首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51篇
  免费   15篇
  国内免费   12篇
  2020年   1篇
  2019年   3篇
  2018年   5篇
  2017年   2篇
  2016年   2篇
  2014年   9篇
  2013年   13篇
  2012年   6篇
  2010年   4篇
  2009年   4篇
  2008年   3篇
  2007年   3篇
  2006年   2篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2001年   3篇
  2000年   13篇
排序方式: 共有78条查询结果,搜索用时 15 毫秒
51.
海上编队信息系统的安全防护能力,是确保系统稳定可靠和安全,确保作战指挥顺畅和信息安全,确保诸兵力协同作战时信息保密共享、信息安全利用、武器可靠共用的重要前提。海上编队信息系统的安全问题是一个系统工程,必须首先从系统体系结构上进行整体考虑。本文遵循深度防御、分等级防护和综合防范思想,确定了海上编队信息系统安全域划分原则,构建了分等级安全防护体系结构,为未来海上编队信息系统的分等级安全防护提供了指导和依据。  相似文献   
52.
装备维修保障力量的优化配置对于充分发挥维修保障效益、提高装备完好率具有重要意义。在分析界定装备维修保障力量配置问题的基础上,采用通用仿真语言建立了支持分析决策的仿真模型。实例分析表明维修力量最优配置是各区域的故障装备产生速率、后送运输时间等方面因素综合作用的结果,仿真程序可反映各项因素的定量关系。  相似文献   
53.
柱锥级联型爆磁压缩发生器的实验研究   总被引:1,自引:0,他引:1       下载免费PDF全文
研究了柱锥级联型爆磁压缩发生器。给出了主要实验结果。发生器的负载是3.5μH,最大电流是55.8KA,上升前沿是14.3μs,电压为30.5KV。平均电流放大倍数是6.4。  相似文献   
54.
红外脉冲强光辐射产生技术研究   总被引:2,自引:0,他引:2       下载免费PDF全文
定向红外脉冲强光辐射技术是定向红外对抗中的关键技术,主要用来破坏敌方精确制导武器或C4I系统的红外传感器。本文进行了三种产生技术的研究,即爆炸激励惰性气体,多丝电爆激励惰性气体和多点同步爆燃药物。在同步爆燃产生技术的研究中,当有效载荷弹药为0.2kg时,在距离源50m处得到三个波段(1~3、3~5、8~12μm)的辐射强度为(2.00~3.55)×l05W/Sr,脉冲半高宽为约20ms的强红外辐射脉冲。  相似文献   
55.
In this article, an integral equation satisfied by the second moment function M2(t) of a geometric process is obtained. The numerical method based on the trapezoidal integration rule proposed by Tang and Lam for the geometric function M(t) is adapted to solve this integral equation. To illustrate the numerical method, the first interarrival time is assumed to be one of four common lifetime distributions, namely, exponential, gamma, Weibull, and lognormal. In addition to this method, a power series expansion is derived using the integral equation for the second moment function M2(t), when the first interarrival time has an exponential distribution.  相似文献   
56.
During the transformation period of the Ottoman Empire leading to the Republic of Turkey, many conflicts took place between 1918 and 1923. These conflicts interrupted the servicing of the Ottoman war bond. The reimbursement likelihood of this bond was related to the outcomes of First World War and the hostilities. This paper analyses the impacts of First World War and hostilities on the risk assessments regarding the Ottoman war debt, using manually collected data on the price of the Ottoman war bond traded at the ?stanbul bourse between 1918 and 1925. The empirical results imply that the defeat of the Bulgarian army and the peace offer of Austria-Hungary were associated with the increasing premium demanded by investors of the bond. The victories of the Turkish National Movement and the peace offer of the Allies to end the hostilities by 1922 positively affected the likelihood of the servicing of the debt.  相似文献   
57.
We investigate the problem in which an agent has to find an object that moves between two locations according to a discrete Markov process (Pollock, Operat Res 18 (1970) 883–903). At every period, the agent has three options: searching left, searching right, and waiting. We assume that waiting is costless whereas searching is costly. Moreover, when the agent searches the location that contains the object, he finds it with probability 1 (i.e. there is no overlooking). Waiting can be useful because it could induce a more favorable probability distribution over the two locations next period. We find an essentially unique (nearly) optimal strategy, and prove that it is characterized by two thresholds (as conjectured by Weber, J Appl Probab 23 (1986) 708–717). We show, moreover, that it can never be optimal to search the location with the lower probability of containing the object. The latter result is far from obvious and is in clear contrast with the example in Ross (1983) for the model without waiting. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
58.
We study optimal pricing for tandem queueing systems with finite buffers. The service provider dynamically quotes prices to incoming price sensitive customers to maximize the long-run average revenue. We present a Markov decision process model for the optimization problem. For systems with two stations, general-sized buffers, and two or more prices, we describe the structure of the optimal dynamic pricing policy and develop tailored policy iteration algorithms to find an optimal pricing policy. For systems with two stations but no intermediate buffer, we characterize conditions under which quoting either a high or a low price to all customers is optimal and provide an easy-to-implement algorithm to solve the problem. Numerical experiments are conducted to compare the developed algorithms with the regular policy iteration algorithm. The work also discusses possible extensions of the obtained results to both three-station systems and two-station systems with price and congestion sensitive customers using numerical analysis.  相似文献   
59.
Strategic studies deals intimately with the topic of power. Most scholars in the discipline work with a concept of power as an adversarial zero-sum competition. This is natural and necessary. However, other conceptions of power developed within political science and sociology could enrich strategic studies. Approaching two typical, traditional tasks of strategy – alliance building and war-fighting – this article demonstrates the heuristic mileage of theories of collective power. In particular, we can shed new light on the post-Cold War transformation of NATO as well as state-building as a strategy in counter-insurgencies with new ideas of power. Broadening the palette of theories of power is thus valuable if strategic studies is to prosper as an independent field of study.  相似文献   
60.
Over the last two decades, a number of countries (most notably China, Russia and Iran) have been developing so-called anti-access and area denial (A2/AD) capabilities, such as ballistic and cruise missiles, offensive cyber-weapons, electronic warfare, etc. The development of A2/AD capabilities by non-Western countries undermines the foundations of US power projection and global military-technological supremacy. In order to overcome, or at least mitigate, the impending A2/AD challenge, the US Department of Defense (DoD) began to roll out its so-called ‘third’ offset strategy in late 2014. The strategy aims to bring about innovative operational concepts and technologies and spur new doctrinal and organisational debates. This article assesses which of the operational concepts and capabilities informing current US discussions on offset may be relevant in the context of the A2/AD challenges Europeans face on their eastern ‘flank‘ and in their ‘extended southern neighbourhood‘, and which may not. Europeans must grapple with the same conceptual puzzle as the US: how to strike the right balance between defeating A2/AD capabilities and hedging against them, i.e. through alternative strategies that are less dependent on unhindered access and resort to asymmetric forms of warfare. However, they must take into account the geographical features of their eastern flank and extended southern neighbourhood, the level of technological maturity of their challengers, and their own military-technological prowess and political limitations. This suggests a somewhat different approach to offsetting A2/AD than that adopted by the US.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号