首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   611篇
  免费   14篇
  2019年   12篇
  2017年   17篇
  2016年   13篇
  2015年   14篇
  2014年   18篇
  2013年   128篇
  2012年   6篇
  2011年   5篇
  2010年   8篇
  2009年   12篇
  2007年   6篇
  2006年   8篇
  2005年   10篇
  2004年   11篇
  2003年   6篇
  2002年   10篇
  2001年   4篇
  2000年   7篇
  1999年   6篇
  1998年   14篇
  1997年   9篇
  1996年   9篇
  1995年   5篇
  1994年   16篇
  1993年   14篇
  1992年   9篇
  1991年   14篇
  1990年   8篇
  1989年   14篇
  1988年   15篇
  1987年   17篇
  1986年   16篇
  1985年   12篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   10篇
  1980年   7篇
  1979年   8篇
  1978年   12篇
  1976年   8篇
  1975年   6篇
  1974年   8篇
  1973年   8篇
  1972年   9篇
  1971年   5篇
  1970年   9篇
  1969年   6篇
  1968年   4篇
  1967年   6篇
排序方式: 共有625条查询结果,搜索用时 218 毫秒
461.
Determination of the gunfire probability of kill against a target requires two parameters to be taken into consideration: the likelihood of hitting the target (susceptibility) and the conditional probability of kill given a hit (vulnerability). Two commonly used methods for calculating the latter probability are (1) treating each hit upon the target independently, and (2) setting an exact number of hits to obtain a target kill. Each of these methods contains an implicit assumption about the probability distribution of the number of hits‐to‐kill. Method (1) assumes that the most likely kill scenario occurs with exactly one hit, whereas (2) implies that achieving a precise number of hits always results in a kill. These methods can produce significant differences in the predicted gun effectiveness, even if the mean number of hits‐to‐kill for each distribution is the same. We therefore introduce a new modeling approach with a more general distribution for the number of hits‐to‐kill. The approach is configurable to various classes of damage mechanism and is able to match both methods (1) and (2) with a suitable choice of parameter. We use this new approach to explore the influence of various damage accumulation models on the predicted effectiveness of weapon‐target engagements.  相似文献   
462.
463.
464.
We investigate the problem in which an agent has to find an object that moves between two locations according to a discrete Markov process (Pollock, Operat Res 18 (1970) 883–903). At every period, the agent has three options: searching left, searching right, and waiting. We assume that waiting is costless whereas searching is costly. Moreover, when the agent searches the location that contains the object, he finds it with probability 1 (i.e. there is no overlooking). Waiting can be useful because it could induce a more favorable probability distribution over the two locations next period. We find an essentially unique (nearly) optimal strategy, and prove that it is characterized by two thresholds (as conjectured by Weber, J Appl Probab 23 (1986) 708–717). We show, moreover, that it can never be optimal to search the location with the lower probability of containing the object. The latter result is far from obvious and is in clear contrast with the example in Ross (1983) for the model without waiting. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
465.
In this paper, we introduce partially observable agent‐intruder games (POAIGs). These games model dynamic search games on graphs between security forces (an agent) and an intruder given possible (border) entry points and high value assets that require protection. The agent faces situations with dynamically changing, partially observable information about the state of the intruder and vice versa. The agent may place sensors at selected locations, while the intruder may recruit partners to observe the agent's movement. We formulate the problem as a two‐person zero‐sum game, and develop efficient algorithms to compute each player's optimal strategy. The solution to the game will help the agent choose sensor locations and design patrol routes that can handle imperfect information. First, we prove the existence of ?‐optimal strategies for POAIGs with an infinite time horizon. Second, we introduce a Bayesian approximation algorithm to identify these ?‐optimal strategies using belief functions that incorporate the imperfect information that becomes available during the game. For the solutions of large POAIGs with a finite time horizon, we use a solution method common to extensive form games, namely, the sequence form representation. To illustrate the POAIGs, we present several examples and numerical results.  相似文献   
466.
467.
The United States and Russia, in the aftermath of Russia’s annexation of Crimea and destabilization of Ukraine, seem to have ditched entirely the “reset” in their political relations. Despite this odor of Cold War redux, there remain the opportunities and necessities for renewed attention to strategic nuclear arms control as between the two governments. US and NATO missile defenses as planned for European deployment figure into this equation, although in somewhat unpredictable ways, given technological uncertainties in existing and foreseeable defenses, as well as the possibility of improved delivery systems for offensive conventional or nuclear weapons.  相似文献   
468.
469.
Suppose that failure times are available from a random sample of N systems of a given, fixed design with components which have i.i.d. lifetimes distributed according to a common distribution F. The inverse problem of estimating F from data on observed system lifetimes is considered. Using the known relationship between the system and component lifetime distributions via signature and domination theory, the nonparametric maximum likelihood estimator N(t) of the component survival function (t) is identified and shown to be accessible numerically in any application of interest. The asymptotic distribution of N(t) is also identified, facilitating the construction of approximate confidence intervals for (t) for N sufficiently large. Simulation results for samples of size N = 50 and N = 100 for a collection of five parametric lifetime models demonstrate the utility of the recommended estimator. Possible extensions beyond the i.i.d. framework are discussed in the concluding section. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
470.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号