首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
本文通过总结近一、二十年来K/T界线的研究进展和恐龙绝灭的相关假说,认为前人在K/T界线和恐龙灭绝的研究方面确实取得了很大的成果,但同时,大多数的研究都是集中在对灾变大环境的求证上。只有少数学者注意到Co、Cr、Ni、Mn、V等这些在界线处变化较大的元素同时也是生物必需微量元素,而另外一些异常元素(如REE、Pb、Sr等)也可能对生物的正常生理机能产生重要影响,这些元素的异常变化很可能与恐龙灭绝存在着一定的关系,但这方面的系统研究还相当缺乏,今后应加强元素的生物机能和与生命活动密切相关的元素在K/T界线附近的演化与恐龙灭绝的关系等方面的研究。  相似文献   

2.
四川省牦牛坪稀土矿床是中国第二大原生轻稀土矿床 ,萤石是矿区主要脉石矿物之一 ,碳酸岩和正长岩在空间和时间上与稀土成矿存在密切联系 .在过去萤石和碳酸岩 -正长岩杂岩体地球化学研究的基础上 ,评述了稀土成矿流体与碳酸岩 正长岩杂岩体的成因联系 .矿区碳酸岩和正长岩具有相似的REE配分模式、( 87Sr 86Sr)0 ,( 14 3 Nd 14 4 Nd)0 ,2 0 6Pb 2 0 4Pb ,2 0 8Pb 2 0 4Pb同位素比值 ,位于地幔端元EM1和EM2之间 ,它们是造山环境的产物 .与稀土矿化共生的萤石显示不同的稀土配分模式 ,但是它们具有一致的Sr、Nd、Pb同位素比值 ,与碳酸岩和正长岩相似 .这些表明不同稀土特征的萤石来自相同的源区 ,稀土成矿流体与碳酸岩和正长岩岩浆存在密切联系 .  相似文献   

3.
4.
非线性计算不稳定问题的进一步研究   总被引:1,自引:3,他引:1  
讨论了有关非线性计算不稳定的若干问题,其主要内容有(1)考察了有代表性的三类发展方程,指出其对应的差分格式是否出现非线性计算不稳定,与原微分方程解的性质密切相关;(2)进一步讨论了带周期边条件的守恒型差分格式的非线性计算稳定性问题,总结了克服非线性不稳定的有效措施;(3)以非线性平流方程为例,着重分析了带非周期边条件的非守恒差分格式的非线性计算稳定性问题,给出了判别其计算稳定性的"综合分析判别法".  相似文献   

5.
郝秀丽 《科教文汇》2013,(26):128-129
泥塑课教学中引入陶艺手工成型技法,学生既可以借此熟悉掌握泥料的性质与特点,同时也了解了陶艺的一部分知识与技法,为今后较难的泥塑课教学奠定厚实的基础。本文就此将对泥塑课教学最初阶段可以应用的陶艺相关技法做一整理和介绍。  相似文献   

6.
湿位涡物质的保守性原理及其应用   总被引:2,自引:0,他引:2  
论证了湿位涡物质的保守性,阐明强降水会造成湿位涡物质异常,异常高度主要出现在850~500 hPa之间。用NCEP/NCAR 11的分析资料对1999年6月下旬引起长江流域暴雨的对流系统进行了湿位涡物质的诊断分析,结果表明梅雨期间大气的湿位涡物质异常区域与降水带的位置和走向基本对应,主要位于梅雨锋及其南侧,与等 线的走向保持一致。依据湿位涡物质的保守性原理,等压面上等 线间的湿位涡物质异常区的移动示踪了暴雨区的移动,这可为暴雨预报提供一定的动力依据。  相似文献   

7.
在地震波数值模拟过程中,采用高阶交错网格有限差分法可以有效地压制频散,提高模拟精度。本文推导了三维一阶声波方程的空间任意偶数阶有限差分格式,并利用完全匹配边界条件对三维地质模型边界进行处理。数值模拟结果表明,该方法可以有效地吸收人为边界反射,不产生任何边界反射,取得了良好的吸收效果。  相似文献   

