نتایج جستجو برای: sargaz granitic intrusion

تعداد نتایج: 19974  

2015
Abdelrahman Abdelgawad Kunio Watanabe

Chemical analysis of the Water-rock interaction showed that hydrothermal altered rock contains large amount of fluoride. Considering that alteration has mainly occurred at the fractures’ cleavages, the aim of this paper is to investigate the change of the mineral composition between the cleavages and other parts of the granite surfaces. Scanning electron microscope with energy-dispersive spectr...

2001
M. DOLORES PEREIRA GÓMEZ M. DOLORES RODRÍGUEZ ALONSO

A large anatectic complex of Hercynian age, the Peña Negra complex, crops out in the central-north area of the Sierra de Gredos, Avila batholith, central Spain. Migmatites and anatectic granitic rocks were generated during the Upper Carboniferous from a Neoproterozoic – Lower Cambrian schist–greywacke complex with minor interlayered orthogneisses. Granitic rocks appear as subhorizontal sheets o...

2012
Lorence G. Collins

The AOC Granite 7-32-89-10 hole, drilled to search for oil in the Precambrian basement below the Alberta bituminous (tar) sands near Fort McMurray, Canada, penetrates layered biotite-hypersthene quartz diorite-gabbro sills that occur between 543 and 2363.3 meters depth. Three episodes of fracturing and cataclasis affected these sills. The first allowed Kand Si-metasomatism to change many parts ...

2012
Kalpana Kumari Anurag Jain Swati Dongre

Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in intrusion detection systems. Recently Artificial immune s...

Journal: :CoRR 2010
Mohammad Saiful Islam Mamun A. F. M. Sultanul Kabir

In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion pre...

2012

Traffic Safety Administration, in the interest of information exchange. The opinions, findings, and conclusions expressed in this publication are those of the authors and not necessarily those of the States Government assumes no liability for its contents or use thereof. If trade or manufacturers' names or products are mentioned, it is because they are considered essential to the object of the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید