首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69篇
  免费   1篇
  国内免费   1篇
综合类   3篇
建筑科学   3篇
能源动力   5篇
无线电   1篇
一般工业技术   5篇
冶金工业   39篇
原子能技术   3篇
自动化技术   12篇
  2021年   1篇
  2016年   2篇
  2015年   2篇
  2014年   2篇
  2013年   6篇
  2011年   1篇
  2010年   5篇
  2009年   2篇
  2008年   10篇
  2007年   11篇
  2006年   6篇
  2005年   8篇
  2004年   6篇
  2003年   5篇
  2002年   3篇
  1983年   1篇
排序方式: 共有71条查询结果,搜索用时 15 毫秒
1.
Recent research has proposed the use of asphalt and tall-oil-pitch emulsions for stabilizing radioactive contamination deposited on surfaces in urban areas. The objective of this project was to investigate whether surface applied emulsions could capture airborne radioactive particulate. Laboratory experiments included wind-blown particulate capture studies using an acrylic column and particulate retainment experiments using a wind box capable of producing wind speeds of 96?km/h. A probe methodology was developed to relate particulate retainment to a tack force on the emulsion surface. Experiments were also performed to determine the potential for such emulsions to absorb particulate matter into their emulsion matrix. Tall-oil-pitch emulsions outperformed asphalt emulsions in terms of particulate retention, tack force, and the ability to absorb magnesium silicate. Both tall-oil-pitch and asphalt emulsions were capable of extracting 22–24?g?m?2 of powder from particulate-laden airflow. Tall-oil-pitch emulsions were capable of retaining as much as 5–10% of magnesium silicate powder applied (i.e., retainment densities of 10–20?g?m?2) even after seven?days of curing and after applying 96.5?km/h (60?mph) wind. Tall-oil-pitch emulsions were able to absorb surface-applied magnesium silicate (approximately 0.1–0.2?g of magnesium silicate per 1.0?g of emulsion within three?days) into their emulsion matrix, preventing the magnesium silicate from being exposed to the external environment. Initial results with these five different emulsion formulations suggested particulate capture was feasible. Future emulsion formulations (i.e., longer curing times with greater acid concentrations) should be tested to optimize this postdetonation response strategy.  相似文献   
2.
The need for better protecting our vital infrastructure from being damaged or destroyed has received increased attention since the terrorist attacks on September 11, 2001. The tragedy of having thousands of innocent people die before the eyes of an entire nation awakened people to the reality of “managed” attacks of unthinkable magnitudes. However, tragedies of a smaller scale are a daily occurrence but accepted as “collateral damage” of work in an unsafe environment. This paper presents a cost-benefit analysis to address the question of how much money should be spent in protecting underground utilities from damage. During the study of an actual incident it was found that the total costs of such accidents are vastly underreported because only costs for emergency responses and repair are tallied up. This paper makes the case that a comprehensive approach for assessing the total economic impact of such incidents on the public, business, and government is the critical stepping stone to a mathematical optimization of expenditure for damage prevention. In addition, the reader will quickly realize that the use of the presented optimization model provides theoretical underpinning for the engineering profession in its effort to better protect our critical infrastructure from terrorist attacks.  相似文献   
3.
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within an optimal control model, where the key state is the (relative) number of terrorists and the key controls are two types of counter-terror tactics, one (“water”) that does not and one (“fire”) that does provoke recruitment of new terrorists. The model is nonlinear and does not admit analytical solutions, but an efficient numerical implementation of Pontryagin's minimum principle allows for solution with base case parameters and considerable sensitivity analysis. Generally, this model yields two different steady states, one where the terror organization is nearly eradicated and one with a high number of terrorists. Whereas water strategies are used at almost any time, it can be optimal not to use fire strategies if the number of terrorists is below a certain threshold.  相似文献   
4.
Risk Management and Design of Critical Bridges for Terrorist Attacks   总被引:1,自引:0,他引:1  
In the aftermath of the September 11th tragedies, the vulnerability of the United States' transportation infrastructure to terrorist attack has gained national attention. In light of this vulnerability, various governmental agencies are looking into ways to improve the design of structures to better withstand extreme loadings. Until recently, little attention has been given to bridges which are critical to our economy and transportation network. This paper summarizes the results of ongoing research to investigate economical, unobtrusive, and effective methods to mitigate the risk of terrorist attacks against critical bridges. It outlines a recommended plan to reduce these threats through proven risk management techniques, lists possible cost-effective security measures, discusses blast effects on bridges, and provides structural design and retrofit guidelines. It also discusses ongoing research oriented towards the development of a performance-based design methodology. In using proper risk management techniques, transportation managers and bridge engineers can mitigate the risk of terrorist attacks against critical bridges to an acceptable level, while ensuring efficient use of limited resources.  相似文献   
5.
A numerical simulation of the aircraft impact into the exterior columns of the World Trade Center (WTC) was done using LS-DYNA. For simplification, the fuselage was modeled as a thin-walled cylinder, the wings were modeled as box beams with a fuel pocket, and the engines were represented as rigid cylinders. The exterior columns of the WTC were represented as box beams. Actual masses, material properties and dimensions of the Boeing 767 aircraft and the exterior columns of the WTC were used in this analysis. It was found that about 46% of the initial kinetic energy of the aircraft was used to damage columns. The minimum impact velocity of the aircraft to just penetrate the exterior columns would be 130?m/s. It was also found that a Boeing 767 traveling at top speed would not penetrate exterior columns of the WTC if the columns were thicker than 20?mm.  相似文献   
6.
On September 11, 2001, an airliner was intentionally crashed into the Pentagon. It struck at the first elevated slab on the west wall, and slid approximately 310?ft (94.5?m) diagonally into the building. The force of the collision demolished numerous columns and the fa?ade of the exterior wall, and induced damage to first-floor columns and the first elevated slab over an area approximately 90?ft (27.4?m) wide and 310?ft (94.5?m) long. None of the building collapsed immediately. The portion that remained standing, even after an intense fire, sustained substantial damage at the first-floor level.  相似文献   
7.
On September 11, 2001, the reinforced concrete structure of the Pentagon Building was able to resist, without collapse, the impact of a large commercial airliner despite the total loss of 26 columns and severe damage to 15 columns at the ground level. The ensuing fire and related fire-fighting activities led to the collapse of a portion of the building approximately one-half hour after the impact. In this paper, the reasons for the demonstrated toughness of the reinforced concrete structure are examined and attributed to use of spiral columns, effective splicing of reinforcing bars, strong girders, and short span lengths.  相似文献   
8.
The most widely used terrorist tactic is the improvised explosive device, which can range in size from hand-held to truck-size. Most casualties and injuries sustained in such an attack are not caused by the blast itself, but rather by the disintegration and fragmentation of walls, the shattering of windows, and by nonsecured objects propelled at high velocities by the blast. Since 1995, the Air Force Research Laboratory at Tyndall Air Force Base has investigated methods of retrofitting wall structures to better resist blast loads from external explosions. This paper summarizes results from recent tests that involve an innovative use of a sprayed-on polymer to increase blast resistance of unreinforced concrete masonry walls. Test methodology, retrofit materials considered, material properties, mechanisms of effectiveness, and research challenges are discussed.  相似文献   
9.
Nuclear safety, nuclear security and nuclear safeguards regimes have not historically developed at the same pace and surely have not reached the same level of maturity. Nevertheless, these aspects are of special relevance in the current global nuclear energy context when considering the numerous countries that have and will have the legitimate ambition to start a nuclear energy production programme without any or scarce previous nuclear safety, security and safeguards cultures.The future development of nuclear energy exploitation will depend more and more on the convergence of decisions from governments, from the nuclear industry, from utilities, from private and institutional investors as well as from the level of acceptance by the public opinion.Following an in-depth state-of-the-art analysis and literature search, a methodological approach focussed on the safety and security connections is presented, as it seems a field where more commonalities and operational aspects could be possibly found and exploited.  相似文献   
10.
The use of graphical processing unit (GPU) parallel processing is becoming a part of mainstream statistical practice. The reliance of Bayesian statistics on Markov Chain Monte Carlo (MCMC) methods makes the applicability of parallel processing not immediately obvious. It is illustrated that there are substantial gains in improved computational time for MCMC and other methods of evaluation by computing the likelihood using GPU parallel processing. Examples use data from the Global Terrorism Database to model terrorist activity in Colombia from 2000 through 2010 and a likelihood based on the explicit convolution of two negative-binomial processes. Results show decreases in computational time by a factor of over 200. Factors influencing these improvements and guidelines for programming parallel implementations of the likelihood are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号