首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   569篇
  免费   87篇
  国内免费   42篇
  2023年   3篇
  2022年   8篇
  2021年   14篇
  2020年   13篇
  2019年   13篇
  2018年   10篇
  2017年   23篇
  2016年   30篇
  2015年   21篇
  2014年   43篇
  2013年   50篇
  2012年   44篇
  2011年   46篇
  2010年   31篇
  2009年   53篇
  2008年   23篇
  2007年   36篇
  2006年   48篇
  2005年   38篇
  2004年   28篇
  2003年   25篇
  2002年   11篇
  2001年   16篇
  2000年   15篇
  1999年   6篇
  1998年   6篇
  1997年   4篇
  1996年   6篇
  1995年   7篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   8篇
  1990年   9篇
  1989年   2篇
排序方式: 共有698条查询结果,搜索用时 31 毫秒
691.
证据理论与模糊神经网络相结合的身份估计方法   总被引:7,自引:0,他引:7  
重点研究了在数据融合身份估计领域中D-S证据理论与模糊神经网络相结合的多传感器数据融合方法。Demp-ster-Shafer证据理论方法是对Beyes决策检验法的推广,证据理论比概率论满足更弱的公理系统,并且在区分不确定与不知道等方面显示了很大的灵活性,但是在基于证据理论的身份估计融合中,基本可信度的分配是一个与应用密切相关的问题,也是实际应用中最难的一步。利用模糊神经网络来处理证据理论中的基本可信度分配问题,并对几种空中目标进行了身份估计数据融合,经计算机仿真实验证实了该方法的有效性。  相似文献   
692.
Consider a distributed system where many gatekeepers share a single server. Customers arrive at each gatekeeper according to independent Poisson processes with different rates. Upon arrival of a new customer, the gatekeeper has to decide whether to admit the customer by sending it to the server, or to block it. Blocking costs nothing. The gatekeeper receives a reward after a customer completes the service, and incurs a cost if an admitted customer finds a busy server and therefore has to leave the system. Assuming an exponential service distribution, we formulate the problem as an n‐person non‐zero‐sum game in which each gatekeeper is interested in maximizing its own long‐run average reward. The key result is that each gatekeeper's optimal policy is that of a threshold type regardless what other gatekeepers do. We then derive Nash equilibria and discuss interesting insights. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 702–718, 2003.  相似文献   
693.
There are multiple damage functions in the literature to estimate the probability that a single weapon detonation destroys a point target. This paper addresses differences in the tails of four of the more popular damage functions. These four cover the asymptotic tail behaviors of all monotonically decreasing damage functions with well‐behaved hazard functions. The differences in estimates of probability of kill are quite dramatic for large aim‐point offsets. This is particularly important when balancing the number of threats that can be engaged with the chances of fratricide and collateral damage. In general, analysts substituting one damage function for another may badly estimate kill probabilities in offset‐aiming, which could result in poor doctrine. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 306–321, 2003.  相似文献   
694.
立足减少火灾对人类的危害 ,从哲学的视角剖析火灾形成的认识论基础。主要从自然观、人类实践行为、人的消费观念及价值取向进行全面论述 ,揭示当代火灾形成的直接原因、社会因素和思想根源。  相似文献   
695.
运用灰色系统理论中的灰色关联分析法对舰船生命力进行了综合评判,建立了在不同设计方案中的优选模型,并以舰艇动力系统的设计为例,运用GRA对其进行优化选型。结果分析表明,此方法简单易行,结果准确可靠,可为系统设计方案的选优提供理论依据。  相似文献   
696.
The current combat motivation model based on primary group thesis assumes that the main force behind motivation is peer-bonding or otherwise known as unit cohesion. Cohesion is perceived as an all-encompassing factor that leads to satisfactory (or unsatisfactory in lack thereof) military effectiveness and performance in conflict environments. However, the article identifies three main problems with this perspective: 1. mono-dimensional view of motivation; 2. motivation based on heteronomy, and 3. self-reporting bias. The current model does not consider motivation as a separate entity from cohesion; it does not place motivation as fundamental human value; lastly, it takes motivation as granted by-product of socialization. The article proposes a new combat motivation model based on The Self-Determination Theory. The theory maintains that human motivation requires satisfaction of three psychological needs of competence, relatedness, and autonomy. The degree of satisfaction of those three needs leads to different types of regulated motivations – a continuum from intrinsic to extrinsic – each of which has specifiable consequences for learning, performance, and well-being of an individual.  相似文献   
697.
ABSTRACT

This article constitutes an attempt to demonstrate the complexity of factors affecting the legitimate acquisition and reasonable exercise by a political community of the right to war as specified in the just war criteria of jus ad bellum. To achieve this purpose, a brief analysis is presented of the intentional participation in World War I of thousands of Polish volunteers forming military units deployed by the Central Powers on the Austrian-Russian front. Considered in light of the standard principles of just war, the military enterprise of the Polish Legions, as they were called, turns out to be a paradoxical instance of warfare which, while being part of a state-to-state aggression, must be deemed compliant with all the principles in question. As a means of explaining this paradox, a modification of the concept of justified intervention is proposed, embracing military efforts aimed at the ultimate defeat of all the (unjustly) warring parties operating within a given territory. In consonance with the classic just war approach, it is also argued that the justification for such an intervention is essentially dependent on its being initiated by, or attributable to, an unquestionable state agent acting in defence of the state’s basic prerogatives.  相似文献   
698.
ABSTRACT

The strategic culture approach has been suffering from a prolonged theoretical stalemate, despite a surge in case studies, which culminated in the Johnston-Gray debate and subsequent schism. The present paper outlines a new approach designed to overcome this deadlock, and consists of three arguments. First, the three previous generations of strategic culture studies have failed to explain how strategic culture influences behaviour. Second, aligning strategic culture theory-building with discursive institutionalism offers a way to overcome this fundamental fallacy. Third, a research programme for strategic culture should draw on computational social science to enable it to present and test middle-range theories.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号