首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35篇
  免费   17篇
  国内免费   1篇
  2020年   1篇
  2018年   2篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   2篇
  2013年   4篇
  2012年   2篇
  2011年   5篇
  2010年   2篇
  2009年   7篇
  2008年   3篇
  2007年   1篇
  2006年   3篇
  2005年   3篇
  2004年   2篇
  2003年   2篇
  2001年   2篇
  1999年   3篇
  1997年   1篇
  1990年   3篇
  1989年   2篇
排序方式: 共有53条查询结果,搜索用时 15 毫秒
31.
针对单元网格发生变形重构中新旧网格之间的数据插值问题,提出一种基于格点格式有限体积法的流场数据传递方法。利用非结构动网格技术,将旧网格单元移动到新网格单元,同时时间推进求解流场控制方程,获得移动后旧网格单元物理量,并将其赋给新网格单元,以此来实现两套网格间的信息传递。计算结果表明,该方法在信息传递过程中没有引入插值误差,理论上流场求解方法的精度就是信息传递精度,验证结果表明其显著优于二阶插值精度。  相似文献   
32.
In this article, the reliability and the mean residual life (MRL) functions of a system with active redundancies at the component and system levels are investigated. In active redundancy at the component level, the original and redundant components are working together and lifetime of the system is determined by the maximum of lifetime of the original components and their spares. In the active redundancy at the system level, the system has a spare, and the original and redundant systems work together. The lifetime of such a system is then the maximum of lifetimes of the system and its spare. The lifetimes of the original component and the spare are assumed to be dependent random variables. © 2017 Wiley Periodicals, Inc. Naval Research Logistics, 64: 19–28, 2017  相似文献   
33.
本文从战场态势一致性的影响因素出发,分析给出了动态目标一致性评估指标体系,并从作战需求和指标关系分析入手,采用效用函数和综合赋权相结合的方法对战场态势一致性进行了评估。经仿真验证该评估方法合理可行,对联合作战战场态势一致性的评估具有指导意义。  相似文献   
34.
The sectoral production function model of Feder (1983) has been widely used to examine the link between defence spending and economic growth. In this paper, the model, for which too much has been claimed in some past work, is examined, and the case is made for using growth in real non‐defence output rather than growth in real aggregate output (inclusive of military spending) as the dependent variable. Attention is restricted to a small group of OECD countries for which reliable labour force and capital stock (as well as defence) data are obtainable. With non‐defence output as the dependent variable and using only high quality data, no evidence in favour of the underconsumptionist (as opposed to the defence as a burden) position is found.  相似文献   
35.
Abstract

In spite of government counter-terrorism expenditure and efforts, the incidence of terrorism in Nigeria appears to be rising. This paper examines the growth and fiscal consequences of terrorism in Nigeria by estimating the terrorism–macroeconomy relation using different measures of terror incidence. The results show that terrorism has an economically and statistically significant negative impact on growth; although this impact is considerably small and short-lived, manifesting only after a lag of about three years. Specifically, the cost of terrorism to Nigeria, in terms of lost GDP per annum, is estimated at 0.82%. Moreover, there is evidence that terrorism leads to the reallocation of economic activity away from private investment spending to government spending; that is, terrorism crowds out investment at a higher rate than its potential to crowd in government spending. Lastly, terrorism alters the composition of government expenditure – with the defence component of government expenditure rising vis-a-vis other expenditure items. The results are robust to allowing for dynamic interactions between terrorism and macroeconomic aggregates.  相似文献   
36.
近年来,随着市场经济的不断发展,个体、私营经济因其投资少、成本低、规模小、工艺简单而逐渐成为政府鼓励和支持的经济类型,但它所带来的"三合一"建筑因形式的变化产生新的消防安全隐患,已经成为当前群死群伤恶性火灾的"重灾区"。就"三合一"建筑存在的新的消防安全问题及整治难点为内容进行分析,并提出几点对策。  相似文献   
37.
基于国家审计本质的“免疫系统论”,武警审计应充分体现其对武警部队经济活动运行的“免疫”功能。因此,需要拓展和重新定位武警审计职能,将预防职能作为武警审计的基本职能,并积极研究和探索“免疫系统论”下武警审计预防职能有效履行的途径。  相似文献   
38.
关于亚纯函数微分多项式的值分布   总被引:2,自引:1,他引:1  
运用Nevanlinna的亚纯函数理论方法,研究了亚纯函数微分多项式的值的分布理论,获得了若f(z)是超越亚纯函数,ψ是关于f的微分多项式,满足条件N(r,f) N(r,1/f)=S(r,f),关于ψ零点的几个结果,改进并推广了Yang C C和仪洪勋等人的有关结果.  相似文献   
39.
文中描述了任意三角域上插值逼近的两种方法,一种是布尔和插值,一种是凸组合插值,其特点是结构简单,易于计算。文中证明了三角网格区域上的整个插值曲面是c~1连续的,并指出离散化的插值曲面函数是空间散乱数据的一种光滑插值算法。  相似文献   
40.
布尔置换在密码体制中有着非常重要的应用。在分组密码的设计中需要用到高阶的布尔置换。论述了一种通过组合一些低阶布尔置换来构造高阶布尔置换的方法,给出了一个例子。所得结论对布尔置换的构造具有一定的意义。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号