首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   313篇
  免费   51篇
  国内免费   20篇
  2023年   3篇
  2022年   4篇
  2021年   8篇
  2020年   11篇
  2019年   14篇
  2018年   9篇
  2017年   19篇
  2016年   18篇
  2015年   12篇
  2014年   32篇
  2013年   119篇
  2012年   18篇
  2011年   14篇
  2010年   7篇
  2009年   11篇
  2008年   12篇
  2007年   21篇
  2006年   13篇
  2005年   8篇
  2004年   5篇
  2003年   4篇
  2002年   6篇
  2001年   3篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1991年   1篇
  1989年   2篇
排序方式: 共有384条查询结果,搜索用时 31 毫秒
31.
防空导弹武器系统目标分配的多种算法   总被引:6,自引:0,他引:6  
叙述了防空导弹武器系统目标分配的一般数学模型。在此基础上,建立了防空导弹的5种目标分配数学优化算法,并讨论了数学模型的求解问题。最后,对这5种数学优化算法进行了比较。  相似文献   
32.
就日本遗弃化学武器紧急处置中的挖掘清理技术进行了论述。着重论述了紧急处置现场的设置、挖掘方法步骤、程序、初始位置的挖掘以及污染物的包装等技术。同时,介绍了该技术在南京黄胡子山等地日本遗弃化学武器紧急处置中的应用情况。并对挖掘方法、进度及现场管理等工作提出了探讨性建议。  相似文献   
33.
We consider a short‐term capacity allocation problem with tool and setup constraints that arises in the context of operational planning in a semiconductor wafer fabrication facility. The problem is that of allocating the available capacity of parallel nonidentical machines to available work‐in‐process (WIP) inventory of operations. Each machine can process a subset of the operations and a tool setup is required on a machine to change processing from one operation to another. Both the number of tools available for an operation and the number of setups that can be performed on a machine during a specified time horizon are limited. We formulate this problem as a degree‐constrained network flow problem on a bipartite graph, show that the problem is NP‐hard, and propose constant factor approximation algorithms. We also develop constructive heuristics and a greedy randomized adaptive search procedure for the problem. Our computational experiments demonstrate that our solution procedures solve the problem efficiently, rendering the use of our algorithms in real environment feasible. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
34.
An area defense consists of several groups that act independently, i.e., do not communicate with each other. Each group has a fixed number of defenders and a controller that allocates these defenders optimally against the individual attackers comprising an attack. We analyze the effectiveness of this partially coordinated defense against a simultaneous attack of known size in which all attackers are considered to be equally lethal. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
35.
武器装备命名研究在我国是一个比较新的课题。宏观上分析武器装备命名的特点有助于确立新课题的框架,为进一步深入研究奠定基础。总体而言,武器装备命名有着政治、军事、民族、历史四个方面的特点。  相似文献   
36.
高等教育资源的合理配置是提高高校办学质量和效益的前提和关键。本文通过梳理新疆高等教育资源配置现状及存在的具体问题,进一步提出优化高等教育资源配置的对策建议,以期充分发挥高等教育在新疆社会发展中的巨大作用。  相似文献   
37.
针对用线性规划方法在解决弹药调拨供应决策过程中存在的弹药调拨供应量的分配与弹药保障原则关联不紧密的问题,采用目标规划理论与方法,引入优先级区分主要作战方向和次要作战方向弹药库的重要程度,在同一优先级上以权重区分一梯队、二梯队及预备队弹药库的弹药保障优先顺序,使得模型的构建过程与弹药保障原则紧密相联。同时,在模型构建过程中,综合考虑了弹药消耗预测量、弹药储备标准和弹药运输时限等因素对弹药调拨供应决策的影响,并从本级弹药储备不足和充足两种情况进行了数值模型及分析,验证了模型的正确性与可靠性,为弹药调拨供应提供了决策支持与理论支撑。  相似文献   
38.
在明确武器装备体系相关概念、特点的基础上,总结比较了目前体系结构描述方法和工具的优缺点,针对新形式对武器装备体系结构描述方法的选择提出了要求,并指出了武器装备体系要解决的“短板”问题.  相似文献   
39.
The laser technology has made remarkable progress over the past couple of decades.It is being widely employed in diverse domains,such as holography,space sciences,spectroscopy,medical sciences,micro and power electronics,industrial engineering,and most distinctively,as directed energy military weapons.Owing to their active transmissions,laser systems are similar to microwave radars to some extent;however,unlike conventional radars,the laser operates at very high frequencies thus making it a potent enabler of narrow-beam and high energy aerial deployments,both in offensive and defensive roles.In modern avionics systems,laser target indicators and beam riders are the most common devices that are used to direct the Laser Guided Weapons(LGW)accurately to the ground targets.Additionally,compact size and outstanding angular resolution of laser-based systems motivate their use for drones and unmanned aerial applications.Moreover,the narrow-beam divergence of laser emissions offers a low probability of intercept,making it a suitable contender for secure transmissions and safety-critical operations.Furthermore,the developments in space sciences and laser technology have given syner-gistic potential outcomes to use laser systems in space operations.This paper comprehensively reviews laser applications and projects for strategic defense actions on the ground or in space.Additionally,a detailed analysis has been done on recent advancements of the laser technology for target indicators and range-finders.It also reviews the advancements in the field of laser communications for surveillance,its earlier state of the art,and ongoing scientific research and ad-vancements in the domain of high energy directed laser weapons that have revolutionized the evolving military battlefield.Besides offering a comprehensive taxonomy,the paper also critically analyzes some of the recent contributions in the associated domains.  相似文献   
40.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号