Charnockite microstructures: From magmatic to metamorphic
نویسندگان
چکیده
منابع مشابه
Magmatic and Metamorphic Fluids in Pegmatite Development: Evidence from Borujerd Complex, Iran
The Borujerd complex of western Iran is composed of intrusions and their surrounding contact aureole, with, pegmatites and quartz veins. Pegmatites differ in mineralogy, origin and age, and two groups can be distinguished. The Older Pegmatites (about 120 Ma age) intruded contact metamorphic rocks from the early magmatic stage, while the Younger pegmatites (52-70 Ma age) formed during the late m...
متن کاملmagmatic and metamorphic fluids in pegmatite development: evidence from borujerd complex, iran
the borujerd complex of western iran is composed of intrusions and their surrounding contact aureole, with, pegmatites and quartz veins. pegmatites differ in mineralogy, origin and age, and two groups can be distinguished. the older pegmatites (about 120 ma age) intruded contact metamorphic rocks from the early magmatic stage, while the younger pegmatites (52-70 ma age) formed during the late m...
متن کاملCalcified tissue histochemistry: from microstructures to nanoparticles.
It has long been recognized that histochemistry and cytochemistry offer the only ways of gathering information about the biochemical composition of tissues and cells without disrupting their microscopic architecture. A variety of methods have been put forward for studying nuclei acids, proteins, carbohydrates, lipids, enzymes and other components of intact tissues and cells. By now, many of the...
متن کاملDielectric-constant evaluation from microstructures
We present an accurate, efficient algorithm for calculating the effective dielectric constant «̄ of periodic two-component composites with arbitrary unit-cell microstructures. The algorithm is based on a formulation of the relevant equations in the Bergman-Milton representation of «̄ that enables the use of the fast Fourier transform in their solution, coupled with the sum rules of the geometric ...
متن کاملMetamorphic Code from LLVM IR Bytecode
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strategies. However, code morphing also has potential security benefits, since it can serve to increase the “genetic diversity” of software. We have created a me...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Geoscience Frontiers
سال: 2012
ISSN: 1674-9871
DOI: 10.1016/j.gsf.2012.05.004