首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   170篇
  免费   150篇
  国内免费   10篇
  2024年   1篇
  2023年   1篇
  2022年   11篇
  2021年   13篇
  2020年   6篇
  2019年   2篇
  2018年   3篇
  2017年   3篇
  2016年   4篇
  2014年   12篇
  2013年   19篇
  2012年   9篇
  2011年   7篇
  2010年   9篇
  2009年   11篇
  2008年   4篇
  2007年   7篇
  2006年   3篇
  2005年   12篇
  2004年   6篇
  2003年   6篇
  2002年   10篇
  2001年   8篇
  2000年   6篇
  1999年   2篇
  1998年   3篇
  1997年   2篇
  1995年   62篇
  1994年   84篇
  1993年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
排序方式: 共有330条查询结果,搜索用时 15 毫秒
51.
The influence of a magnetic field on the stability of a shaped charge jet is experimentally investigated at standoffs of 490, 650 and 800 mm. The experimental results without and with the magnetic field are compared in terms of the shaped charge jet form, stability and penetration ability. A theoretical model based on one-dimension fluid dynamics is then developed to assess the depth of penetration of the shaped charge at those three standoffs and magnetic conditions. The results show that the penetration capability can be enhanced in more than 70% by the magnetic field. The theoretical calculations are compared with the experimental results with reasonably good correlation. In addition, the parameters introduced in the theory are discussed together with the experiments at three standoffs studied.  相似文献   
52.
农膜的应用对农业发展做出了不可估量的贡献,但是,长期过量使用化肥、农药和塑料农膜将导致土壤板结,地力下降,水体污染和负营养化,破坏自然生态系统的结构和功能。如何合理使用塑料农膜,确保农业生产可持续发展,是摆在每一位环境保护工作者面前的重要课题。  相似文献   
53.
设计安全策略模型时应考虑安全策略的时序特性和灰色特性,还应综合考虑保密性、完整性和可用性三方面的需求。已有的安全模型没有描述时序性和灰色特性,而且一般只侧重描述保密性或完整性。为此,本文提出了动态灰色时序系统(简称DGTS)。本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言GTSL。  相似文献   
54.
This paper models the interactions between the defense needs of the USA and Western Europe, which produce several heterogeneous defense goods, and the defense industry market structure. The results show that net defense costs of the USA and Europe are lower when the number of defense firms in each arms‐producing country is small and when the world prices of the defense goods are high. The model predicts that the increase in world prices will crowd‐out countries in the developing world from the market for modern weapon systems and may force them to develop and use ‘cheap and dirty’ weapon systems.  相似文献   
55.
Probing the technology in the production of US national defence by using a dynamic cost‐function model with adjustment costs, this paper evaluates the effect of reducing the level of national defence on the defence budget saving. Our inquiry involves estimating the defence production structure without output data for non‐market goods that are normally unavailable. Our findings include: (i) the United States behaves rationally to minimize cost in the production of national defence; (ii) the adjustment costs are larger in disarmament than in military build‐up; (iii) due to the adjustment costs peculiar to disarmament, the defence budget saving from disarmament appears small, but cutbacks allow great savings on the defence budget.  相似文献   
56.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
57.
《防务技术》2022,18(9):1552-1562
To further explore the damage characteristics and impact response of the shaped charge to the solid rocket engine (SRE) in storage or transportation, protective armor was designed and the shelled charges model (SCM)/SRE with protective armor impacting by shaped charge tests were conducted. Air overpressures at 5 locations and axial acceleration caused by the explosion were measured, and the experimental results were compared with two air overpressure curves of propellant detonation obtained by related scholars. Afterwards, the finite element software AUTODYN was used to simulate the SCM impacted process and SRE detonation results. The penetration process and the formation cause of damage were analyzed. The detonation performance of TNT, reference propellant, and the propellant used in this experiment was compared. The axial acceleration caused by the explosion was also analyzed. By comprehensive comparison, the energy released by the detonation of this propellant is larger, and the HMX or Al particles contained in this propellant are more than the reference propellant, with a TNT equivalent of 1.168–1.196. Finally, advanced protection armor suggestions were proposed based on the theory of woven fabric rubber composite armor (WFRCA).  相似文献   
58.
This paper studies the shaped charge jet performance in terms of different liner shapes including conical,bell,hemispherical and bi-conical liners.The critical angles and the relevant flow velocities for the zir-conium liner material were calculated analytically and numerically using Autodyn hydro-code.The relationship between the critical collapse angle and the flow velocity was determined for the conditions of jet formation and coherency.Penetration tests according to the standard testing procedures of API-RP34 (Section-Ⅱ) were performed to validate the numerical predictions of the jet performance of the studied liners.It was found that the four shaped charge liners all produced coherent jets with different performances.The penetration depth of the shaped charges with the bell and the bi-conical liner shapes increased by 10.3% and 22%,respectively,while the crater diameter of shaped charge with hemispherical liner increased by 85% representing the formation of an explosively-formed-projectile (EFP),when they are compared with the corresponding jet characteristics of a conical liner shaped charge.  相似文献   
59.
为研究装药命中角对防护结构口部爆炸毁伤的影响规律,对直墙拱结构进行了一系列爆炸模拟分析,得到了直墙拱结构拱顶、拱脚和直墙底3个位置的爆炸应力和位移时程曲线。通过分析这3个位置的应力峰值和位移峰值,发现随着装药命中角的增大,拱顶处竖直方向荷载减小,而拱脚处水平方向荷载增大;随着装药命中角的增大,拱顶处竖直方向位移变形减小,而拱脚处水平方向位移变形增大。模拟分析得到的命中角对防护结构口部爆炸毁伤的影响规律,可供防护工程设计时参考。  相似文献   
60.
通过分析悬浮式深弹发射后在空中的弹道特性,建立了深弹弹着点坐标的计算模型。采取蒙特卡洛方法,分别对舰艇六自由度状态下,单管和六联装火箭深弹的弹着点坐标进行了仿真计算,对弹着点的分布规律进行了研究,并得出弹着点的联合密度函数。结果表明,在发射参数存在正态扰动时,弹着点散布区域均呈椭圆形分布,弹着点坐标均仍服从正态分布。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号