نتایج جستجو برای: Intrusion-Related Gold Systems
تعداد نتایج: 2333285 فیلتر نتایج به سال:
the muteh gold deposit (ne of golpaygan) in the central part of intrusive-metamorphic belt of sanandaj-sirjan zone comprises nw-se trending gold-quartz vein occurred in metamorphic complex. gold mineralization is associated with quartz veins that formed during regional deformation across the mylonitic zones in metamorphic rocks of predominantly meta-volcanic, gneiss and schist. the sulfidation ...
Gold Deposits in the Sanandaj-Sirjan Zone: Orogenic Gold Deposits or Intrusion-Related Gold Systems?
The Tareek Darreh gold deposit is located 40km north of Torbat-e Jaam in the Khorassan-Razavi province, NE-Iran. The study area mainly comprises slightly metamorphosed, sedimentary rocks of Jurassic age including alternation of shale, siltstone, and sandstone. These rocks have been intruded by plutonic rocks such as gabbro-norite, diorite, quartz-diorite, and rhyodacite. The ore bodes are expos...
the neogene intrusion masses in the noudeh-enghelab area located to the north of sabzevar ophiolite have cut the late cretaceous ophiolitic rocks, sedimentary- volcanic and eocene volcanic rocks and have been covered by pliocene and quaternary deposits. the margin is of lava with basalt, phyric andesite-basalt and andesite and the central parts (dome shaped) composed of phyric andesite-trachyan...
In gold-endowed greenstone belts, ore bodies generally correspond to orogenic gold systems (OGS) formed during the main deformation stage that led craton stabilization (syntectonic period). Most OGS deposits postdate and locally overprint magmatic-hydrothermal systems, such as Au-Cu porphyry mostly magmatic (synvolcanic period) polymetallic intrusion-related (IRGS) of syntectonic period. Porphy...
session initiation protocol (sip) is the main signaling protocol of next generation networks (ngn). sip based applications are usually deployed over the internet, for which their text-based nature and internal stateful operation make them vulnerable to different types of attacks. the real‑time functionality of sip based applications make their related security systems more complex. on the other...
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید