首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   10篇
  国内免费   9篇
  2021年   1篇
  2020年   2篇
  2019年   3篇
  2018年   2篇
  2017年   7篇
  2016年   3篇
  2015年   2篇
  2014年   5篇
  2013年   26篇
  2012年   2篇
  2011年   4篇
  2007年   1篇
  2005年   1篇
  2003年   2篇
  2001年   3篇
  2000年   6篇
  1999年   4篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1986年   1篇
排序方式: 共有78条查询结果,搜索用时 312 毫秒
1.
We consider the integrated problem of optimally maintaining an imperfect, deteriorating sensor and the safety‐critical system it monitors. The sensor's costless observations of the binary state of the system become less informative over time. A costly full inspection may be conducted to perfectly discern the state of the system, after which the system is replaced if it is in the out‐of‐control state. In addition, a full inspection provides the opportunity to replace the sensor. We formulate the problem of adaptively scheduling full inspections and sensor replacements using a partially observable Markov decision process (POMDP) model. The objective is to minimize the total expected discounted costs associated with system operation, full inspection, system replacement, and sensor replacement. We show that the optimal policy has a threshold structure and demonstrate the value of coordinating system and sensor maintenance via numerical examples. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 399–417, 2017  相似文献   
2.
We study a setting with a single type of resource and with several players, each associated with a single resource (of this type). Unavailability of these resources comes unexpectedly and with player‐specific costs. Players can cooperate by reallocating the available resources to the ones that need the resources most and let those who suffer the least absorb all the costs. We address the cost savings allocation problem with concepts of cooperative game theory. In particular, we formulate a probabilistic resource pooling game and study them on various properties. We show that these games are not necessarily convex, do have non‐empty cores, and are totally balanced. The latter two are shown via an interesting relationship with Böhm‐Bawerk horse market games. Next, we present an intuitive class of allocation rules for which the resulting allocations are core members and study an allocation rule within this class of allocation rules with an appealing fairness property. Finally, we show that our results can be applied to a spare parts pooling situation.  相似文献   
3.
Whether or not Colombia has improved is a controversial topic. If improvement has occurred, what, if any, lessons from the Colombian model can be learned? The first lesson is that Colombia's problems were caused more by a weak state than by drugs. The second lesson is that improving state capacity requires more than just increased security. The state must also provide the basic social services that citizens require to gain and maintain their support. Additionally, government institutions need to improve their professionalism, protect human rights, and root out impunity and corruption. The alternative is to suffer from new cycles of violence as old foes are vanquished, but new ones emerge.  相似文献   
4.
We consider the salvo policy problem, in which there are k moments, called salvos, at which we can fire multiple missiles simultaneously at an incoming object. Each salvo is characterized by a probability pi: the hit probability of a single missile. After each salvo, we can assess whether the incoming object is still active. If it is, we fire the missiles assigned to the next salvo. In the salvo policy problem, the goal is to assign at most n missiles to salvos in order to minimize the expected number of missiles used. We consider three problem versions. In Gould's version, we have to assign all n missiles to salvos. In the Big Bomb version, a cost of B is incurred when all salvo's are unsuccessful. Finally, we consider the Quota version in which the kill probability should exceed some quota Q. We discuss the computational complexity and the approximability of these problem versions. In particular, we show that Gould's version and the Big Bomb version admit pseudopolynomial time exact algorithms and fully polynomial time approximation schemes. We also present an iterative approximation algorithm for the Quota version, and show that a related problem is NP-complete.  相似文献   
5.
四种螺线管型爆磁压缩发生器的实验研究   总被引:3,自引:0,他引:3       下载免费PDF全文
实验研究了四种螺线管型爆磁压缩发生器,给出了其主要实验结果和结论。  相似文献   
6.
针对基于位置时间参数解析算法的声纳浮标阵搜潜系统的定位精度问题,采用定性和定量分析相结合的方法展开了研究。从解析定位模型出发,首先定性分析浮标自身的定位误差与传感器测时误差对航速及航向角计算的影响;然后选取评价指标,采用蒙特卡洛方法进行了仿真分析,得到了不同仿真条件下各个因素对定位精度具体的影响关系,这些结论为根据精度参数合理选择浮标阵的数量及布放阵型提供了依据。  相似文献   
7.
小口径速射舰炮受弹鼓容量及舰炮发射系统限制,一般不能在舰炮武器系统有效射击范围内全航路持续射击,这就要求对射击方法进行研究。应用蒙特卡洛法,在MATLAB软件平台上计算了小口径速射舰炮武器系统对匀速直线运动导弹的命中概率与弹丸相遇点距离间的关系,提出了以全航路最大概率命中导弹有效部位为基础制定射击终止点,反推射击起始点的射击方法,提高了舰炮武器系统在全航路射弹数限定条件下的命中概率;以舰炮武器系统跟踪器最大跟踪角速度限制因素为例,分析了导弹运动速度、航路捷径与射击区域的对应关系,并应用本方法对导弹典型航路的射击方案进行了仿真。仿真结果表明该方法在一定条件下能有效提高舰炮武器系统对导弹的全航路命中概率。  相似文献   
8.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
9.
The F‐35 Joint Strike Fighter (JSF) programme is important for innovation in the Dutch economy and also contributes to other programmes in the aerospace industry (spin‐off) and other industries (spillover). On top of the expected value of US$9.2 billion in development and production, based on interviews with 10 companies and research institutes, an expected spin‐off of US$1.1 billion and an expected spillover of US$120 million will result. In addition, over 23,000 man‐years are associated with the activities in the development and production of the JSF. This study excludes the large and labour‐intensive Maintenance, Repair and Overhaul (MRO) activities. Further validation of data and an update of current results is planned for 2006.  相似文献   
10.
This article examines the geopolitical dynamics associated with the African Union (AU) and United Nations hybrid operation in Darfur (UNAMID) from the start of the Darfur conflict in 2003 until the time when UNAMID became fully operational in 2011. It provides an overview of the complex forces and geopolitical dynamics that affected the deployment of UNAMID and shaped its unique hybrid character. It mainly highlights those primary geopolitical factors that hindered the full deployment of UNAMID. It is concluded that this period was a showcase for the newly established AU and its support for its member states, as well as a new approach for the international community to maintain international peace and security in alliance with regional organisations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号