首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   113篇
  免费   27篇
  国内免费   5篇
  2023年   2篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   3篇
  2018年   1篇
  2017年   6篇
  2016年   2篇
  2015年   1篇
  2014年   5篇
  2013年   3篇
  2012年   11篇
  2011年   8篇
  2010年   3篇
  2009年   12篇
  2008年   11篇
  2007年   6篇
  2006年   7篇
  2005年   8篇
  2004年   10篇
  2003年   11篇
  2002年   4篇
  2001年   4篇
  2000年   3篇
  1999年   2篇
  1998年   3篇
  1997年   1篇
  1996年   1篇
  1995年   2篇
  1994年   2篇
  1993年   1篇
  1992年   4篇
  1991年   2篇
  1990年   2篇
  1988年   1篇
排序方式: 共有145条查询结果,搜索用时 31 毫秒
21.
一种模糊自适应INS/GPS组合导航方法   总被引:6,自引:0,他引:6  
提出了一种基于模糊逻辑的自适应卡尔曼滤波新算法,即基于滤波数据残差构造一种模糊算法,以自适应控制卡尔曼滤波器的增益系数。从而可以消除异常的测量数据带来的影响,使滤波器的残差始终保持零均值,且使估计误差的协方差阵收敛,最终实现最优估计。通过对INS/GPS组合导航系统的计算机仿真结果表明,该算法具有比常规卡尔曼滤波算法更高的导航精度。  相似文献   
22.
针对通用发控单元的维护需求和共架武器系统的训练需求,设计了通用筒弹模拟系统.该系统通过1553B总线与通用发控单元通信,实现了筒弹功能模拟和筒弹故障模拟.经测试,该系统运行稳定可靠,各项功能满足设计指标.  相似文献   
23.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
24.
分析了装备保障组织作为一个开放的复杂系统,面对信息化所带来的巨大变化,其结构变革的必然性以及变革所要遵循的基本原则,指出了信息化时代装备保障组织所应具有的基本特征。  相似文献   
25.
We have used the Michigan Model of World Production and Trade to assess the impact of exports and imports of armaments (based on 1980 data) on sectoral trade and employment and other economic variables in the major Western trading countries. If the United States were to place a unilateral embargo on its arms exports and imports, we calculate that it would experience a comparatively small amount of employment displacement in the aggregate and that most of this displacement would occur in the transport equipment and electric machinery sectors. If all the major Western countries were to place a multilateral embargo on their arms trade, the sectoral effects on the United States would be similarly small. But the sectoral effects in several other industrialized and developing countries measured as a percentage of sectoral employment, would be larger, indicating potential short‐run adjustment problems in labor markets in some cases.  相似文献   
26.
广义模型的音频分析方法   总被引:1,自引:0,他引:1  
目前网络数据中包含有大量的多媒体数据,音频作为多媒体信息的重要载体之一,蕴涵了丰富的语义,有效地丰富和补充了人们对信息的感知和获取。而目前的多媒体检索主要利用的是常规的信息检索技术诸如视觉信息,往往忽略了音频信息,这已不能满足需要。音频信息检索就逐渐成为多媒体信息检索的研究重点之一。基于此,针对音频信息检索问题展开讨论,提出一种利用广义模型进行音频分析的新方法。该方法可应用到音频检索中,实验证明了该方法的有效性。  相似文献   
27.
以参数大范围变化的导弹为研究对象,分别设计PID控制器和模糊控制器,并对PID控制器和模糊控制器组成的稳定回路进行仿真,仿真结果表明,PID控制器不能适应参数大范围的变化,表现为容易产生超调。简单模糊控制器对外界参数具有较好的适应性和鲁棒性,但存在稳态误差,通过采取模糊——积分并联混合,改善了模糊控制的稳态性能,提高了模糊控制的稳态精度。  相似文献   
28.
Discrete‐time queues with D‐MAP arrival process are more useful in modeling and performance analysis of telecommunication networks based on the ATM environment. This paper analyzes a finite‐buffer discrete‐time queue with general bulk‐service rule, wherein the arrival process is D‐MAP and service times are arbitrarily and independently distributed. The distributions of buffer contents at various epochs (departure, random, and prearrival) have been obtained using imbedded Markov chain and supplementary variable methods. Finally, some performance measures such as loss probability and average delay are discussed. Numerical results are also presented in some cases. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 345–363, 2003.  相似文献   
29.
一种用模糊逻辑控制的新型三相电压型PWM整流器   总被引:1,自引:0,他引:1  
介绍一种基于模糊逻辑的三相AC/DC空间矢量变流技术方法,该方法软件结构简单,便于技术实现.应用该方法研制的样机,谐波失真THD值小于3.9%.  相似文献   
30.
We consider the scheduling of large‐scale projects to maximize the project net present value given temporal and resource constraints. The net present value objective emphasizes the financial aspects of project management. Temporal constraints between the start times of activities make it possible to handle practical problem assumptions. Scarce resources are an expression of rising cost. Since optimization techniques are not expedient to solve such problems and most heuristic methods known from literature cannot deal with general temporal constraints, we propose a new bidirectional priority‐rule based method. Scheduling activities with positive cash flows as early and activities with negative cash flows as late as possible results in a method which is completed by unscheduling techniques to cope with scarce resources. In a computational experiment, we compare the well‐known serial generation scheme where all activities are scheduled as early as possible with the proposed bidirectional approach. On the basis of a comprehensive data set known from literature containing instances with up to 1002 activities, the efficiency of the new approach is demonstrated. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号