首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   40篇
  免费   18篇
  国内免费   2篇
  2021年   3篇
  2020年   2篇
  2019年   2篇
  2018年   1篇
  2017年   7篇
  2016年   4篇
  2015年   4篇
  2014年   3篇
  2013年   3篇
  2012年   2篇
  2011年   2篇
  2010年   4篇
  2009年   7篇
  2008年   2篇
  2007年   3篇
  2006年   2篇
  2005年   5篇
  2003年   2篇
  2002年   1篇
  1998年   1篇
排序方式: 共有60条查询结果,搜索用时 29 毫秒
41.
Particulate composites are one of the widely used materials in producing numerous state-of-the-art components in biomedical, automobile, aerospace including defence technology. Variety of modelling techniques have been adopted in the past to model mechanical behaviour of particulate composites. Due to their favourable properties, particle-based methods provide a convenient platform to model failure or fracture of these composites. Smooth particle hydrodynamics (SPH) is one of such methods which demonstrate excellent potential for modelling failure or fracture of particulate composites in a Lagrangian setting. One of the major challenges in using SPH method for modelling composite materials depends on accurate and efficient way to treat interface and boundary conditions. In this paper, a master-slave method based multi-freedom constraints is proposed to impose essential boundary conditions and interfacial displacement constraints in modelling mechanical behaviour of composite materials using SPH method. The proposed methodology enforces the above constraints more accurately and requires only smaller condition number for system stiffness matrix than the procedures based on typical penalty function approach. A minimum cut-off value-based error criteria is employed to improve the compu-tational efficiency of the proposed methodology. In addition, the proposed method is further enhanced by adopting a modified numerical interpolation scheme along the boundary to increase the accuracy and computational efficiency. The numerical examples demonstrate that the proposed master-slave approach yields better accuracy in enforcing displacement constraints and requires approximately the same computational time as that of penalty method.  相似文献   
42.
We consider the problem of determining the capacity to assign to each arc in a given network, subject to uncertainty in the supply and/or demand of each node. This design problem underlies many real‐world applications, such as the design of power transmission and telecommunications networks. We first consider the case where a set of supply/demand scenarios are provided, and we must determine the minimum‐cost set of arc capacities such that a feasible flow exists for each scenario. We briefly review existing theoretical approaches to solving this problem and explore implementation strategies to reduce run times. With this as a foundation, our primary focus is on a chance‐constrained version of the problem in which α% of the scenarios must be feasible under the chosen capacity, where α is a user‐defined parameter and the specific scenarios to be satisfied are not predetermined. We describe an algorithm which utilizes a separation routine for identifying violated cut‐sets which can solve the problem to optimality, and we present computational results. We also present a novel greedy algorithm, our primary contribution, which can be used to solve for a high quality heuristic solution. We present computational analysis to evaluate the performance of our proposed approaches. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 236–246, 2016  相似文献   
43.
The accelerated degradation test (ADT) is an efficient tool for assessing the lifetime information of highly reliable products. However, conducting an ADT is very expensive. Therefore, how to conduct a cost-constrained ADT plan is a great challenging issue for reliability analysts. By taking the experimental cost into consideration, this paper proposes a semi-analytical procedure to determine the total sample size, testing stress levels, the measurement frequencies, and the number of measurements (within a degradation path) globally under a class of exponential dispersion degradation models. The proposed method is also extended to determine the global planning of a three-level compromise plan. The advantage of the proposed method not only provides better design insights for conducting an ADT plan, but also provides an efficient algorithm to obtain a cost-constrained ADT plan, compared with conventional optimal plans by grid search algorithms.  相似文献   
44.
汶川地震灾后重建住房规划环境制约因素及对策   总被引:1,自引:0,他引:1  
汶川特大地震发生,四川省共有153个县(市、区)不同程度受灾,全省灾区需完成城乡住房重建49131.22万m^2(445.4万套),重建城乡住房规划受到资源、环境的制约。通过对其制约因素分析,提出了对环境保护、资源保护有针对性的措施和对策,并对住房选址和建设生态人居环境提出了建议,有利于灾后重建城乡住房规划向建设生态人居环境方向发展。  相似文献   
45.
