首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   149篇
  免费   13篇
  国内免费   24篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   1篇
  2020年   2篇
  2019年   2篇
  2017年   16篇
  2016年   18篇
  2015年   7篇
  2014年   14篇
  2013年   11篇
  2012年   16篇
  2011年   15篇
  2010年   4篇
  2009年   10篇
  2008年   9篇
  2007年   10篇
  2006年   17篇
  2005年   10篇
  2004年   5篇
  2003年   7篇
  2002年   2篇
  2001年   4篇
  1999年   2篇
  1997年   1篇
排序方式: 共有186条查询结果,搜索用时 15 毫秒
31.
We consider the problem of identifying the simulated system with the best expected performance measure when the number of alternatives is finite and small (often < 500). Recently, more research efforts in the simulation community have been directed to develop ranking and selection (R&S) procedures capable of exploiting variance reduction techniques (especially the control variates). In this article, we propose new R&S procedures that can jointly use control variates and correlation induction techniques (including antithetic variates and Latin hypercube sampling). Empirical results and a realistic illustration show that the proposed procedures outperform the conventional procedures using sample means or control variates alone. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   
32.
Asia, where nuclear powers already interact (including North Korea), exerts a growing influence on the thinking and policy underlying Russia's current and future nuclear (and overall defense) posture. China's rise is forcing Russia into a greater reliance on strategic offensive weapons and tactical nuclear weapons. These in turn will reinforce its opposition to US missile defenses, not only in Europe but also in Asia. Russia must now entertain the possibility of nuclear use in regional conflicts that would otherwise remain purely conventional. It cannot be postulated blindly that nuclear weapons serve no discernible purpose other than to deter nuclear attacks by other nuclear powers. The strategic equation in Asia and in the Russian Far East convincingly demonstrates the falsity of this approach. Nuclear weapons will be the essential component of Russia's regional defense policy if not of its overall policies – and this also includes contingencies in Europe.  相似文献   
33.
简要介绍了潜艇威胁判断原理和D-S证据推理基本思想。针对潜艇水下收集目标信息的特点,引入了D-S证据推理系统分析了潜艇威胁判断中的两个关键性环节。判断目标发现本艇与否、判断目标可能采取的攻防决策问题,在把不确定推理应用于潜艇威胁判断研究上作了初步尝试。  相似文献   
34.
针对影响不同类目标威胁度的因素建立了目标威胁度指标体系,并在此基础上,利用不确定语言多属性决策模型对不同类目标威胁度进行排序。该方法不仅充分体现了不同类目标威胁度的影响因素,还充分利用了专家和决策人员的经验,能较好地反映现代战场中目标威胁度的实际情况,利于提高智能化程度;模型适应性较强,计算量小,符合军事系统实时性的特殊要求,使评估结果更具有可信性和实用性。  相似文献   
35.
介绍了一种战场数据融合仿真系统的设计与实现方法。该系统由场景设定、信号产生、融合跟踪处理、目标识别、态势与威胁估计与数据库支持等功能子系统组成,模拟了数据融合的整个信息处理流程,包括:主动探测雷达、雷达侦察设备、通信侦察设备和敌我识别器获取敌我目标观测信息、利用多传感器跟踪数据对目标进行融合跟踪、提取辐射源电磁信息特征对敌方目标识别,进而形成态势与威胁估计。最终在Visual C#开发平台上利用MapX和ORACLE开发了战场数据融合仿真系统,并成功应用于实际系统中,取得了较好的效果。  相似文献   
36.
基于熵权多目标决策的雷达网战损装备抢修排序方法   总被引:1,自引:0,他引:1  
分析了熵权的理论基础,给出了一种基于熵权多目标决策的雷达网战损装备抢修排序方法。其中,采用熵权与决策者的主观权重相结合的方法确定综合权重,使权重的确定更加合理。最后通过实例对该方法的可行性和实用性进行了说明。  相似文献   
37.
Consider a stochastic simulation experiment consisting of v independent vector replications consisting of an observation from each of k independent systems. Typical system comparisons are based on mean (long‐run) performance. However, the probability that a system will actually be the best is sometimes more relevant, and can provide a very different perspective than the systems' means. Empirically, we select one system as the best performer (i.e., it wins) on each replication. Each system has an unknown constant probability of winning on any replication and the numbers of wins for the individual systems follow a multinomial distribution. Procedures exist for selecting the system with the largest probability of being the best. This paper addresses the companion problem of estimating the probability that each system will be the best. The maximum likelihood estimators (MLEs) of the multinomial cell probabilities for a set of v vector replications across k systems are well known. We use these same v vector replications to form vk unique vectors (termed pseudo‐replications) that contain one observation from each system and develop estimators based on AVC (All Vector Comparisons). In other words, we compare every observation from each system with every combination of observations from the remaining systems and note the best performer in each pseudo‐replication. AVC provides lower variance estimators of the probability that each system will be the best than the MLEs. We also derive confidence intervals for the AVC point estimators, present a portion of an extensive empirical evaluation and provide a realistic example. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 341–358, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10019  相似文献   
38.
We consider the problem of finding the system with the best primary performance measure among a finite number of simulated systems in the presence of a stochastic constraint on a single real‐valued secondary performance measure. Solving this problem requires the identification and removal from consideration of infeasible systems (Phase I) and of systems whose primary performance measure is dominated by that of other feasible systems (Phase II). We use indifference zones in both phases and consider two approaches, namely, carrying out Phases I and II sequentially and carrying out Phases I and II simultaneously, and we provide specific example procedures of each type. We present theoretical results guaranteeing that our approaches (general and specific, sequential and simultaneous) yield the best system with at least a prespecified probability, and we provide a portion of an extensive numerical study aimed at evaluating and comparing the performance of our approaches. The experimental results show that both new procedures are useful for constrained ranking and selection, with neither procedure showing uniform superiority over the other.© 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
39.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   
40.
基于警报关联的网络威胁行为检测技术因其与网络上大量部署的安全产品耦合,且能充分挖掘异常事件之间的关联关系以提供场景还原证据,正成为复杂威胁行为检测的研究热点。从威胁行为和网络安全环境的特点出发,引出威胁行为检测的应用需求和分类,介绍基于警报关联的威胁行为检测的基本概念和系统模型;重点论述作为模型核心的警报关联方法,并分类介绍了各类典型算法的基本原理和特点,包括基于因果逻辑的方法、基于场景的方法、基于相似性的方法和基于数据挖掘的方法;并结合实例介绍了威胁行为检测系统的三种典型结构,即集中式结构、层次式结构和分布式结构;基于当前研究现状,提出了对未来研究趋势的一些认识。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号