全文获取类型
收费全文 | 388篇 |
免费 | 49篇 |
国内免费 | 73篇 |
出版年
2023年 | 3篇 |
2022年 | 3篇 |
2021年 | 12篇 |
2020年 | 9篇 |
2019年 | 11篇 |
2018年 | 11篇 |
2017年 | 30篇 |
2016年 | 37篇 |
2015年 | 8篇 |
2014年 | 55篇 |
2013年 | 27篇 |
2012年 | 31篇 |
2011年 | 22篇 |
2010年 | 11篇 |
2009年 | 37篇 |
2008年 | 24篇 |
2007年 | 24篇 |
2006年 | 30篇 |
2005年 | 20篇 |
2004年 | 25篇 |
2003年 | 9篇 |
2002年 | 11篇 |
2001年 | 12篇 |
2000年 | 11篇 |
1999年 | 8篇 |
1998年 | 11篇 |
1997年 | 4篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1989年 | 1篇 |
排序方式: 共有510条查询结果,搜索用时 15 毫秒
81.
针对当前空战机动决策精确度低、实时性差的缺点,对天牛须搜索-战术免疫机动系统(Beetle Antennae Search-Tactical Immune Maneuver System, BAS-TIMS)算法进行改进,并应用于空战机动决策中。增加左爬升、右爬升、左俯冲、右俯冲4种机动,对传统的机动策略库进行扩充,设计了11种基本机动策略并给出了相应的控制方法。基于距离、高度、速度、角度和战机性能优势函数,利用非参量法构造战机机动决策综合优势函数。针对天牛须搜索算法在全局搜索和收敛速度上存在的缺陷,引入蒙特卡洛概率迭代的方法对算法进行改进,并和战术免疫机动系统进行融合,将改进的BAS-TIMS算法用于空战机动决策。设计算例进行仿真分析,并将结果和博弈论法、改进共生生物免疫进化算法、传统BAS算法和传统TIMS模型的计算结果进行对比,验证所提算法的有效性。仿真结果表明:改进BAS-TIMS算法在空战机动决策的收敛精度、收敛速度和全局搜索能力上更加具有优势。 相似文献
82.
Dmitrii Usanov G.A. Guido Legemaate Peter M. van de Ven Rob D. van der Mei 《海军后勤学研究》2019,66(2):105-122
The effectiveness of a fire department is largely determined by its ability to respond to incidents in a timely manner. To do so, fire departments typically have fire stations spread evenly across the region, and dispatch the closest truck(s) whenever a new incident occurs. However, large gaps in coverage may arise in the case of a major incident that requires many nearby fire trucks over a long period of time, substantially increasing response times for emergencies that occur subsequently. We propose a heuristic for relocating idle trucks during a major incident in order to retain good coverage. This is done by solving a mathematical program that takes into account the location of the available fire trucks and the historic spatial distribution of incidents. This heuristic allows the user to balance the coverage and the number of truck movements. Using extensive simulation experiments we test the heuristic for the operations of the Fire Department of Amsterdam‐Amstelland, and compare it against three other benchmark strategies in a simulation fitted using 10 years of historical data. We demonstrate substantial improvement over the current relocation policy, and show that not relocating during major incidents may lead to a significant decrease in performance. 相似文献
83.
Information technology (IT) infrastructure relies on a globalized supply chain that is vulnerable to numerous risks from adversarial attacks. It is important to protect IT infrastructure from these dynamic, persistent risks by delaying adversarial exploits. In this paper, we propose max‐min interdiction models for critical infrastructure protection that prioritizes cost‐effective security mitigations to maximally delay adversarial attacks. We consider attacks originating from multiple adversaries, each of which aims to find a “critical path” through the attack surface to complete the corresponding attack as soon as possible. Decision‐makers can deploy mitigations to delay attack exploits, however, mitigation effectiveness is sometimes uncertain. We propose a stochastic model variant to address this uncertainty by incorporating random delay times. The proposed models can be reformulated as a nested max‐max problem using dualization. We propose a Lagrangian heuristic approach that decomposes the max‐max problem into a number of smaller subproblems, and updates upper and lower bounds to the original problem via subgradient optimization. We evaluate the perfect information solution value as an alternative method for updating the upper bound. Computational results demonstrate that the Lagrangian heuristic identifies near‐optimal solutions efficiently, which outperforms a general purpose mixed‐integer programming solver on medium and large instances. 相似文献
84.
Michael H. Clemmesen 《Defense & Security Analysis》2019,35(1):96-97
The article outlines the essential role of free play elements in various types of exercises for the development of in-depth and practical military professionalism. It thereafter argues why such use of free play contradicts the military science founded Russian Way of War. 相似文献
85.
针对多无人机(UAV)任务网协同空战态势威胁评估问题,在现有基本模型基础上增加考虑气象环境对威胁评估要素的影响和无人机的自主可靠性系数两个实际因素,提出一种改进的超视距空战威胁评估模型;同时,应用串联电阻分压法、改进AHP法和熵权法分别计算融合模型中各威胁指标的权重系数;进而,在考虑己方战机对敌方战机综合威胁与优势的基础上,介绍了战机协同空战目标分配的基本方案。最后,应用上述3种权重计算方法进行空战威胁仿真计算,计算结果表明改进空战威胁评估模型可有效改善空战决策性能。 相似文献
86.
87.
88.
89.
针对体系作战力量的组织运用效能评估问题,利用模糊综合评判方法进行了探索。首先从评估方法的选择入手,确定评估的手段,其次围绕体系作战能力的特点建立评估指标体系,最后综合运用评估方法和评估指标体系,构建出以模糊综合评估为基础的评估体系,并模拟评估过程进行分析计算,得出符合实际的评估结论。 相似文献
90.
Gonzalo F-de-Córdoba 《Defence and Peace Economics》2016,27(4):549-570
This paper develops a Dynamic Stochastic General Equilibrium model where national security is an argument in the agent’s utility function and the government chooses optimally the level of military spending to maximize social welfare. National defense depends on military expenditure and on the strategic environment reflecting a potential hostile external threat. We use aggregate data on consumption, investment, and military spending for the US economy to estimate the parameters of the model. Estimation results suggest that consumption and national defense are complements and that military spending variability is mainly explained by external threat shocks although it also depends on the macroeconomic conditions. We compute impulse response functions of the main macroeconomic variables to several shocks: a total factor productivity shock, a defense technology shock, and a strategic environment shock. Surprisingly, we find that the optimal response to an increase in the external threat (a worsening in the strategic environment) will rise output by reducing consumption and increasing investment. 相似文献