2020
ISSN: 1513-1874
DOI: 10.2306/scienceasia1513-1874.2020.066