排序方式: 共有14条查询结果,搜索用时 31 毫秒
1.
2.
Skeletal fixation can be very beneficial to the recovery of wrist and hand function after a displaced fracture because it allows mobilization of soft tissues before the completion of fracture healing. The benefits of skeletal fixation can be greatly diminished, however, if excessive force causes the fixation to fail before fracture healing has occurred, infection occurs around the implant, or the patient develops reflex sympathetic dystrophy. Those complications, as well as others, are often caused by inappropriate or inadequate hand therapy. This article discusses the techniques needed to avoid many such complications while providing the best possible functional result for every patient. 相似文献
3.
F. -K. Grütte und B. Kohnke 《Zeitschrift für Lebensmitteluntersuchung und -Forschung A》1967,133(5):283-288
Zusammenfassung Für die zur nachfolgenden quantitativen Bestimmung geeignete eindimensionale papierchromatographische Auftrennung der 12 essentiellen, bedingt essentiellen und halbessentiellen Aminosäuren sowie der Eckaminosäuren eignet sich das folgende Verfahren:Die Aminosäuren Valin, Tyrosin, Methionin, Leucin, Isoleucin, Trytophan und Phenylalanin werden innerhalb 18 Std mit dem Laufmittelsystem Benzylalkohol-n-Butanol-Eisessig-Wasser (10:10:1:10) aufgetrennt. Lysin, Cystin, Threonin und Tyrosin lassen sich durch Chromatographie mit einem System — 24 Std mit Benzylalkohol-Eisessig-Wasser (50:10:13) — oder mit zwei Systemen — 6 Std mit Isobuttersäure-Wasser (4:1) und 15 Std mit n-Butanol-Eisessig-Wasser (5:0,8:5) getrennt erfassen. Um neben diesen 4 Aminosäuren auch noch Histidin und Arginin trennen zu können, eignet sich statt dessen eine 3fache Chromatographie mit 2 Laufmittelsystemen in 47 Std und zwar 7 plus 15 Std mit n-Butanol-Isobuttersäure-Wasser (5:0,8:5) und 25 Std mit n-Butanol-Eisessig-Wasser (4:0,8:5). Die Eckaminosäuren Cystin, Lysin und Methionin werden in 20 Std mit dem Laufmittel Benzylalkohol-Eisessig-Wasser (50:10:13) aufgetrennt. 相似文献
4.
Due to the international nature of supply chains, organizations interact by proxy with suppliers that they have little or no knowledge of. Limited knowledge of suppliers’ security practices means less control over overall product security, which can increase corporate risk. Formal risk management is critical to the overall procurement process and the risk to the critical components throughout the acquisition lifecycle can be managed by installing proactive supply chain risk management (SCRM) key practices. A properly managed supply chain is a critical requirement in ensuring trust in an organization’s sourced products. We discuss the assurance process requirements as well as a well-defined and recognized set of system engineering practices that apply scientific and engineering principles to ensure systematic direction, control, and trust. 相似文献
5.
Adam Kohnke 《EDPACS》2018,57(6):8-10
The following research explores some potential causes on the rise of IT audit co sourcing and skilled labor shortages affecting internal audit departments. This research draws upon surveys, professional interviews or other publicly available statistics from the Institute of Internal Auditors, Deloitte, ISACA, the Bureau of Labor Statistics and Protiviti. The goal of the research aimed to identify causal factors leading to internal audit departments being unable to keep up with demanding workloads placed upon them by their organizations and to use this information to suggest potential ways for those responsible to address the issues. This specific example highlights that the IT audit labor shortage and rise of IT audit co-sourcing may relate to a lack of specific actions taken by audit management, professional audit associations and related educational institutions. 相似文献
6.
7.
Peter C. Kohnke 《International journal for numerical methods in engineering》1978,12(8):1279-1294
A new procedure is presented for the analysis of geometrically non-linear frame structures. It assumes small strains and uses ‘fictitious forces’ based on the rotation from the initial configuration. The procedure also uses total displacements rather than incremental displacements. The procedure is valid for rotation up to 180 degrees and converges in a relatively small number of iterations. 相似文献
8.
Integrated-optical Mach-Zehnder add-drop filter fabricated by a single UV-induced grating exposure 总被引:1,自引:0,他引:1
Erdogan T Strasser TA Milbrodt MA Laskowski EJ Henry CH Kohnke GE 《Applied optics》1997,36(30):7838-7845
A four-port bandpass filter is demonstrated with good performance by use of UV-induced Bragg gratings in P-doped channel waveguides without UV trimming. The simple, single-step fabrication procedure is experimentally and theoretically analyzed, and tolerances are calculated for achieving practical wavelength-division-multiplexed communication system performance. 相似文献
9.
The emission characteristics of n-type modulation doped GaAs-AlGaAs quantum-well lasers are studied for constant doping density and stepped doping density laser cores. Constant doping density cores are found to have a shift to shorter wavelength with increasing doping density but suffer from a corresponding large increase in threshold current density. Stepped doping density cores exhibit clear wavelength shifting from the first to second quantized state transitions with increased doping near the quantum well while maintaining low threshold current densities. Threshold current densities of 440 A/cm2 are measured for second quantized state lasing in stepped core lasers. Gain spectra are measured for the stepped doping density core devices and modulation doping is shown to improve the gain bandwidth by 50% over undoped devices 相似文献
10.
Presently, 71% of annual losses are due to failures in the physical and human attack domains, while electronic breaches account for roughly 29%. While the lowest percentage of losses (29%) falls into the area of the classic technology-based attacks, unfortunately these are often the only kind of attacks factored into an organization’s cybersecurity planning. Surprisingly, in most organizations, human or physical types of threats are simply not part of traditional cyberdefense thinking. Most active cyberdefense solutions do not consider embodying integrated and well-defined behavioral controls into the cybersecurity process. And as a result, well executed attacks against the non-electronic attack surface are almost certain to succeed. We argue that the profession must find ways to ensure that the real-world practice of cybersecurity involves the creation and adoption of a complete, correct, and highly effective set of well-defined and commonly accepted controls; ones that are capable of closing off every feasible type of adversarial action. To be completely effective, the solution must amalgamate all of the essential concepts of cyberdefense into a single unifying practice model, one that has real-world currency. Professional societies help to serve as the developers and sanctioners of the fundamental ideas in their respective fields and the creation of the CSEC2017 document provides an authoritative statement of the elements of the field of cybersecurity for a broad array of practitioners. This paper discusses the CSEC2017 thought model and outlines the eight knowledge areas specified for the discipline to represent the complete body of knowledge within the field. 相似文献