首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
《文物保护研究》2013,58(4):228-238
Abstract

A procedure for collection of decay rate data from stone samples exposed in actual environmental conditions is described. This provides precise weekly decay rate data. Data were collected for 16 consecutive months for 200-year-old weathered and freshly quarried Portland stone. Problems with the use of an acrylic sheet as a control were encountered and overcome. It is suggested that glass is a better control surface. Decay rates of new and old stone differed, with new stone typically being 60–70mg/m2/day. Close agreement was found between new stone replicates. Rates for old stones were much more variable and ranged from 90–270mg/m2/day. Differences were also found in the relative contributions of solution and particulate loss to total loss between the two stones.  相似文献   

3.
《期刊图书馆员》2013,64(2-3):59-67
No abstract available for this article.  相似文献   

4.
The classical concept of entropy is shown not to reflect the essence of the second law of thermodynamics both phenomenologically and theoretically. A new concept of entropy, S n , is given, which offers a particular physical meaning of entropy and provides an experimental determination of the entropy value. This allows one to avoid many attempts at defining the phenomenon of life via entropy characteristics and give definitions of life and an elementary structure of both life itself and devices that simulate life (automata, computers, and robots.). This, in turn, allows one to assign a substantive sense to the mathematical character of corresponding sciences (information theory, cybernetics, system theory, etc.) and define operational basic concepts of information, knowledge, meaning, and control, as well as to formulate operational concepts of order, organization, and self-organization and implement a new approach to problems of biology, biophysics, information theory, cybernetics, and system theory.  相似文献   

5.
《The Reference Librarian》2013,54(7-8):103-109
No abstract available for this article.  相似文献   

6.
Lesbian, gay, bisexual, and transgender (LGBT) persons, while widely diverse in many ways, share health disparities related to the stigma and discrimination they experience, including disproportionate rates of psychiatric disorders, substance abuse, and suicide. Lesbians, gay men, bisexuals, and the transgender communities have additional health concerns and disparities unique to each population. This paper highlights the national recognition of these health issues and disparities and presents web-based information resources about them and their mitigation.  相似文献   

7.
Lesbian, gay, bisexual, and transgender (LGBT) persons, while widely diverse in many ways, share health disparities related to the stigma and discrimination they experience, including disproportionate rates of psychiatric disorders, substance abuse, and suicide. Lesbians, gay men, bisexuals, and the transgender communities have additional health concerns and disparities unique to each population. This paper highlights the national recognition of these health issues and disparities and presents web-based information resources about them and their mitigation.  相似文献   

8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
《图书馆管理杂志》2013,53(3-4):511-512
ABSTRACT

The past ten years have seen remote access to electronic resources emerge as the preferred method of use for many, if not most, library patrons. Unfortunately, the misuse of the Internet has also led to a culture in which many personal computer users feel they must install accessory programs that complicate the normal processes associated with the retrieval of Web-based information. Various programs that users install, often with the best of intentions, can interfere with the authentication processes that many libraries and their vendors use. An exploration of firewalls, ad-blockers, pop-up blockers, Web accelerators, and similar software will examine the complications caused by popular programs in each category when users attempt remote access to library-provided information resources. Additional exploration will focus on similar complications experienced by users behind workplace firewalls. Discussion of each type of software will include minimally invasive remedies to recommend to users and suggestions for managing the technical support burden. Particular attention will focus on the interaction of firewalls and related software with popular remote access solutions such as EZproxy. Finally, analysis of this situation will include consideration of human factors, including suggested messages to convey to skeptical patrons and network administrators.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号