Petrochemistry of Lan Sang metamorphic suites

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote Optimization in Petrochemistry

In order to extend worldwide the processing business of the petrochemical plant, its potential business partners can themselves concurrently simulate production plans with high quality technical and economic features. In the simulation process, a large number of divergent goals are under attention. Therefore, the plant computer will use the multi-objective linear programming as a tool for negot...

متن کامل

2 Sang

Given two pseudo-Anosov homeomorphisms with distinct invariant measured foliations, some powers of their isotopy classes generate a rank two free subgroup of the mapping class group of the surface [6]. This construction gives an example of all pseudo-Anosov subgroup of the mapping class group. Whittlesey [13] gives a positive answer to the natural question of the existence of all pseudo-Anosov ...

متن کامل

The petrochemistry of Jake_M: a martian mugearite.

"Jake_M," the first rock analyzed by the Alpha Particle X-ray Spectrometer instrument on the Curiosity rover, differs substantially in chemical composition from other known martian igneous rocks: It is alkaline (>15% normative nepheline) and relatively fractionated. Jake_M is compositionally similar to terrestrial mugearites, a rock type typically found at ocean islands and continental rifts. B...

متن کامل

Nature or petrochemistry?-biologically degradable materials.

Naturally occurring polymers have been utilized for a long time as materials, however, their application as plastics has been restricted because of their limited thermoplastic processability. Recently, the microbial synthesis of polyesters directly from carbohydrate sources has attracted considerable attention. The industrial-scale production of poly(lactic acid) from lactic acid generated by f...

متن کامل

Sang Kil Cha

Many computer security problems stem from buggy software. Attackers exploit software bugs to infiltrate systems and install malicious software (malware) such as viruses. Therefore, it is imperative to find bugs before an attacker can exploit them and to detect malware prior to infection. The primary goal of my research is to assure software security. I analyze programs to find bugs and to detec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ScienceAsia

سال: 2020

ISSN: 1513-1874

DOI: 10.2306/scienceasia1513-1874.2020.066