排序方式: 共有62条查询结果,搜索用时 18 毫秒
1.
本文以聚碳硅烷(PCS)为先驱体,SiC晶须,SiC微粉或C纤维为增强剂,热解转化制得SiC/SiC或C/SiC复合材料,研究其制备工艺过程对材料的力学和热物理性能的影响。结果表明:PCS在1300℃下转化为β-SiC微晶并将未烧结的增强剂网络在一起形成SiC/SiC或C/SiC复合材料。该SiC基复合材料具有较好的常温和高温机械强度,优异的耐热疲劳和抗热震性能,在1300℃空气中具有良好的抗氧化性。 相似文献
2.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
3.
张昌芳 《装甲兵工程学院学报》2003,17(4):28-31
通过对北京市第19届非物理类专业大学生物理竞赛,我院和其他几个重点院校实验题得分的对比分析,尤其是实验能力得分率的详细分析,对大学物理实验教学和相关教学改革提供思考和借鉴。 相似文献
4.
穿甲弹对自行火炮易损性分析与计算 总被引:1,自引:0,他引:1
分析了自行火炮在穿甲弹作用下的易损性,建立了自行火炮易损性计算模型,并以某型自行火炮为例,分别计算了该炮在120mm穿甲弹正面命中与侧面命中时的毁伤概率。 相似文献
5.
季诚响 《装甲兵工程学院学报》2000,14(4):30-33
为适应21世纪发展需要,培养具有创新能力的高素质人才,物理实验课程在认真审视传统教学模式的基础上,对课程教学体系进行了改革探索.介绍了新教学体系在教学内容、教学手段、教学方法等方面改革的具体规划和作法,并对教学内容、教学手段的现代化,开放式教学,层次教学进行了讨论. 相似文献
6.
运用松耦合设计思想,对计算机脆弱性测评系统中两个子系统的组成和实现进行了研究。提出多准则测评子系统的Web数据库实现和CVE测评子系统的多层MAS实现方法,并对其实现算法和技术要点进行了论述。 相似文献
7.
组织如何制定优化的信息安全技术方案以降低脆弱性对其信息系统的威胁,是信息安全管理领域的关键问题。在描述信息系统安全技术方案决策模型的基础上,提出了一种求解信息系统安全技术方案优化问题的自适应遗传算法,使得组织能以最少的方案实施费用最大限度地处置脆弱性,并以实例说明了该算法的有效性。 相似文献
8.
提出了一个基于可信度方法的网络安全性分析模型。该模型在脆弱点信息、脆弱点之间的关系、脆弱点与安全性的关系的表示中引入可信度因子,通过不确定推理对主机和网络的安全性进行分析。该模型能综合考虑诸多因素,有效处理安全性分析中的不确定知识。 相似文献
9.
Mark Malan 《African Security Review》2013,22(3):27-41
Abstract Pastoralist groups in Eastern Africa are extremely vulnerable as a result of inter-community conflicts, the harsh terrain, and unfavourable climatic conditions. They have been neglected by successive regimes on matters of socio-economic development. At present pastoralist areas in Eastern Africa have the lowest literacy rates and insufficient health care facilities. This article interrogates the historical relationship between governments, humanitarian groups and pastoralists. It notes with great concern that pastoralists have been branded as hunger-stricken populations with insignificant economic potential that can be harnessed from their day-to-day livelihood. They are treated as sedentary populations who need a constant supply of relief food to keep going. In order to reverse these misconceptions, the article places emphasis on mitigating the threats of intra-community conflicts, diseases and natural disasters through investment in social schemes and infrastructure in order to open up the areas for service provision. Indeed, for a majority of the pastoralists, insecurity comes not so much from traditional security concerns, but from human insecurity concerns about their survival, preservation of their lifestyle and well-being in a day-to-day context. 相似文献
10.
袁建民 《国防科技大学学报》1988,10(3):52-58 ,112
利用原子的Roothaan-Hartree-Fock波函数计算了低能e~--He和e~--Ar弹性散射截面。计算采用模型势方法,其中包括静电势、交换势和极化势。计算结果和实验吻合较好。通过把我们的计算结果和其他作者利用不同原子波函数的计算结果进行比较,讨论了不同原子波函数之间的差别对计算结果的影响。 相似文献