首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   418篇
  免费   94篇
  国内免费   13篇
  2022年   3篇
  2021年   18篇
  2020年   5篇
  2019年   1篇
  2018年   4篇
  2017年   11篇
  2016年   10篇
  2015年   13篇
  2014年   33篇
  2013年   22篇
  2012年   12篇
  2011年   17篇
  2010年   35篇
  2009年   32篇
  2008年   31篇
  2007年   33篇
  2006年   19篇
  2005年   27篇
  2004年   8篇
  2003年   4篇
  2002年   4篇
  2001年   9篇
  2000年   9篇
  1999年   26篇
  1998年   20篇
  1997年   15篇
  1996年   23篇
  1995年   16篇
  1994年   10篇
  1993年   12篇
  1992年   12篇
  1991年   6篇
  1990年   8篇
  1989年   3篇
  1988年   3篇
  1987年   2篇
  1986年   4篇
  1985年   1篇
  1983年   3篇
  1974年   1篇
排序方式: 共有525条查询结果,搜索用时 62 毫秒
81.
针对现代防空作战训练中联合电子防空作战效能评估的问题,引入物元模型,并结合层次分析法(AHP)提出了基于物元模型-AHP的联合电子防空作战效能评估方法.以某次复杂电磁环境下联合电子防空演习任务为背景,建立了作战效能评估指标体系和评估模型,给出了评估模型的仿真算例,结果表明,该方法在联合电子防空作战的效能评估中是可行和有...  相似文献   
82.
一种高分辨雷达扩展目标信号模拟方法   总被引:1,自引:0,他引:1  
从线性调频高分辨雷达着手,分析了扩展目标回波信号的特点,对线性调频信号进行了模拟,生成了扩展目标回波数据。最后用Matlab仿真实现了目标散射中心和多普勒速度的提取,验证了模拟信号的可行性。  相似文献   
83.
针对目前车辆信息系统缺乏有效设计方法的现状,结合新时期车辆信息系统的特点,提出了一种基于SysML的车辆信息系统设计方法。该方法明确了车辆信息系统设计过程的阶段和产物,并通过标准建模语言SysML的运用,用模型来支持系统的设计和有效性验证。该方法在智能巡航系统的设计中得到了运用。实践结果表明,该方法不仅能够自顶向下完整地设计系统、利用可视化的语言准确清晰地描述系统,而且能够在系统设计层面对系统功能逻辑和数据流进行动态仿真和迭代验证。该方法能够较好地指导新时期车辆信息系统的设计过程,满足信息系统的设计要求。  相似文献   
84.
为解决某型装备作战效能评估客观性差问题,在分析作战任务基础上构建效能评估指标体系,通过构建改进的效能评估模型,引入双自适应调节算子灵敏反应指标数据波动,确保了指标权重精确度,并通过单个权重和双自适应调节算法权重衡量方法的实例对比,验证了本模型的科学性、准确性.该模型对基础数据要求低,计算相对简便;构建的指标体系全面,较好地反映了评估对象的作战特征;避免了人为因素对指标权重的影响,结论更加客观.研究结果对快速、科学制定作战方案和改进某型装备性能设计有一定的参考意义.  相似文献   
85.
Jian-li Su  Hua Wang 《防务技术》2021,17(6):1967-1975
Single unmanned aerial vehicle (UAV) multitasking plays an important role in multiple UAVs cooperative control, which is as well as the most complicated and hardest part. This paper establishes a three-dimensional topographical map, and an improved adaptive differential evolution (IADE) algorithm is proposed for single UAV multitasking. As an optimized problem, the efficiency of using standard differential evolution to obtain the global optimal solution is very low to avoid this problem. Therefore, the algorithm adopts the mutation factor and crossover factor into dynamic adaptive functions, which makes the crossover factor and variation factor can be adjusted with the number of population iteration and individual fitness value, letting the algorithm exploration and development more reasonable. The experimental results implicate that the IADE algorithm has better performance, higher convergence and efficiency to solve the multitasking problem compared with other algorithms.  相似文献   
86.
