首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   356篇
  免费   83篇
  国内免费   11篇
  2023年   3篇
  2022年   4篇
  2021年   2篇
  2020年   7篇
  2019年   7篇
  2018年   2篇
  2017年   13篇
  2016年   20篇
  2015年   10篇
  2014年   23篇
  2013年   22篇
  2012年   24篇
  2011年   17篇
  2010年   26篇
  2009年   30篇
  2008年   24篇
  2007年   30篇
  2006年   30篇
  2005年   14篇
  2004年   25篇
  2003年   16篇
  2002年   15篇
  2001年   14篇
  2000年   13篇
  1999年   8篇
  1998年   5篇
  1997年   4篇
  1996年   11篇
  1995年   7篇
  1994年   2篇
  1993年   4篇
  1992年   5篇
  1991年   4篇
  1990年   5篇
  1989年   4篇
排序方式: 共有450条查询结果,搜索用时 15 毫秒
121.
针对不确定信息下反导拦截效果评估过程中指标信息和权重信息都不确定,传统评估方法很难加以解决的问题,使用区间数和随机多属性可接受性分析(SMAA)相结合的方法对反导拦截效果进行了评估。首先,根据来袭弹道导弹目标的毁伤程度划分了拦截效果等级;然后,针对观测信息的不确定性,采用区间数和隶属函数对特征指标进行了表示;在此基础上,通过引入SMAA方法,计算和比较拦截效果为各拦截等级的可接受性指标和信任因子,对不确定信息下反导拦截效果进行了评估。实例计算结果表明所介绍的不确定信息下反导拦截效果评估方法是可行的。  相似文献   
122.
多火力单元责任扇区的动态调整是防空导弹指挥控制系统的核心功能之一,通过引入可打击目标数和覆盖目标数的概念及计算方法,提出了一种新的多火力单元责任扇区调整方法。该方法能快速有效地确定多火力单元责任扇区调整方案。  相似文献   
123.
提出一种基于双幂次组合函数趋近律的新型滑模控制方案。与现有的快速幂次或双幂次趋近律相比,具有更快的收敛速度,同时还保持了全局固定时间收敛特性,收敛时间上界与滑模初值无关。当系统存在有界扰动时,能够使滑模变量在有限时间内收敛到稳态误差界内,同时其稳态误差要小于现有方法的。仿真实验验证了该方法的有效性及理论分析的正确性。  相似文献   
124.
《防务技术》2014,10(3):251-260
The activated TIG (ATIG) welding process mainly focuses on increasing the depth of penetration and the reduction in the width of weld bead has not been paid much attention. The shape of a weld in terms of its width-to-depth ratio known as aspect ratio has a marked influence on its solidification cracking tendency. The major influencing ATIG welding parameters, such as electrode gap, travel speed, current and voltage, that aid in controlling the aspect ratio of DSS joints, must be optimized to obtain desirable aspect ratio for DSS joints. Hence in this study, the above parameters of ATIG welding for aspect ratio of ASTM/UNS S32205 DSS welds are optimized by using Taguchi orthogonal array (OA) experimental design and other statistical tools such as Analysis of Variance (ANOVA) and Pooled ANOVA techniques. The optimum process parameters are found to be 1 mm electrode gap, 130 mm/min travel speed, 140 A current and 12 V voltage. The aspect ratio and the ferrite content for the DSS joints fabricated using the optimized ATIG parameters are found to be well within the acceptable range and there is no macroscopically evident solidification cracking.  相似文献   
125.
We consider the burglar problem in which a burglar can either retire or choose among different types of burglaries, with each type having its own success probability and reward distribution. Some general structural results are established and, in the case of exponentially distributed reward distributions, a solution technique is presented. The burglar problem's relationship to a stochastic knapsack problem with a random exponentially distributed knapsack capacity is shown. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 359–364, 2014  相似文献   
126.
功耗与延迟是无线传感器网络介质访问控制协议设计首要考虑的两个问题。提出了一种新的传感器网络低延迟、低功耗、接收节点初始化异步介质访问控制协议——THO-MAC协议。通过准确预测接收节点的唤醒时间,THO-MAC协议调度发送节点侦听信道,从而减少发送节点空闲侦听能量浪费。THOMAC协议在发送节点两跳转发节点集中选择使报文两跳转发延迟最小的转发节点,从而降低报文传输延迟。使用NS2模拟器对THO-MAC协议进行了详细模拟。模拟结果显示,与RI-MAC和Any-MAC协议相比,THOMAC协议可以减少35.5%和18%的报文传输延迟,同时节省23.5%和15.5%的节点功耗。  相似文献   
127.
In this article, we address a stochastic generalized assignment machine scheduling problem in which the processing times of jobs are assumed to be random variables. We develop a branch‐and‐price (B&P) approach for solving this problem wherein the pricing problem is separable with respect to each machine, and has the structure of a multidimensional knapsack problem. In addition, we explore two other extensions of this method—one that utilizes a dual‐stabilization technique and another that incorporates an advanced‐start procedure to obtain an initial feasible solution. We compare the performance of these methods with that of the branch‐and‐cut (B&C) method within CPLEX. Our results show that all B&P‐based approaches perform better than the B&C method, with the best performance obtained for the B&P procedure that includes both the extensions aforementioned. We also utilize a Monte Carlo method within the B&P scheme, which affords the use of a small subset of scenarios at a time to estimate the “true” optimal objective function value. Our experimental investigation reveals that this approach readily yields solutions lying within 5% of optimality, while providing more than a 10‐fold savings in CPU times in comparison with the best of the other proposed B&P procedures. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 131–143, 2014  相似文献   
128.
对因素权重为实数、因素状态值为模糊数的多因素不确定性决策问题,由实数型状态变权向量导出模糊数状态变权向量,得出模糊数变权公式,建立模糊数变权综合决策模型,最后给出一个应用模糊数变权综合决策模型的实例.  相似文献   
129.
Unlike most of the literature, this paper includes domestic political considerations in which two countries must decide defensive countermeasures against a common terrorist threat. A delegation problem arises as voters strategically choose a policymaker whose preferences differ from their own. As a consequence, countries limit the presumed oversupply of defensive countermeasures. Thus, the inclusion of domestic politics gives a new perspective on counterterrorism. The timing of elections is also shown to make a difference.  相似文献   
130.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号