全文获取类型
收费全文 | 432篇 |
免费 | 5篇 |
出版年
2021年 | 5篇 |
2020年 | 4篇 |
2019年 | 4篇 |
2017年 | 10篇 |
2016年 | 10篇 |
2015年 | 8篇 |
2014年 | 8篇 |
2013年 | 55篇 |
2012年 | 22篇 |
2011年 | 26篇 |
2010年 | 21篇 |
2009年 | 14篇 |
2008年 | 27篇 |
2007年 | 13篇 |
2006年 | 15篇 |
2005年 | 5篇 |
2004年 | 3篇 |
2003年 | 2篇 |
2002年 | 3篇 |
2001年 | 3篇 |
1999年 | 2篇 |
1998年 | 6篇 |
1997年 | 6篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 10篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1989年 | 6篇 |
1987年 | 2篇 |
1986年 | 10篇 |
1985年 | 7篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1981年 | 8篇 |
1980年 | 9篇 |
1979年 | 11篇 |
1978年 | 4篇 |
1977年 | 6篇 |
1976年 | 7篇 |
1975年 | 7篇 |
1974年 | 2篇 |
1973年 | 2篇 |
1972年 | 12篇 |
1971年 | 3篇 |
1970年 | 3篇 |
1969年 | 9篇 |
1968年 | 7篇 |
1967年 | 1篇 |
1966年 | 3篇 |
排序方式: 共有437条查询结果,搜索用时 15 毫秒
381.
382.
383.
MAC协议是航空武器数据链组网通信的重要技术,网络的性能依赖于所采用的多址接入协议,也是航空武器数据链研究的难点之一。固定分配、竞争和预约三大类MAC协议各有优缺点以及适应场景,需要根据应用需求设计对应的多址接入协议,以满足通信网络的战术和技术性能指标。在分析数字化战场通信网络——战术数据链组网通信应用的主要MAC协议的基础上,结合航空武器数据链的通信特点和体系结构,提出一种基于固定分配TDMA的航空武器数据链MAC协议——ODTCFMA协议,并对协议的时延性能进行了仿真和分析。分析结果表明,该协议能够同时满足编队战术协同和武器制导的低时延要求,对航空武器数据链的研究具有一定的借鉴意义。 相似文献
384.
385.
在登陆作战中,直接火力准备起着至关重要的作用,直接关系到登陆兵能否冲击上陆成功.考虑到实际作战中的模糊不确定性和多属性问题,利用模糊数学理论与多属性决策方法,将指派问题拓展到模糊条件下,针对登陆作战中如何发挥直接火力准备的最大效能问题,建立了模糊状态下的多目标指派模型,提供了求解方法,简要地对模型进行了动态化研究,并通过一仿真算例说明模型的应用效果较好,能为未来登陆作战提供辅助决策支持. 相似文献
386.
387.
考虑了一类不确定系统的具有闭环极点约束的输出反馈H∞控制,运用基于线性矩阵不等式的方法(LMI),由二次D-稳定导出了鲁棒D-稳定的输出反馈控制器存在的充分条件和设计方法.该方法虽然具有一定的保守性,但求解方便有效,且易于扩展到多目标鲁棒控制.最后,仿真说明了该设计方法的正确性. 相似文献
388.
We consider a manufacturer (i.e., a capacitated supplier) that produces to stock and has two classes of customers. The primary customer places orders at regular intervals of time for a random quantity, while the secondary customers request a single item at random times. At a predetermined time the manufacturer receives advance demand information regarding the order size of the primary customer. If the manufacturer is not able to fill the primary customer's demand, there is a penalty. On the other hand, serving the secondary customers results in additional profit; however, the manufacturer can refuse to serve the secondary customers in order to reserve inventory for the primary customer. We characterize the manufacturer's optimal production and stock reservation policies that maximize the manufacturer's discounted profit and the average profit per unit time. We show that these policies are threshold‐type policies, and these thresholds are monotone with respect to the primary customer's order size. Using a numerical study we provide insights into how the value of information is affected by the relative demand size of the primary and secondary customers. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
389.
We undertake inference for a stochastic form of the Lanchester combat model. In particular, given battle data, we assess the type of battle that occurred and whether or not it makes any difference to the number of casualties if an army is attacking or defending. Our approach is Bayesian and we use modern computational techniques to fit the model. We illustrate our method using data from the Ardennes campaign. We compare our results with previous analyses of these data by Bracken and Fricker. Our conclusions are somewhat different to those of Bracken. Where he suggests that a linear law is appropriate, we show that the logarithmic or linear‐logarithmic laws fit better. We note however that the basic Lanchester modeling assumptions do not hold for the Ardennes data. Using Fricker's modified data, we show that although his “super‐logarithmic” law fits best, the linear, linear‐logarithmic, and logarithmic laws cannot be ruled out. We suggest that Bayesian methods can be used to make inference for battles in progress. We point out a number of advantages: Prior information from experts or previous battles can be incorporated; predictions of future casualties are easily made; more complex models can be analysed using stochastic simulation techniques. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 541–558, 2000 相似文献
390.
Resource-constrained project scheduling with cash flows occurs in many settings, ranging from research and development to commercial and residential construction. Although efforts have been made to develop efficient optimal procedures to maximize the net present value of cash flows for resource-constrained projects, the inherent intractability of the problem has led to the development of a variety of heuristic methods to aid in the development of near-optimal schedules for large projects. This research focuses on the use of insights gained from the solution of a relaxed optimization model in developing heuristic procedures to schedule projects with multiple constrained resources. It is shown that a heuristic procedure with embedded priority rules that uses information from the revised solution of a relaxed optimization model increases project net present value. The heuristic procedure and nine different embedded priority rules are tested in a variety of project environments that account for different network structures, levels of resource constrainedness, and cash-flow parameters. Extensive testing with problems ranging in size from 21 to 1000 activities shows that the new heuristic procedures dominate heuristics using information from the critical path method (CPM), and in most cases outperform heuristics from previous research. The best performing heuristic rules classify activities into priority and secondary queues according to whether they lead to immediate progress payments, thus front loading the project schedule. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 365–381, 1997 相似文献