8.
王哲 《科技广场》2012,(7):155-157
LaBr3晶体闪烁探测器(<3%在662keV)比NaI探测器具有更高的能量分辨率,但自身放射性元素对低能谱探测有影响。随着LaBr3晶体尺寸的不断增大,LaBr3:Ce3+探测器比NaI探测器能够分辨更多的峰,探测时间更短。本文利用MCNP程序模拟对γ测井模型中铀系天然放射性核素探测,并用Origin软件对探测器测得能谱峰康比进行分析。  相似文献   

9.
红壤对稀土元素的吸附与解吸特性研究   总被引:1,自引:0,他引:1  
杨元根  袁可能 《科技通报》1998,14(3):203-208
对不同母质来源的红壤样品和粘粒矿物进行了稀土元素吸附、解吸和吸附动力学实验,并进行了三种吸附模式和六种吸附动力学模式的数学拟合⒚结果表明,测试样品对稀土元素的吸附过程可用 Langm uir 吸附方程和 Langm uir 吸附动力学方程来描述⒚  相似文献   

10.
以元分析技术为手段,探讨组织认同与非任务绩效间的关系问题,分析相关边界条件的调节效应。研究样本来源于97项国内外研究的108个独立样本(n=35344),且符合元分析标准。结果发现,整体上组织认同与非任务绩效呈中等程度相关关系(r=0.68);基于员工个人特质因素,两者关系强度在性别、任职年限及学历上会呈现细微差别;而在行业、文化背景条件下,差异较大,服务行业员工、中国情境下关系较强。此结果提供了量化的组织认同与非任务绩效的关系估计,研究为今后相关领域的学术研究提供了方向,在提升组织竞争软实力方面具有实践意义。  相似文献   

11.
In the present paper, we study stochastic boundary control problems where the system dynamics is a controlled stochastic parabolic equation with Neumann boundary control and boundary noise. Under some assumptions, the continuity and differentiability of the value function are proved. We also define a new type of Hamilton–Jacobi–Bellman (HJB) equation and prove that the value function is a viscosity solution of this HJB equation.  相似文献   

12.
Semi-supervised anomaly detection methods leverage a few anomaly examples to yield drastically improved performance compared to unsupervised models. However, they still suffer from two limitations: 1) unlabeled anomalies (i.e., anomaly contamination) may mislead the learning process when all the unlabeled data are employed as inliers for model training; 2) only discrete supervision information (such as binary or ordinal data labels) is exploited, which leads to suboptimal learning of anomaly scores that essentially take on a continuous distribution. Therefore, this paper proposes a novel semi-supervised anomaly detection method, which devises contamination-resilient continuous supervisory signals. Specifically, we propose a mass interpolation method to diffuse the abnormality of labeled anomalies, thereby creating new data samples labeled with continuous abnormal degrees. Meanwhile, the contaminated area can be covered by new data samples generated via combinations of data with correct labels. A feature learning-based objective is added to serve as an optimization constraint to regularize the network and further enhance the robustness w.r.t. anomaly contamination. Extensive experiments on 11 real-world datasets show that our approach significantly outperforms state-of-the-art competitors by 20%–30% in AUC-PR and obtains more robust and superior performance in settings with different anomaly contamination levels and varying numbers of labeled anomalies.  相似文献   

13.
人牙及骨组织中稀土分布状态的研究   总被引:1,自引:0,他引:1  
程发良  钟广涛 《科技通报》1994,10(6):380-382
测定了人体骨胳、牙齿中的稀土含量,考察了牙齿作为研究人体稀土代谢状况样品的可行性,研究了微量稀土元素在人牙、骨中的分布状态,提出了稀土在人体不同部位骨胳中分布的可能机制。  相似文献   

14.
采用溶胶-凝胶法制备稀土元素(La3+、Ce3+)掺杂TiO2光催化剂,利用XRD、SEM、EDS、IR 进行表征,并以亚甲基蓝为光降解反应对象,进行光催化降解实验,考察了掺杂稀土元素对TiO2光催化性能的影响。结果表明:La3+和Ce3+掺杂TiO2使得光催化剂的活性提高;煅烧温度为400℃时,掺杂La3+和Ce3+的TiO2光催化活性分别最佳,最佳掺杂量分别为1.0%和1.5%;0.5h光照后,二者降解率均达到90%以上。  相似文献   

