首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   202篇
  免费   94篇
  国内免费   11篇
  2024年   2篇
  2023年   1篇
  2022年   2篇
  2021年   1篇
  2020年   3篇
  2019年   5篇
  2018年   3篇
  2017年   14篇
  2016年   20篇
  2015年   13篇
  2014年   30篇
  2013年   36篇
  2012年   18篇
  2011年   16篇
  2010年   11篇
  2009年   13篇
  2008年   11篇
  2007年   9篇
  2006年   8篇
  2005年   18篇
  2004年   16篇
  2003年   11篇
  2002年   8篇
  2001年   10篇
  2000年   4篇
  1999年   3篇
  1998年   3篇
  1997年   2篇
  1996年   3篇
  1995年   1篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
排序方式: 共有307条查询结果,搜索用时 78 毫秒
81.
设计是作战行动筹划的重要步骤,精确工程保障需要对工程保障行动进行精密的设计和精确管理与控制。科学管理采用科学实验的方法,通过劳动方法标准化和差别计件工资制度,有效提高了工作效率,其基本原理经过百余年的实际检验,被证明是一个成熟有效的管理方法。借鉴科学管理理论,需要对工程保障行动进行动作研究,进而研究工程保障行动的作业标准,以期提高其保障效率。精益管理是在科学管理在新的历史时期的发展与改进,它使用了准时制、零库存、均衡生产、持续改进等先进的管理理念和六西格玛管理、成组技术等先进技术,为基于信息系统体系作战的工程保障能力生成提供了有益的借鉴,可加深我们对精确工程保障的理解,促进精确工程保障研究的可操作性。  相似文献   
82.
针对分布式模拟训练系统操作训练特点,在基于HLA(High Level Architecture)的模拟训练系统中,提出并建立了基于本体技术的操作训练监控平台,解决了训练系统和监控平台中操作消息的语义异构问题,实现了操作训练情况的动态实时显示。在平台实现中,采用RTI(Run-Time Infrastructure)提供的服务实现了联邦数据收发;建立了操作信息领域本体,采用计算语义相似度的方法实现操作信息由分布交互层向语义层映射;通过专家知识库和操作监控引擎判断操作逻辑合理性;利用View Graph以图形化的方式展示出操作训练情况。最后,通过一个炮车操作训练监控实例,验证了该平台的可行性和有效性。  相似文献   
83.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
84.
构建英文情感词典研究相对成熟,形成了丰富可靠的词典资源。而针对中文的研究时间短,中文情感分析词典资源较少。借鉴现有可靠的英文词典资源,提出了基于语义关系的情感词典自动构建算法,算法先从HowNet的概念中进行中文义原和词语抽取及语义分析,再利用HowNet概念中DEF中英文属性值,在英文情感词典SentWordNet中进行义原和词语情感值查询,最后根据词语和义原之间的语义关系进行词语的情感值计算。算法直接利用现有的英文情感词典,无需人工标注,生成的情感词典记录了词语的语义关系、情感极性值等多种信息,弥补了现有词典的不足。评测实验结果表明,根据算法实现的情感词典相比其他词典在准确率接近的情况下,召回率和F值最高,取得了较好的评测性能。  相似文献   
85.
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。  相似文献   
86.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
87.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
88.
远程火炮密集度试验需要进行多次射击,同一试验条件下的多组数据通常认为来源于同一分布,但却未见于证明。利用统计检验方法,给出了对试验数据方差齐性及均值相等性的检验方法,并在多组试验数据一致性的基础上给出了试验数据均值、方差的无偏估计,同时在既定置信度下给出了其置信区间,为远程火炮精度检测提供了工具。  相似文献   
89.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
90.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号