排序方式: 共有125条查询结果,搜索用时 15 毫秒
21.
采用以黎曼解描述粒子间相互作用的接触算法,模拟一维情况下包含间断的流场。在弱间断的条件下,采用弱波近似的黎曼解来描述粒子间的相互作用;在强间断的条件下,则引入非迭代黎曼解来描述粒子间的相互作用。并引入Taylor展开思想,提高了接触算法在自由边界的计算精度。该算法无需引入人为粘性,程序结构简洁。数值计算表明,改进后的接触算法能很好地描述强间断,并有效改善了原始接触算法在自由面的计算缺陷。 相似文献
22.
Governments are increasingly recognizing the problem posed by internally weak nuclear-capable states. The problem, however, is under-theorized. This article brings together literature on sovereignty and international order, the nonproliferation regime, and weak states, and introduces new concepts to provide a more structured understanding of this problem. Insight comes from focusing attention on the function and governance of two nuclear estates (termed the production and operational estates), and on their resilience to decay and disorder occurring within the state and society. Drawing on empirical observation, the authors suggest a typology of weakness in nuclear states, involving state fragmentation typified by the former Soviet Union, the “hard weak state” typified by North Korea, and the internally conflicted state typified by Pakistan. Although these types give rise to distinctive difficulties, their alleviation depends heavily on the maintenance of internal authority within the state and estates, the presence or absence of cooperative relations, and the international regulatory framework's vitality. 相似文献
23.
针对快速部署机场指挥决策问题,分析了美军指挥决策技术发展现状,重点研究了快速部署机场指挥决策需要的态势感知、决策模型设计与优化、知识表示与存储、案例推理、综合业务信息查询、任务流程规划、模拟推演与效能评估、行动监视与动态干预、软硬件系统综合集成等9项关键技术及其相互之间的关系,指出任务规划是指挥决策过程的核心任务。最后分析了模型设计、案例推理、推演评估、3S技术等四个方面存在的主要技术应用难点。 相似文献
24.
25.
分析了采用秘密密钥和公开密钥的数字签名技术的不足,提出了相应的改进方案,从而可实现数字签名的各种功能,最后提出一种更为安全的多方数字签名方案。 相似文献
26.
在利用随机共振检测微弱周期信号的基本原理基础上,给出一种通过外加可控信号激励出随机共振现象,并将之应用于微弱信号检测的方法。采用仿真信号对该方法进行了验证,通过归一化尺度变换,将该方法的适用频率扩展到机械系统特征信号频段。结果表明,该方法简单可行,能把信噪比较低的周期信号从强背景噪声中提取出来,在机械故障检测中具有应用前景。 相似文献
27.
28.
Michael C. Fu 《海军后勤学研究》2008,55(8):723-736
Derivatives (or gradients) are important for both sensitivity analysis and optimization, and in simulation models, these can often be estimated efficiently using various methods other than brute‐force finite differences. This article briefly summarizes the main approaches and discusses areas in which the approaches can most fruitfully be applied: queueing, inventory, and finance. In finance, the focus is on derivatives of another sort. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
29.
针对C~3I 系统对分布式计算机网络数据加密的特定需求,重点对网络加密方式、密码装置、软件编程设计等核心问题进行了研究。可对数据加密总体设计与软件概要设计提供参考。 相似文献
30.