首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22篇
  免费   12篇
  国内免费   2篇
  2022年   1篇
  2017年   2篇
  2016年   2篇
  2015年   3篇
  2014年   4篇
  2013年   4篇
  2012年   2篇
  2010年   1篇
  2008年   2篇
  2006年   1篇
  2003年   2篇
  2000年   2篇
  1999年   5篇
  1996年   1篇
  1995年   1篇
  1993年   1篇
  1990年   1篇
  1988年   1篇
排序方式: 共有36条查询结果,搜索用时 16 毫秒
11.
采用时间序列分析方法,根据大量的实测数据分析了GPS定位误差的统计特征,建立了GPS定位误差模型。  相似文献   
12.
本文利用四种时间序列模型,即自回归模型、组合模型、疏系数自回归模型、门限自回归模型,分别对时间序列分析中一组有名数据,即加拿大山猫数据,进行模型拟合,并对得到的四个模型及预报结果进行了分析和比较。  相似文献   
13.
研究了一类具有离散时滞与分布时滞的非自治线性系统的渐近稳定性问题,利用Lyaplunov函数方法和线性矩阵不等式(LMI),得到了系统渐近稳定性的一些充分条件,这些条件能够利用线性矩阵不等式(LMIs)表示,且表达式中含有具有时变时滞与分布时滞项,这样,具有时变时滞与分布时滞的非自治线性系统的稳定性就能够通过Matlab的LIM工具箱进行验证。  相似文献   
14.
用时间相关法求解跨音速流动时,合理而有效地处理物面边界条件是十分重要的。本文提出几种物面边界条件的处理方法,并对几个例子进行了数值试验,对其结果进行了讨论。  相似文献   
15.
组播技术的应用可以有效提高RTI的实现性能。介绍了组播分配的一般理论和实现方案,详细展示了KD RTI中的组播分配策略,讨论了组播应用过程中出现的问题,同时给出了解决方法。  相似文献   
16.
在满足对目标卫星在指定时间进行拦截的要求下,考虑拦截器变轨能量消耗最省,提出了基于定时拦截的在轨机动拦截轨道选择与优化方法。该方法能够迅速设计和优化出最优在轨机动拦截轨道、变轨点位置和变轨所需的能量。仿真结果表明,模型准确、有效,能够满足作战要求。  相似文献   
17.
This paper contributes to the growing literature on the milex-growth nexus, by providing a case study of South Africa and considering the possibility of structural breaks by applying newly developed econometric methods. Using full sample bootstrap Granger non-causality tests, no Granger causal link is found between military expenditure and GDP for 1951–2010, but parameter instability tests show the estimated VARs to be unstable. Using a bootstrap rolling window estimation procedure, however, finds evidence of bidirectional Granger causality in various subsamples. This implies standard Granger non-causality tests, which neither account for structural breaks nor time variation may be invalid.  相似文献   
18.
We investigate whether differences in terrorism risk are mirrored on terrorism risk perception across European countries for the period 2003–2007. We find that the average propensity for terrorism risk concern is affected by actual risk levels. Country and individual heterogeneity contribute substantially to the variation of observed risk perception. Singles and individuals with white collar jobs are less likely to mention terrorism as one of the most pressing issues their country faces, while political positioning towards the right makes it more likely to be concerned about terrorism. As far as competing risks are concerned, we find that the likelihood terrorism is mentioned, decreases with spending on pensions as a percentage of GDP being higher. Finally, based on the Bayesian framework, we also examined the formation of terrorism risk perceptions, and decompose the observed country-level time series of terrorism activity into a long- and a short-run component. We concluded that the observed risk perception variation is only explained by the long-term trend of terrorism activity countries face.  相似文献   
19.
网络化无人水下航行器CAN总线调度方法   总被引:3,自引:0,他引:3  
传感器时间驱动,控制器和执行器均为事件驱动的网络控制系统节点驱动方式,已在众多的网络控制系统研究中被采用。在此种节点驱动方式下,依据各控制回路传感信息的不同时间性质将网络化无人水下航行器各控制回路划分为周期性控制回路和随机性控制回路来进行处理。采用时分复用原理对系统总线传输时间进行划分,通过递归遍历寻优方法对系统周期性控制回路信息传输需求进行优化调度;基本周期最小时间余量最大的寻优指标确保了总线负载均衡和随机性控制回路信息传输需求得到及时满足,这样有效地减少了低优先级控制回路(节点)信息传输的延迟等待时间。利用M ATLAB/T uretim e工具进行仿真试验,仿真结果说明了调度方法的有效性。  相似文献   
20.
This paper offers the personal view of a senior executive in the Defence Procurement Agency about the future requirements of the defence industry’s principal UK customer. The focus here is on trying to identify the type of corporate behaviour and range of skill sets that the UK Government will need from defence suppliers, both primes and supply chain companies in the future. The concluding message from this ‘Customer View’ is that there is likely to be a continuing market for the company that specializes in delivering defence capability. It will be a company that will be looking for a long‐term relationship, with a specialist knowledge of its various national customers and a willingness to work openly and closely with them. It will be agile in its ability to bring together diverse technologies, to package them as a system and to deliver them either as hardware or as a service. Such suppliers will also need to innovate and to adapt at least as rapidly as the threats that they seek to counter.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号