15.
Most of the existing large-scale high-dimensional streaming anomaly detection methods suffer from extremely high time and space complexity. Moreover, these models are very sensitive to parameters,make their generalization ability very low, can also be merely applied to very few specific application scenarios. This paper proposes a three-layer structure high-dimensional streaming anomaly detection model, which is called the double locality sensitive hashing Bloom filter, namely dLSHBF. We first build the former two layers that is double locality sensitive hashing (dLSH), proving that the dLSH method reduces the hash coding length of the data, and it ensures that the projected data still has a favorable mapping distance-preserving property after projection. Second, we use a Bloom filter to build the third layer of dLSHBF model, which used to improve the efficiency of anomaly detection. Six large-scale high-dimensional data stream datasets in different IIoT anomaly detection domains were selected for comparison experiments. First, extensive experiments show that the distance-preserving performance of the former dLSH algorithm proposed in this paper is significantly better than the existing LSH algorithms. Second, we verify the dLSHBF model more efficient than the other existing advanced Bloom filter model (for example Robust Bloom Filter, Fly Bloom Filter, Sandwich Learned Bloom Filter, Adaptive Learned Bloom Filters). Compared with the state of the art, dLSHBF can perform with the detection rate (DR) and false alarm rate (FAR) of anomaly detection more than 97%, and less than 2.2% respectively. Its effectiveness and generalization ability outperform other existing streaming anomaly detection methods.  相似文献   

16.
A control system of an ODE and a diffusion PDE is discussed in this paper. The novelty lies in that the system is coupled. The method of PDE backstepping as well as some special skills is resorted in stabilizing the coupled PDE–ODE control system, which is transformed into an exponentially stable PDE–ODE cascade with an invertible integral transformation. And a state feedback boundary controller is designed. Moreover, an exponentially convergent observer for anti-collocated setup is proposed, and the output feedback boundary control problem is solved. For both the state and output feedback boundary controllers, exponential stability analyses in the sense of the corresponding norms for the resulting closed-loop systems are given through rigid proofs.  相似文献   

17.
王秀红 《资源科学》1997,19(5):71-77
本文用数学模式研究了青藏高原高寒草甸上下分布特征。认为其上限分布规律较强,下限分布规律较弱;向高原西北部,其上下限分布趋势面的相交曲线即高寒草甸可能的消失界限;高原西北部高寒草甸的消失主要是高原寒旱化气候条件的增强,使高寒草甸分布下限逐步上升所造成的。  相似文献   

18.
探讨了技术创新全球化趋势及其对国家创新系统边界的影响问题,指出技术创新全球化可能导致国家创新系统边界扩张或者收缩,但不会使系统边界消失.同时提出了如何诈确看待和应对国家创新系统边界改变的对策.  相似文献   

19.
2003年梅雨期湿位涡异常诊断分析   总被引:6,自引:0,他引:6  
利用 的NCEP/NCAR格点分析资料和中国区域站点观测降水资料,在分析2003年江淮流域梅雨期降水及大尺度环流特征的基础上,利用包含降水质量强迫效应的湿位涡方程,阐明在暴雨系统中引起的强降水会造成湿位涡异常。对2003年引起江淮流域暴雨的对流系统进行的湿位涡诊断分析表明,对流层中低层的湿位涡异常区与降水区域有很好的对应关系,可利用湿位涡的异常分布预测降水未来可能的分布形势和走向。  相似文献   

20.
We examine the incident known as “Climategate” in which emails and other documents relating to climate scientists and their work were illegitimately accessed and posted to the Internet. The contents of the files prompted questions about the credibility of climate science and the legitimacy of some of the climate scientists’ practices. Multiple investigations unfolded to repair the boundary that had been breached. While exonerating the scientists of wrongdoing and endorsing the legitimacy of the consensus opinion, the investigating committees suggested revisions to some scientific practices. Despite this boundary repair work, the credibility and legitimacy of the scientific enterprise were not fully restored in the eyes of several stakeholders. We explore why this is the case, identify boundary bridging approaches to address these issues, and highlight policy implications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号