首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   1篇
  2023年   1篇
  2021年   2篇
  2020年   1篇
  2019年   1篇
  2017年   1篇
  2016年   2篇
  2014年   1篇
  2013年   4篇
  2006年   1篇
  2002年   1篇
  2001年   1篇
  1983年   2篇
  1980年   1篇
排序方式: 共有19条查询结果,搜索用时 15 毫秒
1.
Blue strike aircraft enter region ? to attack Red targets. In Case 1, Blue conducts (preplanned) SEAD to establish air superiority. In the (reactive) SEAD scenario, which is Case 2, such superiority is already in place, but is jeopardized by prohibitive interference from Red, which threatens Blue's ability to conduct missions. We utilize both deterministic and stochastic models to explore optimal tactics for Red in such engagements. Policies are developed which will guide both Red's determination of the modes of operation of his engagement radar, and his choice of Blue opponent to target next. An index in the form of a simple transaction kill ratio plays a major role throughout. Published 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 723–742, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10046  相似文献   
2.
Syria's slide into sectarian civil war in 2011 raises a new fundamental knowledge question about the conditions under which power-sharing pacts can be clinched as an approach to war termination. When intrastate conflicts escalate into violent sectarian struggles, power-sharing is a likely basis of an eventual political settlement in situations where partition is off the table. This article contends that there remain two puzzling knowledge gaps about power-sharing as the basis for peace agreements to end civil wars: first, the specific conditions under which elites find it in their own interest to share power with bitter adversaries rather than fight on the battlefield, and second, how war-ending elite-negotiated pacts may evolve into more enduring social contracts. These puzzles, critical for policymakers and still unresolved in the scholarly literature, suggest the need to develop more contingent- and context-specific knowledge if research findings are to more capably contribute to peacemaking efforts.  相似文献   
3.
4.
This article provides formulas for estimating the parameters to be used in the basic EOQ lot-size model. The analysis assumes that the true values of these parameters are unknown over known ranges and perhaps nonstationary over time. Two measures of estimator “goodness” are derived from EOQ sensitivity analysis. Formulas are given for computing the minimax choice and the minimum expected value choice for the parameter estimates using both measures of estimator “goodness”. A numerical example is included.  相似文献   
5.
The human visual system is still an important factor in military warfare; military personnel receive training on effective search strategies, and camouflage that can effectively conceal objects and personnel is a key component of a successful integrated survivability strategy. Previous methods of camouflage assessment have, amongst others, used psychophysics to generate distinctiveness metrics. However, the population from which the human observers are drawn is often not well defined, or necessarily appropriate. In this experiment we designed a new platform for testing multiple patterns based on a camouflaged object detection task, and investigate whether trained military observers perform better than civilians. We use a two-alternative forced choice paradigm, with participants searching images of woodland for a replica military helmet displaying Olive Green, Multi Terrain Pattern, US Marine Pattern or, as a conspicuous control, UN Peacekeeper Blue. Our data show that there is no difference in detection performance between the two observer groups but that there are clear differences in the effectiveness of the different helmet colour patterns in a temperate woodland environment. We conclude that when tasks involve very short stimulus presentation times, task-specific training has little effect on the success of target detection and thus this paradigm is particularly suitable for robust estimates of camouflage efficacy.  相似文献   
6.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
7.
8.
9.
10.
In this article we extend our previous work on the continuous single-module design problem to the multiple-module case. It is assumed that there is a fixed cost associated with each additional module used. The Kuhn–Tucker conditions characterize local optima among which there is a global optimum. Modules are associated with partitions and a special class, guillotine partitions, are characterized. Branch-and-bound, partial enumeration, and heuristic procedures for finding optimum or good guillotine partitions are discussed and illustrated with examples.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号