This study examines whether the exclusion of ethnic groups from political power is an important contributing factor to domestic terrorism. To empirically test this question, we employ a negative binomial regression estimation on 130 countries during the period from 1981 to 2005. We find that countries in which certain ethnic populations are excluded from political power are significantly more likely to experience domestic terrorist attacks and to suffer from terrorist casualties; furthermore, ethnic group political exclusion is a more consistent and substantive predictor of domestic terrorist activity than general political repression or economic discrimination.  相似文献   
46.
This papers deals with the classical resource‐constrained project scheduling problem (RCPSP). There, the activities of a project have to be scheduled subject to precedence and resource constraints. The objective is to minimize the makespan of the project. We propose a new heuristic called self‐adapting genetic algorithm to solve the RCPSP. The heuristic employs the well‐known activity list representation and considers two different decoding procedures. An additional gene in the representation determines which of the two decoding procedures is actually used to compute a schedule for an individual. This allows the genetic algorithm to adapt itself to the problem instance actually solved. That is, the genetic algorithm learns which of the alternative decoding procedures is the more successful one for this instance. In other words, not only the solution for the problem, but also the algorithm itself is subject to genetic optimization. Computational experiments show that the mechanism of self‐adaptation is capable to exploit the benefits of both decoding procedures. Moreover, the tests show that the proposed heuristic is among the best ones currently available for the RCPSP. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 433–448, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10029  相似文献   
47.
What you should know about the vehicle routing problem   总被引:1,自引:0,他引:1  
In the Vehicle Routing Problem (VRP), the aim is to design a set of m minimum cost vehicle routes through n customer locations, so that each route starts and ends at a common location and some side constraints are satisfied. Common applications arise in newspaper and food delivery, and in milk collection. This article summarizes the main known results for the classical VRP in which only vehicle capacity constraints are present. The article is structured around three main headings: exact algorithms, classical heuristics, and metaheuristics. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
48.
如何根据应急航天任务,在满足各种约束的前提下,从型号众多、能力各异的卫星平台及有效载荷中快速决策效费比最佳的卫星构造方案引起了越来越多的关注,这就是适应任务的模块化卫星快速构建优化决策问题。在深入分析该问题特点的基础上,建立优化决策数学模型,提出基于遗传算法的优化决策方法,为处理遗传算法迭代过程中产生的不可行解引入基于罚函数法的约束处理方法。针对罚函数法中惩罚系数难于确定的特点,设计惩罚系数自适应调整的动态罚函数机制。定量化实验及分析结果表明:该方法能有效解决适应任务的模块化卫星快速构建优化决策问题。  相似文献   
49.
Data envelopment analysis (DEA) is a methodology for evaluating the relative efficiencies of peer decision‐making units (DMUs), in a multiple input/output setting. Although it is generally assumed that all outputs are impacted by all inputs, there are many situations where this may not be the case. This article extends the conventional DEA methodology to allow for the measurement of technical efficiency in situations where only partial input‐to‐output impacts exist. The new methodology involves viewing the DMU as a business unit, consisting of a set of mutually exclusive subunits, each of which can be treated in the conventional DEA sense. A further consideration involves the imposition of constraints in the form of assurance regions (AR) on pairs of multipliers. These AR constraints often arise at the level of the subunit, and as a result, there can be multiple and often inconsistent AR constraints on any given variable pair. We present a methodology for resolving such inconsistencies. To demonstrate the overall methodology, we apply it to the problem of evaluating the efficiencies of a set of steel fabrication plants. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
50.
Recent supply‐chain models that study competition among capacity‐constrained producers omit the possibility of producers strategically setting wholesale prices to create uncertainty with regards to (i.e., to obfuscate) their production capacities. To shed some light on this possibility, we study strategic obfuscation in a supply‐chain model comprised of two competing producers and a retailer, where one of the producers faces a privately‐known capacity constraint. We show that capacity obfuscation can strictly increase the obfuscating producer's profit, therefore, presenting a clear incentive for such practices. Moreover, we identify conditions under which both producers' profits increase. In effect, obfuscation enables producers to tacitly collude and charge higher wholesale prices by moderating competition between producers. The retailer, in contrast, suffers a loss in profit, raises retail prices, while overall channel profits decrease. We show that the extent of capacity obfuscation is limited by its cost and by a strategic retailer's incentive to facilitate a deterrence. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 244–267, 2014  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号