排序方式: 共有58条查询结果,搜索用时 15 毫秒
11.
为迅速、准确、合理地确定切削加工的工艺参数 ,将有限元方法、人工神经网络和遗传算法运用于计算机辅助加工工件变形分析中。通过合理的系统设计 ,实现了对工件切削加工变形量的准确预报和对加工参数的正确优化。实际生产证明 ,采用本方法优化确定加工参数 ,达到了预期的迅速、准确、合理的目标 ,有效地降低生产成本 ,提高生产率 相似文献
12.
Andrew M. Francis 《Defence and Peace Economics》2013,24(5):395-411
This paper explores the relationship between human capital and international conflict. In theory, human capital may increase the opportunity cost of military service and the economic cost of injury and loss of life in combat; it may decrease the benefits of conflict as human capital cannot be easily appropriated or transferred; it may affect societal norms toward peace and war; and it may alter military productivity through new technology and complementarities between military technology and personnel. Using a panel of politically relevant dyads, I find robust empirical evidence that human capital may significantly decrease the likelihood of militarized conflict between nations. In short, the findings suggest that promoting human capital‐oriented development may help to increase peace in the world. 相似文献
13.
J. M. Quinn 《Defence and Peace Economics》2013,24(5):536-554
This study models the structural sources of variation in the use of selective (discriminate) repression within 89 civil wars fought between 1981 and 2005. The severity of repressive violence is modeled as a function of the amount of territory being contested by the insurgents. This idea is operationalized using measures of the location, size, and density of insurgency violence. The analysis finds evidence that the repressive behavior of both governments and rebel groups is linked to conflict geography. Governments violate physical integrity rights more frequently and kill more civilians the greater the overall amount of territory under contestation. Rebels kill more civilians in highly dispersed insurgencies that lack a clear epicenter. 相似文献
14.
15.
Gary McGraw 《战略研究杂志》2013,36(1):109-119
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage. 相似文献
16.
Paul Schuurman 《战略研究杂志》2013,36(6-7):926-948
This article presents a new model for the development of Carl von Clausewitz’s thinking on the factors that constrain warfare. The model posits three stages in his thinking that are determined by two system theoretic dimensions. The three stages are friction as a constraint on the effectiveness of the execution of military plans on paper, suspension as a constraint on the intensity of military action and political objectives as a constraint on military objectives. The two dimensions consist of an interactive perspective in the form of causal feedback loops and a holistic perspective in the form of a political system that forms the context of the military subsystem. 相似文献
17.
18.
研究生课表的计算机自动编排 总被引:1,自引:0,他引:1
针对研究生课程安排特点,提出并建立了一个研究生课程的计算机排课系统,同时讨论了此系统的数据结构和具体实现环境.通过建立排课的约束条件和排课相容判断准则,进一步阐述了研究生课表编排的计算机具体实现原则及其方法. 相似文献
19.
虚拟现实(Virtual Reality:VR)的飞速发展和PC机的广泛使用提出了基于PC的VR应用要求,视景的表示与生成是VR环境的基础与核心。文中介绍采用面向对象机制,在PC机上基于MFC和OpenGL实现的虚拟环境中视景表示与生成的方法。用该方法生成的视景具有良好的视觉效果。 相似文献
20.
计算机多媒体及网络技术对教育方式产生的影响 总被引:1,自引:0,他引:1
介绍了计算机多媒体技术与网络技术的发展历程,分析了它们对教育方式产生的深刻影响,并探讨了我国教育领域在运用这两种技术方面存在的一些问题 相似文献