首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   55篇
  免费   12篇
  国内免费   11篇
  2022年   1篇
  2021年   3篇
  2020年   3篇
  2019年   1篇
  2018年   3篇
  2017年   2篇
  2016年   2篇
  2015年   2篇
  2014年   12篇
  2013年   15篇
  2012年   5篇
  2011年   4篇
  2010年   4篇
  2009年   2篇
  2006年   2篇
  2005年   2篇
  2004年   1篇
  2003年   2篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1996年   2篇
  1991年   1篇
  1990年   1篇
排序方式: 共有78条查询结果,搜索用时 234 毫秒
11.
网络中心作战体系效能评估方法初探   总被引:2,自引:0,他引:2  
网络中心作战体系是信息化战争要求下的一个具体作战体系,其效能评估是网络中心战研究领域的重要问题,是解决网络中心作战体系建设中方案论证、性能效能指标、经济因素等诸多问题的有效方法。首先提出了网络中心作战体系效能评估的基本概念;然后阐述了网络中心作战体系效能评估方法问题,分析介绍了几种较为成熟的评估方法的特点、适用性和不足;最后提出一种基于探索性建模与分析方法的网络中心作战体系效能评估框架,作为研究网络中心作战体系效能评估的参考评估框架。  相似文献   
12.
Kovenock and Roberson's [2011] comment provides initial work which has the potential, when suitably extended, to advance the research frontier. Kovenock and Roberson's paper consists of three sections. The first section is an interesting introduction. The second section, titled ‘Model and Main Result,’ provides no contribution beyond Hausken [2008a]. It consists of Equations (1)–(10) which are equivalent to equations developed by Hausken, and Equation (11) which is equivalent to the utility requirements u???0 and U???0 provided after Equation (17) in Hausken. The third section provides interesting ideas about mixed-strategy equilibria that can be extended in future research.  相似文献   
13.
为了提高网络防御建模的有效性,本文提出了应用多Agent对网络防御进行建模的方法。并且分析了多Agent的建模仿真流程,通过多Agent建模仿真方法,建立了分布式拒绝服务攻击的防御模型。最后,用Netlogo软件进行了仿真实验,通过仿真结果验证了防御模型的有效性。  相似文献   
14.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
15.
During the Nigerian Civil War (1967–1970), France chose to support Biafra, but only on a limited scale, providing mercenaries and obsolete weaponry to Ojukwu's regime. General Charles de Gaulle's assistance to Ojukwu was conditioned by the French military drawdown after 1961, the increased power of French secret services on the continent, and the interventions in Katanga (1960–1963), Gabon (1964) and Chad (1968–1972). France supported Biafra primarily to protect its former colonies from Nigeria, stop Soviet subversion and acquire an economic foothold in the oil-rich Niger Delta. De Gaulle chose a limited strategy for two reasons. If Biafra won the war, France would be Biafra's greatest ally. If Nigeria won the war, France could extricate itself from the situation relatively easily and re-establish relations with the Nigerian government, which is what ultimately occurred.  相似文献   
16.
On 4 January 1961 in Baixa do Cassange, in the north of Angola, the blacks who worked in the cotton fields began a strike. The army with air support was called to quell the rebellion, and the article emphasizes the importance of air support tethered to the ground forces, particularly in a remote and vast area of operations in the tropical rainy season. In this case, the support originally came in the form a squadron of Lockheed PV-2 Harpoons from Luanda, some 300 kilometers away. These open-ocean reconnaissance aircraft and their crews were ill-suited for the task. When this became apparent, four small Auster D5/160s were relocated from Negage to Malange, among the ground forces. The Austers flew reconnaissance missions over the troubled zones, dropped provisions and messages to the advancing ground forces, and served as a backup communications link. When the strike ceased after three weeks, the Austers assumed a humanitarian role in support of the starving population. The conclusion is that air support to ground forces is indispensable, must be properly tailored to the job, and must operate as an integral part of the ground forces.  相似文献   
17.
采用工作结构分解(Work Breakdown Structure,WBS)和风险结构分解法(Risk Breakdown Structure,RBS)对装备保障综合演练全过程的风险及其风险因素进行了系统分析,得出了装备保障综合演练过程中存在的7类风险、24种风险因素;运用网络层次分析法(Analytic Network Process,ANP)对各种风险及其风险因素进行了评估,得出了其对装备保障综合演练风险影响的权重及排序。研究结果可为装备保障综合演练顺利开展,确保人员、装备安全提供参考。  相似文献   
18.
提出一种构造分布式信息融合系统的拓扑结构的新方法.首先,简要介绍了该问题的研究现状;然后,在对目前使用的网络结构进行深入分析的基础上,提出了基于多层de Bruijn网的分布式信息融合系统网络拓扑结构及其构造方法;最后讨论了上述网络结构的路由问题.  相似文献   
19.
小波阈值技术在图像降噪中的应用研究   总被引:18,自引:0,他引:18       下载免费PDF全文
通过对图像的小波变换系数进行阈值操作,可以有效降低噪声,同时又较好地保持图像细节。在文章中详细讨论了这种小波阈值降噪技术,并给出了在此种降噪方法中阈值选取的几种方法。由实验结果可以知道此种小波阈值方法是一种有效的图像降噪方法。  相似文献   
20.
1 引言 Leapfrog sCF具有低灵敏度特性。但在低通情况下,由于开关电容模拟输人电阻的近似性,使得Lcapfrog scF的灵敏度特性变差二。文献[2贻出了设计低灵敏度scF的状态空间法,描述了满足低灵敏度和零灵敏度的矩阵条件,·但未给出寻求满足一定条件的变换矩阵的系统方法。本文在文献口汹基础上,导出了具  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号