首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   562篇
  免费   78篇
  国内免费   11篇
  2022年   1篇
  2021年   7篇
  2020年   4篇
  2019年   15篇
  2018年   6篇
  2017年   22篇
  2016年   33篇
  2015年   20篇
  2014年   32篇
  2013年   83篇
  2012年   31篇
  2011年   47篇
  2010年   32篇
  2009年   27篇
  2008年   29篇
  2007年   43篇
  2006年   39篇
  2005年   30篇
  2004年   28篇
  2003年   26篇
  2002年   31篇
  2001年   26篇
  2000年   17篇
  1999年   11篇
  1998年   4篇
  1997年   3篇
  1995年   3篇
  1994年   1篇
排序方式: 共有651条查询结果,搜索用时 31 毫秒
1.
This article deals with a two‐person zero‐sum game called a search allocation game (SAG), in which a searcher and a target participate as players. The searcher distributes his searching resources in a search space to detect the target. The effect of resources lasts a certain period of time and extends to some areas at a distance from the resources' dropped points. On the other hand, the target moves around in the search space to evade the searcher. In the history of search games, there has been little research covering the durability and reachability of searching resources. This article proposes two linear programming formulations to solve the SAG with durable and reachable resources, and at the same time provide an optimal strategy of distributing searching resources for the searcher and an optimal moving strategy for the target. Using examples, we will analyze the influences of two attributes of resources on optimal strategies. © 2007 Wiley Periodicals, Inc. Naval Research Logistics 2008  相似文献   
2.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
3.
给出了股票价格的Black Scholes模型中股票期望收益率μ及波动率σ2的估计,并证明了这种估计的良好性质。给出异常市场判别准则,提出第一、第二警戒值的计算公式。  相似文献   
4.
We seek dynamic server assignment policies in finite‐capacity queueing systems with flexible and collaborative servers, which involve an assembly and/or a disassembly operation. The objective is to maximize the steady‐state throughput. We completely characterize the optimal policy for a Markovian system with two servers, two feeder stations, and instantaneous assembly and disassembly operations. This optimal policy allocates one server per station unless one of the stations is blocked, in which case both servers work at the unblocked station. For Markovian systems with three stations and instantaneous assembly and/or disassembly operations, we consider similar policies that move a server away from his/her “primary” station only when that station is blocked or starving. We determine the optimal assignment of each server whose primary station is blocked or starving in systems with three stations and zero buffers, by formulating the problem as a Markov decision process. Using this optimal assignment, we develop heuristic policies for systems with three or more stations and positive buffers, and show by means of a numerical study that these policies provide near‐optimal throughput. Furthermore, our numerical study shows that these policies developed for assembly‐type systems also work well in tandem systems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
5.
We consider the problem of sequencing n jobs on a single machine, with each job having a processing time and a common due date. The common due date is assumed to be so large that all jobs can complete by the due date. It is known that there is an O(n log n)‐time algorithm for finding a schedule with minimum total earliness and tardiness. In this article, we consider finding a schedule with dual criteria. The primary goal is to minimize the total earliness and tardiness. The secondary goals are to minimize: (1) the maximum earliness and tardiness; (2) the sum of the maximum of the squares of earliness and tardiness; (3) the sum of the squares of earliness and tardiness. For the first two criteria, we show that the problems are NP‐hard and we give a fully polynomial time approximation scheme for both of them. For the last two criteria, we show that the ratio of the worst schedule versus the best schedule is no more than . © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 422–431, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10020  相似文献   
6.
提出了一种确定目标进入角的原理和方法,这种原理和方法具有较高的计算精度和实时性,易于工程实现,可用于机载火力控制系统完成空对空导弹允许发射区计算.  相似文献   
7.
中国的改革始终并越来越置于开放的国际大环境和背景下 ,围绕开放来进行 ,改革的历史取向、实际步骤等方方面面都自觉不自觉地受到开放的很大影响 :开放引致改革、开放促进改革、开放制约改革、开放本身就是改革、开放保障改革。因此 ,中国的改革是一种典型的开放式改革 ,中国的“改革开放”也可以或越来越应当是“开放改革” ;就改革与开放的相互关系、作用及对整个社会发展的作用和意义而言 ,开放重于改革。  相似文献   
8.
主要论述了某型空空导弹实现3维实时动态数字仿真的思路和方法,首先建立3维空战模型,然后通过一定的计算方法和编程技巧实现了数字仿真的实时性。在数字仿真实时性的基础上,实现了导弹攻击目标过程的3维动态图形显示。  相似文献   
9.
空空导弹导引头角预定精度研究   总被引:2,自引:1,他引:1  
空空导弹导引头角预定是重要的导弹发射控制参数,其有效的计算精度分析,是导弹可靠截获和跟踪目标的重要保证。基于前置追踪攻击原理,给出了空空导弹导引头角预定的计算模型,建立了机载雷达误差对导引头角预定精度影响的误差分析仿真结构,并对仿真计算结果进行了讨论。  相似文献   
10.
电子战仿真系统中防空武器作战效能研究   总被引:7,自引:1,他引:6  
介绍了电子战仿真系统总体结构,研究了空中拦截、地对空导弹及高炮等模块的作战效能模型,并用Monte Carlo 试验方法分析了系统的电子对抗作战效能  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号