首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14篇
  免费   0篇
化学工业   1篇
轻工业   1篇
无线电   1篇
一般工业技术   3篇
冶金工业   2篇
自动化技术   6篇
  2019年   2篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2008年   1篇
  1997年   2篇
  1995年   1篇
  1989年   1篇
  1981年   1篇
  1978年   1篇
  1969年   1篇
  1967年   1篇
排序方式: 共有14条查询结果,搜索用时 31 毫秒
1.
2.
Skeletal fixation can be very beneficial to the recovery of wrist and hand function after a displaced fracture because it allows mobilization of soft tissues before the completion of fracture healing. The benefits of skeletal fixation can be greatly diminished, however, if excessive force causes the fixation to fail before fracture healing has occurred, infection occurs around the implant, or the patient develops reflex sympathetic dystrophy. Those complications, as well as others, are often caused by inappropriate or inadequate hand therapy. This article discusses the techniques needed to avoid many such complications while providing the best possible functional result for every patient.  相似文献   
3.
Zusammenfassung Für die zur nachfolgenden quantitativen Bestimmung geeignete eindimensionale papierchromatographische Auftrennung der 12 essentiellen, bedingt essentiellen und halbessentiellen Aminosäuren sowie der Eckaminosäuren eignet sich das folgende Verfahren:Die Aminosäuren Valin, Tyrosin, Methionin, Leucin, Isoleucin, Trytophan und Phenylalanin werden innerhalb 18 Std mit dem Laufmittelsystem Benzylalkohol-n-Butanol-Eisessig-Wasser (10:10:1:10) aufgetrennt. Lysin, Cystin, Threonin und Tyrosin lassen sich durch Chromatographie mit einem System — 24 Std mit Benzylalkohol-Eisessig-Wasser (50:10:13) — oder mit zwei Systemen — 6 Std mit Isobuttersäure-Wasser (4:1) und 15 Std mit n-Butanol-Eisessig-Wasser (5:0,8:5) getrennt erfassen. Um neben diesen 4 Aminosäuren auch noch Histidin und Arginin trennen zu können, eignet sich statt dessen eine 3fache Chromatographie mit 2 Laufmittelsystemen in 47 Std und zwar 7 plus 15 Std mit n-Butanol-Isobuttersäure-Wasser (5:0,8:5) und 25 Std mit n-Butanol-Eisessig-Wasser (4:0,8:5). Die Eckaminosäuren Cystin, Lysin und Methionin werden in 20 Std mit dem Laufmittel Benzylalkohol-Eisessig-Wasser (50:10:13) aufgetrennt.  相似文献   
4.
Due to the international nature of supply chains, organizations interact by proxy with suppliers that they have little or no knowledge of. Limited knowledge of suppliers’ security practices means less control over overall product security, which can increase corporate risk. Formal risk management is critical to the overall procurement process and the risk to the critical components throughout the acquisition lifecycle can be managed by installing proactive supply chain risk management (SCRM) key practices. A properly managed supply chain is a critical requirement in ensuring trust in an organization’s sourced products. We discuss the assurance process requirements as well as a well-defined and recognized set of system engineering practices that apply scientific and engineering principles to ensure systematic direction, control, and trust.  相似文献   
5.
Adam Kohnke 《EDPACS》2018,57(6):8-10
The following research explores some potential causes on the rise of IT audit co sourcing and skilled labor shortages affecting internal audit departments. This research draws upon surveys, professional interviews or other publicly available statistics from the Institute of Internal Auditors, Deloitte, ISACA, the Bureau of Labor Statistics and Protiviti. The goal of the research aimed to identify causal factors leading to internal audit departments being unable to keep up with demanding workloads placed upon them by their organizations and to use this information to suggest potential ways for those responsible to address the issues. This specific example highlights that the IT audit labor shortage and rise of IT audit co-sourcing may relate to a lack of specific actions taken by audit management, professional audit associations and related educational institutions.  相似文献   
6.
7.
A new procedure is presented for the analysis of geometrically non-linear frame structures. It assumes small strains and uses ‘fictitious forces’ based on the rotation from the initial configuration. The procedure also uses total displacements rather than incremental displacements. The procedure is valid for rotation up to 180 degrees and converges in a relatively small number of iterations.  相似文献   
8.
A four-port bandpass filter is demonstrated with good performance by use of UV-induced Bragg gratings in P-doped channel waveguides without UV trimming. The simple, single-step fabrication procedure is experimentally and theoretically analyzed, and tolerances are calculated for achieving practical wavelength-division-multiplexed communication system performance.  相似文献   
9.
The emission characteristics of n-type modulation doped GaAs-AlGaAs quantum-well lasers are studied for constant doping density and stepped doping density laser cores. Constant doping density cores are found to have a shift to shorter wavelength with increasing doping density but suffer from a corresponding large increase in threshold current density. Stepped doping density cores exhibit clear wavelength shifting from the first to second quantized state transitions with increased doping near the quantum well while maintaining low threshold current densities. Threshold current densities of 440 A/cm2 are measured for second quantized state lasing in stepped core lasers. Gain spectra are measured for the stepped doping density core devices and modulation doping is shown to improve the gain bandwidth by 50% over undoped devices  相似文献   
10.
Presently, 71% of annual losses are due to failures in the physical and human attack domains, while electronic breaches account for roughly 29%. While the lowest percentage of losses (29%) falls into the area of the classic technology-based attacks, unfortunately these are often the only kind of attacks factored into an organization’s cybersecurity planning. Surprisingly, in most organizations, human or physical types of threats are simply not part of traditional cyberdefense thinking. Most active cyberdefense solutions do not consider embodying integrated and well-defined behavioral controls into the cybersecurity process. And as a result, well executed attacks against the non-electronic attack surface are almost certain to succeed. We argue that the profession must find ways to ensure that the real-world practice of cybersecurity involves the creation and adoption of a complete, correct, and highly effective set of well-defined and commonly accepted controls; ones that are capable of closing off every feasible type of adversarial action. To be completely effective, the solution must amalgamate all of the essential concepts of cyberdefense into a single unifying practice model, one that has real-world currency. Professional societies help to serve as the developers and sanctioners of the fundamental ideas in their respective fields and the creation of the CSEC2017 document provides an authoritative statement of the elements of the field of cybersecurity for a broad array of practitioners. This paper discusses the CSEC2017 thought model and outlines the eight knowledge areas specified for the discipline to represent the complete body of knowledge within the field.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号