排序方式: 共有78条查询结果,搜索用时 15 毫秒
51.
本文分析了微波非线性电路在多频激励下的频域稳态响应,给出了同伦连续这一简单有效的算法,结合实际计算了实例。 相似文献
52.
王月英 《海军工程大学学报》1995,(1)
本文通过对“交际法”的理论进行深入细致的研究以及将“交际法”应用于大学英语教学的实践,提出“交际法”应用于大学英语教学不仅是行之可能,而且是势在必行的见解,同时阐明了实行“交际法”的必要条件和步骤。 相似文献
53.
本文在 Donoho 提出的从噪声中恢复信号的非线性小波方法的基本原理的基础上, 并针对非线性小波方法的核心问题——浮动阈值的设定提出了新的算法。通过算例证明, 所设计的浮动阈值在实际应用中效果较好, 特别在低信噪比时信号恢复效果明显优于现常用的浮动阈值设计方法。 相似文献
54.
针对所给出的有交易费的资产模型,引入了资产折算函数,并利用辅助鞅和凸函数对偶方法,讨论了该模型下折算资产优化的性质. 相似文献
55.
恒定应力加速寿命试验的非参数统计方法 总被引:1,自引:0,他引:1
张志华 《海军工程大学学报》2001,13(2):12-16
在恒定应力加速寿命试验 (简称恒加试验 )的统计分析中 ,非参数统计方法具有一定的实际价值 .在一定的假定下 ,文中给出了两种新估计 ,并证明了它们的优良性 相似文献
56.
王英 《兵团教育学院学报》2008,18(1):62-65
传统教学以学生被动接受,死记课本知识,教师为课堂主宰,教学单向流动,学生个性受到严重压抑为特点。建构主义摒弃了这些传统教学方式,强调学生是知识意义的主动建构者,学生是教学的主体,教师是学生知识建构的组织者、参与者、帮助者,学生的背景知识受到重视,学生的个性得到充分的尊重,师生、生生的交流互动是教学中重要环节。在建构主义理论指导下的写作教学体现了平等、互动、创新的特质。 相似文献
57.
Gjorgji Veljovski Nenad Taneski Metodija Dojchinovski 《Defense & Security Analysis》2017,33(4):292-307
The term “hybrid warfare” is a new one that the West began to use to explain its failure to cope with asymmetric threats. Focusing on the war on global terrorism, the West temporarily withdrew its attention from traditional adversaries, such as Russia, which has used this gap and has audaciously returned to the stage as a global actor. Until the Russian annexation of the Crimean Peninsula in 2014 and inflaming the Ukrainian crisis, most Western authors attributed “hybrid threats” mostly to non-state actors. But the Ukrainian scenario showed the true face of “hybridity” in the modern battlefield when practised by a powerful state actor. Russian “hybrid warfare” in Ukraine has already been seen as a combination of conventional and unconventional methods, that have been complemented with other instruments of national power – diplomatic, economic and information. The purpose of this article is, through an analysis of the Ukrainian scenario, to demonstrate that although the term “hybrid” is new, the concept itself is old and is a continuation of already seen doctrine from the Cold War era. Although “hybrid threats” can come both from state and non-state actors, the Russian interference in Ukraine is proof that they are especially dangerous for the West if, or when, they are initiated from a traditional, sophisticated adversary that has the capacity to use all forms of warfare. 相似文献
58.
Jaïr van der Lijn 《Small Wars & Insurgencies》2013,24(1):72-89
Since 2000, international organisations such as the UN, NATO and the EU, but also countries, have started to apply what has been called the comprehensive approach to crisis management. This article unpacks this comprehensive approach implemented by the Dutch in Uruzgan province, Afghanistan. It first borrows and expands a conceptual framework developed by De Coning and Friis. Subsequently, it maps the different sorts of coherence in the mission by applying the framework. It shows how in practice there was not one single comprehensive approach, but many different forms of interaction between a number of organisational units. Each interaction had its own distinct issues and its own level of coherence. The level of coherence differed depending on the level at which the interaction took place – strategic at headquarters level versus operational at field level – and at what point in the mission it happened – in most cases it moved towards more cohesion. 相似文献
59.
复杂系统的安全风险涉及面广、影响因素多,因此需要系统的、可操作的方法来指导安全风险的评价过程。在系统的各类安全风险中,故障安全风险是由各种故障导致系统发生事故的风险,是最常见的系统安全问题,因此针对复杂系统的故障安全风险评价开展研究。复杂系统故障安全风险评价需要明确的评价参数和评价方法的支持,为此提出了复杂系统故障安全风险评价的流程、分层次的评价参数体系及评价方法,并通过示例来具体说明故障安全风险的评价过程,为解决复杂系统的故障安全风险评价问题提出了可行的思路。 相似文献
60.