全文获取类型
收费全文 | 73篇 |
免费 | 27篇 |
出版年
2023年 | 4篇 |
2022年 | 2篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 4篇 |
2016年 | 5篇 |
2015年 | 3篇 |
2014年 | 5篇 |
2013年 | 5篇 |
2012年 | 4篇 |
2011年 | 5篇 |
2010年 | 5篇 |
2009年 | 3篇 |
2008年 | 5篇 |
2007年 | 10篇 |
2006年 | 3篇 |
2005年 | 8篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 3篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有100条查询结果,搜索用时 15 毫秒
11.
本文通过实验提出了一种双相钢制绳线材的热处理工艺程序,即:奥氏体化及水淬以获得全部马氏体组织→临界间加热淬火以获双相组织并回火→酸洗磷化后多道次连续冷拔至终尺寸→人工时效。按此程序生产的线材σ_b 可达1800MPa 以上,且扭转、弯曲疲劳性能超过标准规定值。 相似文献
12.
两点源干扰是干扰被动雷达导引头 (PRS)的有效手段。但在实际应用中 ,两点源的功率不可能完全相等 ,这就为PRS对抗两点源的干扰提供了契机。通过理论分析和仿真实验证明 ,当两点源偏离导引头的电轴方向不大的情况下 ,只要保证足够的积累点数 ,导引头进行数据积累取均值 ,其结果并不指向两源的“重心”或“质心”而是指向两源中功率较大者 ,并给出了确定积累点数的解析表达式 相似文献
13.
徐培德 《国防科技大学学报》1993,15(2):105-110
本文讨论了变量有界的线性目标规划问题,给出了求解这类问题的一个对偶算法,此方法与变量有界线性规划问题的对偶算法相类似。文中证明了算法的有效性,并举例说明了计算过程。 相似文献
14.
A method is presented to locate and allocate p new facilities in relation to n existing facilities. Each of the n existing facilities has a requirement flow which must be supplied by the new facilities. Rectangular distances are assumed to exist between all facilities. The algorithm proceeds in two stages. In the first stage a set of all possible optimal new facility locations is determined by a set reduction algorithm. The resultant problem is shown to be equivalent to finding the p-median of a weighted connected graph. In the second stage the optimal locations and allocations are obtained by using a technique for solving the p-median problem. 相似文献
15.
王爱平 《中国人民武装警察部队学院学报》2007,23(8):23-25
随着高层民用建筑的不断增多,其消防安全问题受到社会各界广泛关注。从消防安全隐患的产生、消防管理、建筑地下部分的火灾危害、消防部队装备几个方面分析了高层民用建筑的消防安全隐患。从把好建筑设计、审核、验收关,强化消防安全管理,强化消防宣传教育,加强消防产品与消防工程施工的监管,完善灭火救援体系等方面提出了提高高层民用建筑消防安全的对策。 相似文献
16.
针对建筑中防火分区常见问题及可能的危害,分析其形成的原因,从规范修订、加强对设计人员培训、正确选用防火分隔方法、监督管理和技术措施等方面提出解决问题的对策。 相似文献
17.
Erin D. Dumbacher 《The Nonproliferation Review》2013,20(3-4):203-222
ABSTRACTAn arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed. 相似文献
18.
Nicholas G. Evans 《The Nonproliferation Review》2013,20(3-4):351-366
ABSTRACTScience and technology (S&T) review is key to anticipating developments in the life sciences that may benefit or run contrary to the aims of the 1972 Biological and Toxin Weapons Convention. It serves as a mechanism for both preparing against novel biological threats and identifying the best opportunities for developing and sharing the life sciences to the fullest extent. In the age of rapidly advancing biotechnology, S&T review needs to be wide ranging, involve a diverse set of inputs, and be transparent about its methods and data. This viewpoint considers four models of S&T review and their capacity to respond to the challenge of the life sciences: standing advisory boards; ad hoc working groups; peer review; and wikis. It then identifies a hybrid model that is suitably broad, diverse, and transparent. 相似文献
19.
This article proposes two dual‐ascent algorithms and uses each in combination with a primal drop heuristic embedded within a branch and bound framework to solve the uncapacitated production assembly distribution system (i.e., supply chain) design problem, which is formulated as a mixed integer program. Computational results indicate that one approach, which combines primal drop and dual‐ascent heuristics, can solve instances within reasonable time and prescribes solutions with gaps between the primal and dual solution values that are less than 0.15%, an efficacy suiting it for actual large‐scale applications. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
20.