首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   37篇
  免费   5篇
  国内免费   2篇
  2022年   1篇
  2021年   3篇
  2020年   5篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   2篇
  2015年   1篇
  2014年   2篇
  2013年   15篇
  2012年   1篇
  2005年   1篇
  2004年   3篇
  2003年   1篇
  2000年   1篇
  1999年   3篇
  1998年   2篇
排序方式: 共有44条查询结果,搜索用时 15 毫秒
11.
Deploying cyber weapons to damage Industrial Control Systems (ICS) is relatively easy because such systems are insecure by design. Maintaining communication with an activated cyber weapon, and ensuring its persistence, is harder but feasible.  相似文献   
12.
基于LDO稳压器在电磁干扰(EMI)下产生直流偏移失效的机理分析,展开敏感度建模与仿真方法研究。使用一款实验芯片,创新地引入片上电压传感器,用于测试EMI在LDO稳压器内部的传播特性。在敏感度建模中,建立等效电路模型,通过直流功能测试,Z参数阻抗特性测试验证模型的正确性,将该模型用于LDO稳压器的敏感度预测。在敏感度仿真过程中,通过分析关键子电路和不断增加寄生元件,仿真不同寄生因素对敏感度影响的权重。将仿真结果与传导直接注入法(DPI)片上测试结果对比,仿真结果与DPI测试在频域1MHz至1GHz匹配。  相似文献   
13.
基于电磁涡旋的雷达目标成像   总被引:3,自引:0,他引:3       下载免费PDF全文
作为信息载体的电磁波除了传统的携带信息方式外,近年来其波前以电磁涡旋形式展现的信息调制能力也越来越受到关注。本文综述了电磁涡旋在信息调制等方面的研究进展,阐述了其在雷达信息获取方面的潜在应用价值。针对圆形相控阵列,建立了电磁涡旋波照射下理想点散射目标的回波模型。将各阵元的接收信号按照与发射时相同的模式移相后,沿圆周积分即可获得雷达阵列的输出回波。该回波可表示为经平方Bessel函数调幅后的傅里叶基函数的线性组合。结合Bessel函数的频谱特性,分析了轨道角动量态与方位角变量之间的近似对偶关系,利用逆投影和滤波-傅里叶变换方法进行了成像处理。仿真实验表明,电磁涡旋对雷达目标具有方位向成像的潜力。本文的研究可为新体制的雷达设计、目标识别技术的发展提供参考和借鉴。  相似文献   
14.
《防务技术》2020,16(4):753-761
A hypersonic aerodynamics analysis of an electromagnetic gun (EM gun) launched projectile configuration is undertaken in order to ameliorate the basic aerodynamic characteristics in comparison with the regular projectile layout. Static margin and pendulum motion analysis models have been applied to evaluate the flight stability of a new airframe configuration. With a steady state computational fluid dynamics (CFD) simulation, the basic density, pressure and velocity contours of the EM gun projectile flow field at Mach number 5.0, 6.0 and 7.0 (angle of attack = 0°) have been analyzed. Furthermore, the static margin values are enhanced dramatically for the EM gun projectile with configuration optimization. Drag, lift and pitch property variations are all illustrated with the changes of Mach number and angle of attack. A particle ballistic calculation was completed for the pendulum analysis. The results show that the configuration optimized projectile, launched from the EM gun at Mach number 5.0 to 7.0, acts in a much more stable way than the projectiles with regular aerodynamic layout.  相似文献   
15.
Uri Tor 《战略研究杂志》2017,40(1-2):92-117
This article suggests that there is a paradigm crisis in the sub-field of cyber deterrence. Cyber deterrence is evolving slowly and unpromisingly as a strategic tool in both theory and practice, mostly due to the ill-fitting theoretical framework and underlining assumptions it borrows from the absolute-nuclear-deterrence context. Therefore, this article suggests replacing the accepted yet inadequate paradigm of absolute deterrence with a better-fitting restrictive-cumulative-deterrence paradigm that draws on the Israeli approach to deterrence, introducing it into the cyber domain. The article further criticizes the current discourse in the field, including some ‘common knowledge’ (mis)understandings of cyberspace and the ways it affects the possibility of deterrence.  相似文献   
16.
This article argues that whereas the waves of democratization which enveloped the continent in the early 1990s following the collapse of Eastern European one-party socialism genera ted expectations of a ‘new dawn’ for ‘good governance’ and sustainable human development on the continent, one wave after another appears to have suffered serious setbacks. Indeed, a decade later, some of the most articulate pro-democracy leaders, who came into office on the crest of the democratic waves of the 1990s have sought to manipulate their countries' constitutions in order to perpetuate their presidential tenure. Such undemocratic behaviour will only fuel speculation in the industrialized world that the New Partnership for Africa's Development is just another decorative blue-print drawn up by beleaguered African despots in order to obtain new resource inflows at a time the international community under the hegemonic leadership of the Uni ted States will be wholly preoccupied with rebuilding post-Saddam Iraq and the Israeli-Palestinian roadmap.  相似文献   
17.
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.  相似文献   
18.
利用振动原理,研究、设计、制造微型电磁振动给料机(筛).设计了激磁铁芯、半波可控硅整流及控制电路.在对振动机械的隔振分析及优化设计理论的基础上,设计了整部机器的结构图纸,并制造了一部样机,给出了振动利用的一个范例.所研究制造的微型电磁振动机集机电为一体,在焊接、制药等诸多行业中具有广泛的应用价值.  相似文献   
19.
根据时域有限差分法(Finite Difference Time Domain, FDTD)的基本原理,本文首先分析了等离子体的物理场特性及数值计算,然后介绍了飞行器再入时等离子鞘的形成以及等离子体相对介电常数对波的衰减,最后通过三维FDTD和二维FDTD模拟了电磁波在等离子体中的传播情况,证明了FDTD方法是解决电磁波在复杂媒质中传播的一种有效方法,并探究了飞行器再入段黑障区通信的理论和方法。  相似文献   
20.
《防务技术》2014,10(3):316-320
An electromagnetic coupling mathematical model is established by finite element method and is verified by the contrastive experiments of copper matrix Ni–TiN cylindrical coating electrode, copper electrode and Cu50W electrode. The wear mechanism of Ni–TiN/Cu composite electrode in the case of high-frequency pulse current is studied, and the influence of the fluctuation frequency of discharge current on electrode wear in micro-EDM is found out. Compared with the electrode made from homogeneous material, the high frequency electromagnetic properties of Ni–TiN composite layer can be used effectively to inhibit the effect of high frequency pulse on the electrode and improve the distribution trend of current density.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号