首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   126篇
  免费   12篇
  国内免费   3篇
  2023年   1篇
  2021年   2篇
  2020年   7篇
  2019年   12篇
  2018年   5篇
  2017年   13篇
  2016年   11篇
  2015年   2篇
  2014年   14篇
  2013年   23篇
  2012年   4篇
  2011年   7篇
  2010年   5篇
  2009年   4篇
  2008年   3篇
  2007年   8篇
  2006年   5篇
  2005年   3篇
  2004年   2篇
  2003年   3篇
  2002年   1篇
  2001年   3篇
  1998年   1篇
  1994年   1篇
  1993年   1篇
排序方式: 共有141条查询结果,搜索用时 171 毫秒
1.
针对传统长基线时差探测系统的缺点,提出了全新的动基站时差测量系统并给出了目标的定位原理。在典型布站、信息存在冗余的前提下,通过子集选优法确定了最佳定位算法,并根据工程应用的需要确定了更加合理简捷的定位算法,统计仿真表明了该算法的有效性。最后,计算了目标高度测量精度并归纳了其特点,给出了有益的结论。  相似文献   
2.
图论及神经网络在地空导弹部队阵地中的应用   总被引:1,自引:0,他引:1  
防空部队特别是地空导弹部队抗击敌空袭作战必须依托相应的阵地进行,而地空导弹部队阵地部署与选择的正确与否是地空导弹部队能否有效进行抗击敌空袭作战的一个重要因素,地空导弹部队阵地部署与选择需要综合考虑地形条貂件、机动条件、作战时间条件等各种因素.提出阵地部署与选择的几个指标,用图论与神经网络方法针对一个具体的例子对所提出的指标进行求解计算,得出阵地部署与选择的方案.  相似文献   
3.
中国非传统安全面临的挑战及思考   总被引:3,自引:1,他引:2  
在对我国21世纪初期安全环境进行综合分析判断的基础上,重点从金融、环境、信息安全、流行疾病、人口安全等方面对中国非传统安全领域面临的挑战进行了深入的分析,探究了非传统安全因素对国家安全形势的影响,提出了有利于安全环境的几点预防性对策。  相似文献   
4.
尹钢  陈岛  王帅 《指挥控制与仿真》2007,29(3):49-51,55
针对登陆点选择的特点,对登陆点选择步骤进行分析,确定影响的四个基本因素,利用三角模糊数型多属性决策方法建立登陆点选择模型。与层次分析法相比,此算法时更能突出登陆点选择时,指挥者对登陆点的偏好所影响登陆点选择的基本因素值只能大概给出,基本因素之间的权重信息也不能完全确知的特点,通过计算机编程,此模型能够快速地实现对登陆点的排序选优,为指挥员提供辅助决策。  相似文献   
5.
In his 1987 work Strategy: The Logic of War and Peace (Harvard University Press, Cambridge, MA, 1987), Edward Luttwak described strategy as a field of activity characterised not only by an innately complex relationship between designs, actions and outcomes, but so too by the frequent disparity between its theory and praxis. Similar observations on this subject have since been made by Richard K. Betts, Lawrence Freedman and Antulio Echevarria II. This article will use the Allied invasion of Sicily in July–August 1943 as a vehicle through which to test these theories against a signal event in the European theatre of the Second World War. It will illustrate how Operation Husky and its aftermath are a paradigm of the confusing and often illogical course of events associated with the process of formulating strategy and waging war. In so doing it demonstrates the benefits of using strategic theory to illuminate events and so move beyond the often insular focus of campaign histories, and simultaneously reinforces the importance of military history in informing a theoretical understanding of strategy.  相似文献   
6.
While recent work has attempted to update the research agenda for transatiantic defense burden-sharing, there remain significant gaps between the public choice defense economics literature and the security studies literature. The presence of such a gap is unfortunate, because defense spending choices are likely shaped by factors identified by the public choice literature, as well as the strategic and cultural variables that the security studies literature tends to focus on, as well as domestic macroeconomic factors. The independent variables identified in recent qualitative literature are extremely useful analytically, and, fortunately, they have reasonable proxies in available quantitative data, which enables scholars to study them across large groups of countries and many years. This article builds upon such work to synthesize the most notable of the factors identified in the current literature, and offers some common analytical ground that will benefit both scholars and practitioners..  相似文献   
7.
周朴  陶汝茂 《国防科技》2017,38(3):051-057
美国联合非致命武器理事会在成立20周年之际发布了《联合非致命武器项目科技战略规划2016-2025》,对未来十年相关领域的科技发展做出了部署安排。本文介绍美国联合非致命武器项目的使命职能、组织机构、运行模型、代表性成果以及十年科技战略规划,旨在为技术创新和管理创新提供参考和借鉴。  相似文献   
8.
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method.  相似文献   
9.
从资源的建设、整合、布局、共享和服务等方面,多角度分析了武警工程大学在体制编制调整后,图书馆存在的问题及其发展方向,并对大学图书馆的发展定位提出了参考性的建议。  相似文献   
10.
This article proposes a strategic reason for a proprietary component supplier to license her technology to a competitor or a manufacturer: her anticipation of the manufacturer's strategic commitment to invest in research and development (R&D). We address this phenomenon with a game theoretic model. Our results show that the manufacturer's full commitment to invest in R&D enables the supplier to license, sell a larger quantity through the supply chain, and charge lower prices. These results are robust to the type of demand uncertainty faced by the manufacturer within the class of increasing generalized failure rate distributions. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 341–350, 2014  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号