نتایج جستجو برای: Chehel Kaman Formation

تعداد نتایج: 527421  

The Chehel Kaman Formation of the upper Paleocene age formed from carbonate and siliciclastic sediments is located, in the Kapeh Dagh Sedimentary Basin. Two sections where considered for the purpose of research into the effective diagenetic processes of this formation. The Cheshmeh Qorban section with a thickness of 270.8m located 140km down the Mashhad – Sarakhs Highway while the Shourlog Sect...

رحیم پوربناب, حسین, لاسمی, یعقوب , محبوبی, اسداله, موسوی حرمی, رضا,

this study is focused on do lomi te s of the Chehel-Kaman Formation (Upper Paleocene) that is located in NE Iran. Field and petrographic studies lead to distinguish dl and d2 dolomites. dL is fine crystals (Ie.<;ser than 10 micron) and is associated with t:vaporatic sed ime nts. and d2 in addition to fint: crystals. contains coarser crystals (50-RO micron) without evaporatic sediments. Al...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده علوم 1389

this research concentrates on the lithostratigraphy, biostratigraphy, microfacies and sedimentary environment of the asmari and gachsaran formations at southwest firuzabad. the thickness of the studied section in all 608.95 meters that 220.8 meters belong to the asmari formation and 387.95 meters belong to the gachsaran formation (champe and mol members). in the study area, the asmari formation...

2013
Zhou Fan

On the basis of the analysis of PVT solution methods for navigation message, the solution procedure of evaluation algorithm of LSM and Kaman filtering evaluation algorithm is constructed. Further, based on OEM development board for data acquisition, PVT solution process of collected GPS signals is simulated, and the results show that the solution property of Kaman filtering algorithm is much be...

2009

Kaman J.: A Doubled Ductus Parotideus in a Cow. Acta vet. Brno, 55, 1986:

2004
Asad Amir Pirzada Chris McDonald

An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmission power of each node limits its communication range, the nodes must assist and trust each other in forwarding packets from one node to another. However, this implied trust relationship can be threatened by malicious n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید