首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39篇
  免费   1篇
  2019年   3篇
  2018年   1篇
  2017年   2篇
  2016年   1篇
  2015年   1篇
  2013年   1篇
  2012年   1篇
  2011年   1篇
  2010年   2篇
  2009年   2篇
  2007年   1篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   2篇
  2002年   2篇
  2001年   7篇
  2000年   1篇
  1998年   1篇
  1976年   1篇
  1975年   1篇
排序方式: 共有40条查询结果,搜索用时 375 毫秒
31.
兵力部署是指挥员组织实施战斗的重要工作,也是实现战斗决心的重要条件。在分析兵力部署原则基础上,结合兵种配置的地形条件和战术条件,提出了兵力部署适应度函数。采用遗传算法,设计了适应于数字地形分析的编码方案。实验证明,遗传算法能够有效解决兵力部署的智能化自动生成和评价问题,方法可行。  相似文献   
32.
33.
介绍图像处理技术在桨叶表面应力分布测试试验中的应用情况 ,对实际使用中的图像处理技术进行了较详细的分析讨论 .经过处理后的桨叶试验图像 ,不仅增加了图像的清晰程度 ,而且从中可获得半定量以至定量的参数 ,以帮助对桨叶表面应力分布进行分析  相似文献   
34.
弹道导弹的突防与拦截   总被引:15,自引:2,他引:13  
简述了弹道导弹在现代战争中的重要性。在介绍美国的国家导弹防御系统 (NMD)的基础上 ,针对其使用的拦截手段 ,重点分析了弹道导弹可采取的突防措施。  相似文献   
35.
零知识证明是密码学关注的问题之一。在可判定条件下,运用代数学中群的共轭性质进行零知识证明,其实例就是数学中关于寻找共轭子的困难性问题。  相似文献   
36.
This article offers a new analysis of radionuclide and hydroacoustic data to support a low-yield nuclear weapon test as a plausible explanation for the still contentious 22 September 1979 Vela Incident, in which U.S. satellite Vela 6911 detected an optical signal characteristic of an atmospheric nuclear explosion over the Southern Indian or Atlantic Ocean. Based on documents not previously widely available, as well as recently declassified papers and letters, this article concludes that iodine-131 found in the thyroids of some Australian sheep would be consistent with them having grazed in the path of a potential radioactive fallout plume from a 22 September low-yield nuclear test in the Southern Indian Ocean. Further, several declassified letters and reports which describe aspects of still classified hydroacoustic reports and data favor the test scenario. The radionuclide and hydroacoustic data taken together with the analysis of the double-flash optical signal picked up by Vela 6911 that was described in a companion 2017 article (“The 22 September 1979 Vela Incident: The Detected Double-Flash”) can be traced back to sources with similar spatial and temporal origins and serve as a strong indicator for a nuclear explosion being responsible for the 22 September 1979 Vela Incident.  相似文献   
37.
CPN在海上防空建模中的应用   总被引:7,自引:2,他引:5  
着色 Petri网 (CP-网或 CPN )是一种面向图形的语言 ,用来设计、说明、模拟和验证系统。尤其适用于通信系统等同步和资源共享占有重要地位的系统。在通信协议、分步式系统、嵌入系统、自动生产系统、工作流分析、VL SI芯片等方面都有典型的应用。本文简单介绍了 CPN的发展过程和基本原理 ,重点就 CPN在海上防空系统建模仿真中的应用进行了探讨  相似文献   
38.
通过研究椭圆曲线群,给出基于其上的2个零知识证明方案,这2个方案均使得甲方向乙方宣称自己拥有某种信息,并通过互动证明使其确信具有该信息,但同时还未泄漏该信息。  相似文献   
39.
Most countries put significant amounts of time and effort in writing and issuing high-level policy documents. These are supposed to guide subsequent national defence efforts. But do they? And how do countries even try to ensure that they do? This paper reports on a benchmarking effort of how a few “best of breed” small- to medium-sized defence organisations (Australia, Canada, and New Zealand) deal with these issues. We find that most countries fail to link goals to resources and pay limited attention to specific and rigorous ex-ante or post-hoc evaluation, even when compared to their own national government-wide provisions. We do, however, observe a (modest) trend towards putting more specific goals and metrics in these documents that can be – and in a few rare cases were – tracked. The paper identifies 42 concrete policy “nuggets” – both “do’s and don’ts” – that should be of interest to most defence policy planning/analysis communities. It ends with two recommendations that are in line with recent broader (non-defence) scholarship on the policy formulation-policy implementation gap: to put more rigorous emphasis on implementation (especially on achieving desired policy effects), but to do so increasingly in more experiential (“design”) ways, rather than in industrial-age bureaucratic ones (“PPBS”-systems).  相似文献   
40.
ABSTRACT

Increasingly, academic research in conflict-affected contexts relies on support from humanitarian organizations. Humanitarian organizations constitute sites of study in and of themselves; they partner with academics to roll out surveys or randomized program interventions; and they frequently facilitate security, logistics and transportation for independent researchers. We use a research partnership between IRC, the World Bank, and academic researchers in the UK, the US and eastern DR Congo, to explore the effects of humanitarian affiliation on conflict field research. In investigating when, how and under what conditions humanitarian identities are adopted by researchers (and how these affiliations shape research dynamics) we identify three paradoxes. First, “wearing humanitarian clothes” to facilitate research logistics can both facilitate and constrain access. Second, humanitarian affiliations invoked by researchers to ensure security and protection in volatile research sites can undermine the “insider” status of local staff. Finally, working through humanitarian organizations allows local and international researchers to benefit from the protections and privileges afforded to humanitarian employees without providing any of the services on which privileged access rests. In this article, we map out decisions faced by local and international researchers concerning when to adopt and discard humanitarian identities, and the fraught logistical, ethical and methodological consequences of these decisions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号