Chain damage is a new phenomenon that occurs when a reactive jet impacts and penetrates multi-spaced plates.The reactive jet produces mechanical perforations on the spaced plates by its kinetic energy(KE),and then results in unusual chain rupturing effects and excessive structural damage on the spaced plates by its deflagration reaction.In the present study,the chain damage behavior is initially demonstrated by experiments.The reactive liners,composed of 26 wt%Al and 74 wt%PTFE,are fabricated through a pressing and sintering process.Three reactive liner thicknesses of 0.08 CD,0.10 CD and 0.12 CD(charge diameter)are chosen to carry out the chain damage experiments.The results show a chain rupturing phenomenon caused by reactive jet.The constant reaction delay time and the different penetration velocities of reactive jets from liners with different thicknesses result in the variation of the deflagration position,which consequently determines the number of ruptured plates behind the armor.Then,the finite-element code AUTODYN-3D has been used to simulate the kinetic energy only-induced rupturing effects on plates,based on the mechanism of behind armor debris(BAD).The significant discrepancies between simulations and experiments indicate that one enhanced damage mechanism,the behind armor blast(BAB),has acted on the ruptured plates.Finally,a theoretical model is used to consider the BAB-induced enhancement,and the analysis shows that the rupturing area on aluminum plates depends strongly upon the KE only-induced pre-perforations,the mass of reactive materials,and the thickness of plates.  相似文献   
87.
While there has been significant previous literature on inventory transshipment, most research has focused on the dealers' demand filling decision (when to fill transshipment requests from other dealers), ignoring the requesting decision (when to send transshipment requests to other dealers). In this paper we develop optimal inventory transshipment policies that incorporate both types of decisions. We consider a decentralized system in which the dealers are independent of the manufacturer and of each other. We first study a network consisting of a very large number of dealers. We prove that the optimal inventory and transshipment decisions for an individual dealer are controlled by threshold rationing and requesting levels. Then, in order to study the impact of transshipment among independent dealers in a smaller dealer network, we consider a decentralized two‐dealer network and use a game theoretic approach to characterize the equilibrium inventory strategies of the individual dealers. An extensive numerical study highlights the impact of the requesting decision on the dealers' equilibrium behavior in a decentralized setting. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
88.
The effect of military expenditure on economic growth in developing countries has been investigated by many empirical literatures. However, there is little consensus of that effect and the diversity seems to come from the use of different models and different estimators. This article applies the Augmented Solow Growth Model to examine the influence of military expenditure on economic growth for 35 developing countries over the period of 1975–2009. By using the system Generalized Method of Moments (GMM) estimators, empirical results indicate that defence has a negative and significant effect on economic growth in the sample countries.  相似文献   
89.
付艳红  赵阳 《国防科技》2013,34(1):34-37
随着网络技术的发展,国际间基于网络空间进行的攻击与防卫行动愈演愈烈。在短短十数年间,网络空间行动的模式,已经由简单的宣传和窃密发展为某一国家主体或国际组织基于自身利益的考虑,对另一国家主体或国际组织在经济、军事、行政等领域进行破坏与瘫痪的军事行动。而且这种网络攻击行动的地位和作用越来越具有战略意义,正逐渐成为一种新的战争形态。文章梳理了美国和俄罗斯在网络空间军备控制方面的研究现状,并对我国如何应对这种形势提出了一些思考。  相似文献   
90.
为分析级联失效对互联网性能的影响,基于互联网由多自治系统关联的现实,模拟自治系统间的负载均衡,建立了多自治系统关联的级联失效模型。在此基础上定义了分别由强连接关系和弱连接关系组成的2种多自治系统关联网络,并分析了域间流量引起的级联失效对网络性能造成的影响。结果表明:存在引发级联失效的域间流量比例临界值;级联失效发生后,弱连接网络以吞吐量下降为主,强连接网络以负载增加为主。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号