首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   298篇
  免费   63篇
  国内免费   7篇
  2023年   3篇
  2022年   5篇
  2021年   8篇
  2020年   12篇
  2019年   20篇
  2018年   13篇
  2017年   32篇
  2016年   28篇
  2015年   16篇
  2014年   28篇
  2013年   39篇
  2012年   21篇
  2011年   15篇
  2010年   13篇
  2009年   19篇
  2008年   10篇
  2007年   7篇
  2006年   7篇
  2005年   15篇
  2004年   16篇
  2003年   6篇
  2002年   5篇
  2001年   4篇
  2000年   8篇
  1999年   2篇
  1998年   3篇
  1997年   1篇
  1996年   4篇
  1995年   3篇
  1993年   2篇
  1992年   1篇
  1990年   2篇
排序方式: 共有368条查询结果,搜索用时 15 毫秒
81.
针对现有卫星网络接入策略未能充分考虑卫星资源以及合理确定卫星资源权重问题,提出了一种基于资源平衡的星群网络连接接入策略。该策略充分考虑卫星的多种资源建立卫星资源评价模型,利用移动代理技术,采用层次分析法和熵值法计算各卫星资源的主观和客观权重,并通过Kullback散度权重优化方法对主客观权重进行平衡处理,判决过程兼顾了卫星的综合性能水平和用户偏好,提高了接入的准确性和合理性。仿真结果表明,采用该接入策略,有效改善了新呼叫阻塞率和强制中断率。  相似文献   
82.
One of the most important decisions that a firm faces in managing its supply chain is a procurement decision: selecting suitable suppliers among many potential competing sellers and reducing the purchase cost. While both auctions and bargaining have been extensively studied in the literature, the research that combines auctions and bargaining is limited. In this article, we consider a combined auction‐bargaining model in a setting where a single buyer procures an indivisible good from one of many competing sellers. The procurement model that we analyze is a sequential model consisting of the auction phase followed by the bargaining phase. In the auction phase, the sellers submit bids, and the seller with the lowest bid is selected as the winning bidder. In the bargaining phase, the buyer audits the cost of the winning seller and then negotiates with him to determine the final price. For this auction‐bargaining model, we find a symmetric equilibrium bidding strategy for the sellers in a closed form, which is simple to understand and closely related to the classical results in the auction and bargaining literature. We also show that the auction‐bargaining model generates at least as much profit to the buyer as the standard auction or sequential bargaining model. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
83.
提出一种基于能力的远程航空通信用频需求获取策略。分析了远程航空通信用频需求获取的基本思路。在此基础上,将远程航空通信用频需求自顶而下划分为任务需求、能力需求、效果需求3个层级,通过对层级进行定义和关系分析,给出基于能力的远程航空通信用频需求获取框架,最后对需求获取准则进行定义,得出一套较为科学有效的远程航空通信用频需求获取流程。  相似文献   
84.
传统的电子战接收系统的搜索方式主要针对参数完全未知的敌方信号,通过在频域、空域等各维度进行大范围的逐段重复搜索可在较长时间内获得较好的侦察效果,但不适合短时间内对特定目标群的搜索和验证。针对电子战接收机存在的盲目侦察接收、与作战目标结合不紧密等问题,提出了一种基于作战目标的侦察策略,能够智能引导超外差接收机进行搜索截获,有效提升了超外差接收机对重点目标的实时截获与准确识别能力。  相似文献   
85.
国家间的对抗与合作是国际关系中的最常见的问题,通过引入博弈论中的讨价还价模型和差分方程,分析了联盟的形成机制,并对三国合作、三国竞争以及三国部分合作对抗的情况进行了比较,通过数值仿真对模型分析过程进行了验证,仿真结果表明,不同类型国家的策略选择对博弈结果影响很大,研究内容较好地揭示了国家间矛盾与利益的变化规律,为深入理解国际关系提供了参考。  相似文献   
86.
AirSea Battle (ASB) has generated significant publicity, controversy, and debate among scholars, analysts, commentators, and observers of US defense strategy. However, a research gap exists concerning formal analysis of the impact of the operational concept on the relationship between the US Air Force (USAF) and the US Navy (USN). The impact of the ASB operational concept on the USAF–USN relationship is examined across the issue areas of strategy, budgets, weapons procurement, and training. These four issue areas represent important areas of historical conflict and competition between the Air Force and Navy. The conclusion is that ASB is ushering in a new era of Air Force–Navy partnership that advances the inter-service dynamic from “jointness” toward integration. The emergent USAF–USN partnership therefore represents a significant development in US defense politics and defense strategy.  相似文献   
87.
矩阵变换器自抗扰控制策略研究   总被引:2,自引:0,他引:2  
矩阵变换器的输出电压易受各种因素的影响,为了改善输出性能,将自抗扰控制技术应用于矩阵变换器的闭环控制中。分析了自抗扰控制器的特性,提出了一种双闭环自抗扰控制策略,即电流内环与电压外环均采用一阶简化的自抗扰控制算法。仿真结果表明:该方法不仅可以有效地抑制多种扰动的影响,而且比PI控制具有更优的动静态性能,可满足高性能矩阵变换器系统的控制要求。  相似文献   
88.
协同作战是提高体系作战能力,发挥整体作战效能的关键,针对单兵班组在未来信息化条件下单兵作战单元协同作战的协同模式、协同流程、协同策略,协同指挥、协同作战效能评估等方面进行阐释,对未来单兵信息系统班组协同作战技术研究具有一定的指导意义。  相似文献   
89.
In the face of rapid technological change and the creation of ambitious military modernisation programmes, this paper argues that land forces, in managing the relationship between force levels and the adoption of military robotics, must recognise that there are inherent limits to techno-centric force reduction efforts and realise the inefficacy of substituting skilled soldiers with robots. It begins with an overview of how the proper integration of robotics into a military’s force structure can improve capability, save lives and potentially reduce costs, but suggests that common accounts of robot utility are exaggerated and endanger the risk assessment processes governing the adoption of said technologies and relevant personnel settings. The paper explores the limits of robotic solutions to military problems, discussing their technical limitations, redundancy and related issues that, when combined with a technico-moral skills degradation problem also detailed within, point to the need to reshape force structures to suit the adoption of robotics while preserving existing levels of human staffing.  相似文献   
90.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号