首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
工业技术   12篇
  2020年   1篇
  2015年   2篇
  2013年   1篇
  2012年   1篇
  2011年   2篇
  2009年   1篇
  2006年   2篇
  2004年   2篇
排序方式: 共有12条查询结果,搜索用时 0 毫秒
1.
非致命防暴弹外弹道仿真   总被引:2,自引:0,他引:2  
研究防暴弹外弹道性能优化设计问题,现有的防暴弹外弹道模型缺乏准确性,为提高准确性,提出合理假设和简化处理,改进原有榴弹低速低伸外弹道模型,建立更适合于防暴弹的外弹道模型;利用SIMULINK仿真工具对38mm防暴弹两种设计方案进行外弹道仿真,并将仿真结果与实弹测试进行对比分析,从而选择具有射程远符合设计指标的方案.结果表明:改进优化后的外弹道模型对一般防暴弹具有普遍适应性,为防暴弹设计阶段不同方案的选择提供参考.  相似文献   
2.
铀材料的辐射探测方法是核查技术研究的重要内容,主动法是铀材料探测的有效方法之一.论文利用MCNP程序计算分析了活化法区分浓缩铀和贫化铀的可行性,研究表明通过铀材料的裂变率-慢化体厚度的关系曲线能够判断是贫化铀还是浓缩铀.计算分析了~(252)Cf和14MeV中子源在铀材料探测中的优缺点,结果表明~(252)Cf中子源优于14Mev中子源.最后从测量的角度,重点分析了探测对象--缓发γ射线和缓发中子,分析表明探测缓发中子优于缓发γ射线.  相似文献   
3.
4.
针对世界武器贸易现状,重点研究了美国、俄罗斯、英国、法国以及德国5个国家2005-2009年武器出口情况及其市场分布情况,总结了五国武器贸易的特点与规律,并在此基础上对未来世界武器贸易趋势进行了预测.  相似文献   
5.
The level of detail discernible in imaging techniques has generally excluded them from consideration as verification tools in inspection regimes. An image will almost certainly contain highly sensitive information, and storing a comparison image will almost certainly violate a cardinal principle of information barriers: that no sensitive information be stored in the system. To overcome this problem, some features of the image might be reduced to a few parameters suitable for definition as an attribute, which must be non-sensitive to be acceptable in an Information Barrier regime. However, this process must be performed with care. Features like the perimeter, area, and intensity of an object, for example, might reveal sensitive information. Any data-reduction technique must provide sufficient information to discriminate a real object from a spoofed or incorrect one, while avoiding disclosure (or storage) of any sensitive object qualities. Ultimately, algorithms are intended to provide only a yes/no response verifying the presence of features in the image. We discuss the utility of imaging for arms control applications and present three image-based verification algorithms in this context. The algorithms reduce full image information to non-sensitive feature information, in a process that is intended to enable verification while eliminating the possibility of image reconstruction. The underlying images can be highly detailed, since they are dynamically generated behind an information barrier. We consider the use of active (conventional) radiography alone and in tandem with passive (auto) radiography. We study these algorithms in terms of technical performance in image analysis and application to an information barrier scheme.  相似文献   
6.
用高纯锗半导体γ探测器在水平和垂直位置测量了不同铀元件组合系统,采用PC/FRAM分析软件对测量能谱进行了铀丰度分析。结果表明:在铀元件、铀元件外加模拟炸药、铍和铍+模拟炸药三种情况下,分析得到的铀丰度基本一致。分析结果的可信度取决于测量γ能谱的统计涨落。  相似文献   
7.
8.
为提高某锰电解厂电解工艺生产效率,改善工人劳动环境,设计了具有双臂独立运动的吊装机械手。首先对生产工艺要求进行分析,因其垂直工作行程较大,为了避免螺杆行程过长造成运动不稳,选择五杆缩放机构作为机械臂。确定了机械臂夹持端的工作范围,计算了各种位姿下机械臂各杆的长度和机械臂可能达到的最高点,并计算了各主要杆件的弯矩。由于该五杆机构采用缩放方式来放大机械臂末端的行程,巧妙避开了可能因工作垂直行程大造成的机构运动不稳定和空间不足等问题。  相似文献   
9.
This study aims to examine the dynamic relationships among information and communication technologies (ICTs), international tourism, and terrorism in 28 countries from 1998 to 2016. Three weighted indices were constructed to gather the following factors: i) “war against terrorism” by military factors, ii) ICTs by different communication technologies, and iii) tourism demand by tourism factors. Results confirmed that the potential determinants of the war against terrorism include computer and communication services, secure Internet servers, per capita income, and trade openness. The key factors of ICT development are armed forces personnel, arms imports, military expenditures, per capita income, and trade openness, which can be effectively utilized for the war on terrorism across countries. Per capita income, trade, foreign direct investment inflows, and military expenditures substantially increased inbound tourism, whereas tourism demand increased computer and communication services, Internet users, and trade openness. Results also showed that armed forces personnel, arms imports, and growth-specific factors substantially increased tourism receipts, whereas high military expenditures decreased tourism income. These findings offer useful policy implications. One key conclusion drawn from this study is that ICTs play a potentially vital role in supporting the war against terrorism and the development of tourism across countries.  相似文献   
10.
黄儒荣 《特钢技术》2006,11(4):54-57
随着经济全球化进一步深入发展。在世界范围的“情报战”、“间诛战”日趋激烈的情况下,我国防科技工业的保密管理工作也面临着许多新情况、新问题。对国防科技工业及军事斗争准备工作造成重大影响的失泄密事件时有发生。给国家安全和利益造成严重损害。为加强国防科技工业保密管理工作。中共中央做出了加强国防科技工业保密管理工作的战略部署。2005年。攀长钢公司结合实际情况,开展了武器装备科研生产单位保密资格证审查认证工作,并以高分一次性通过了认证。作为攀钢(集团)公司内第一家通过此认证的分、子公司和四川省内少数几家通过此认证的大中型企业,我们就如何开展认证工作,切实加强保密管理做出了有益的探索,为履行军工配套企业神圣职责奠定了坚实基础。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号