Charnockite microstructures: From magmatic to metamorphic

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Magmatic and Metamorphic Fluids in Pegmatite Development: Evidence from Borujerd Complex, Iran

The Borujerd complex of western Iran is composed of intrusions and their surrounding contact aureole, with, pegmatites and quartz veins. Pegmatites differ in mineralogy, origin and age, and two groups can be distinguished. The Older Pegmatites (about 120 Ma age) intruded contact metamorphic rocks from the early magmatic stage, while the Younger pegmatites (52-70 Ma age) formed during the late m...

متن کامل

magmatic and metamorphic fluids in pegmatite development: evidence from borujerd complex, iran

the borujerd complex of western iran is composed of intrusions and their surrounding contact aureole, with, pegmatites and quartz veins. pegmatites differ in mineralogy, origin and age, and two groups can be distinguished. the older pegmatites (about 120 ma age) intruded contact metamorphic rocks from the early magmatic stage, while the younger pegmatites (52-70 ma age) formed during the late m...

متن کامل

Calcified tissue histochemistry: from microstructures to nanoparticles.

It has long been recognized that histochemistry and cytochemistry offer the only ways of gathering information about the biochemical composition of tissues and cells without disrupting their microscopic architecture. A variety of methods have been put forward for studying nuclei acids, proteins, carbohydrates, lipids, enzymes and other components of intact tissues and cells. By now, many of the...

متن کامل

Dielectric-constant evaluation from microstructures

We present an accurate, efficient algorithm for calculating the effective dielectric constant «̄ of periodic two-component composites with arbitrary unit-cell microstructures. The algorithm is based on a formulation of the relevant equations in the Bergman-Milton representation of «̄ that enables the use of the fast Fourier transform in their solution, coupled with the sum rules of the geometric ...

متن کامل

Metamorphic Code from LLVM IR Bytecode

Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strategies. However, code morphing also has potential security benefits, since it can serve to increase the “genetic diversity” of software. We have created a me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Geoscience Frontiers

سال: 2012

ISSN: 1674-9871

DOI: 10.1016/j.gsf.2012.05.004