首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   124篇
  免费   22篇
  国内免费   9篇
  2021年   6篇
  2020年   9篇
  2019年   9篇
  2018年   10篇
  2017年   12篇
  2016年   8篇
  2015年   6篇
  2014年   13篇
  2013年   28篇
  2012年   5篇
  2011年   6篇
  2010年   4篇
  2009年   4篇
  2008年   4篇
  2007年   4篇
  2006年   10篇
  2005年   2篇
  2004年   4篇
  2001年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
排序方式: 共有155条查询结果,搜索用时 46 毫秒
21.
以复杂网络理论为基础,对联合作战指挥网络进行拓扑抽象,将指挥机构视为网络的节点,将指挥关系视为网络的边,构建了传统树状指挥网络模型、增加同级边互联的改进型指挥网络模型和不同层级边互联的交叉互联型指挥网络模型。并分析了三种网络的网络特性,以网络化效能系数( CNE)作为度量指标,对三种网络抗毁性进行了比对分析,指出了未来联合作战指挥网络体系需要具备的特征,对探索信息化条件下高效的联合作战指挥进行了有益的探索。  相似文献   
22.
联合作战通信的完备性指标的建模分析与计算   总被引:1,自引:1,他引:0  
从联合作战用户对通信需求的实际出发,探讨了完备性指标的定义及数学描述,并根据通信节点和通信链路所受破坏的不同情况研究了完备性指标的几种分析方法,最后结合实例,采用其中一种全代数化的算法,并对其进行了改进来实现联合作战通信的完备性指标的计算.  相似文献   
23.
本文讨论了分段线性凸费用网络流问题,推广了线性费用网络流中的负回路方法和最小费用路方法,从而得到了求分段线性凸费用网络的最小费用流的两个算法。  相似文献   
24.
本文提出两种选址问题,对其局部最优性建立了充要条件,并在此基础上提出了该类问题的有效算法。  相似文献   
25.
王泽杰  张程 《国防科技》2018,39(3):099-104
大数据技术在决策领域的不断应用,将给装备保障决策方式带来重大变革。本文研究基于大数据的战区联合作战装备保障决策问题,提升信息化条件下装备保障准确、高效的决策方式等方面发挥重大作用。阐述了大数据的基本内涵,在决策领域的应用价值。通过系统推理的方法对战区联合作战装备保障决策的分析,提出基于大数据的战区联合作战装备保障决策基本构想,画出科学决策过程示意图,构建大数据战区联合作战装备保障辅助决策系统。结合研究大数据在战区联合作战装备保障决策领域的现实情况,提出相对应的措施建议。  相似文献   
26.
Given a number of patrollers that are required to detect an intruder in a channel, the channel patrol problem consists of determining the periodic trajectories that the patrollers must trace out so as to maximized the probability of detection of the intruder. We formulate this problem as an optimal control problem. We assume that the patrollers' sensors are imperfect and that their motions are subject to turn‐rate constraints, and that the intruder travels straight down a channel with constant speed. Using discretization of time and space, we approximate the optimal control problem with a large‐scale nonlinear programming problem which we solve to obtain an approximately stationary solution and a corresponding optimized trajectory for each patroller. In numerical tests for one, two, and three underwater patrollers, an underwater intruder, different trajectory constraints, several intruder speeds and other specific parameter choices, we obtain new insight—not easily obtained using simply geometric calculations—into efficient patrol trajectory design under certain conditions for multiple patrollers in a narrow channel where interaction between the patrollers is unavoidable due to their limited turn rate.© 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
27.
基于CPN建模的行动方案开发与分析系统设计   总被引:1,自引:0,他引:1  
协助和支持军事计划人员制订和分析作战计划的建模与仿真能力是军方的现行需求,而行动方案的开发与分析则是作战计划建模与仿真的重点。针对作战计划过程期间开发的军事任务的排序与调度问题,设计了一个行动方案开发与分析系统,系统采用客户机-服务器体系结构,运用基于有色Petri网建模的军事计划领域的概念表示法,并使用状态空间分析技术完成军事任务的自动化排序与调度。军事计划人员通过图形用户界面使用系统,在面对紧急突发事件时,可以快速及时地开发出适当可行的COA,并对COA进行逻辑可行性分析。  相似文献   
28.
It is known that the proportionate flow shop minimum makespan F m / p r p t / C max problem is solved optimally by any permutation job sequence. We show that the F m / p r p t / C max problem is at least ordinary NP‐hard when missing operations are allowed and present some solvable cases. We then consider the standard proportionate flow shop problem (with no missing operations) and show that the solution algorithms for a class of single‐machine due date assignment problems can be extended/generalized to the corresponding proportionate flow shop problems. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 98–106, 2015  相似文献   
29.
The building of reliable covers has always been of the utmost importance for clandestine Humint. Using both primary and secondary sources, this study seeks to examine how classical authors and modern scholars have dealt with this topic, and which kind of covers have been the most used throughout history in different sociopolitical contexts, and what are the new perspectives for today’s challenges. Findings suggest that a careful reading of the political milieu in which intelligence officers are required to work, and a certain degree of creativity, are the essential premises for the construction of a plausible cover; that some apparently outdated disguises such as merchants, itinerant monks and philosophers should be understood more broadly today to include business people, humanitarian NGOs and academics; that undercover practices have been theoretically and historically recognized as necessary and convenient by a great number of societies, often with scant regard for ethical considerations.  相似文献   
30.
Do ceasefires or peace talks create fragmentation in the insurgent groups? Rather than proposing claims that can offer predictions about armed groups behaviour under ceasefires or peace processes, the analysts tend to focus largely on the dynamics between state and non-state actor. The experts pay little attention to overtime changes in social and local political context which might contribute to propelling a rebel group towards fragmentation and factionalism. The present study intends to fill this gap by exploring the shifting role of public opinion and ethnic support for the peace talks to ascertain whether it can increase the likelihood of factionalism in rebel groups or not. This article applies this approach to the case of Naga National Movement (1947–2015) in India, and finds that the proposed variable appears to have increased the frequency of factionalism in the movement.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号