首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   478篇
  免费   45篇
  国内免费   22篇
  2024年   3篇
  2023年   2篇
  2022年   7篇
  2021年   22篇
  2020年   13篇
  2019年   8篇
  2018年   10篇
  2017年   13篇
  2016年   10篇
  2015年   15篇
  2014年   16篇
  2013年   76篇
  2012年   10篇
  2011年   25篇
  2010年   31篇
  2009年   25篇
  2008年   19篇
  2007年   22篇
  2006年   20篇
  2005年   12篇
  2004年   7篇
  2003年   11篇
  2002年   9篇
  2001年   9篇
  2000年   12篇
  1999年   13篇
  1998年   8篇
  1997年   8篇
  1996年   7篇
  1995年   10篇
  1994年   4篇
  1993年   5篇
  1992年   8篇
  1991年   10篇
  1989年   5篇
  1988年   2篇
  1987年   6篇
  1986年   4篇
  1985年   6篇
  1984年   2篇
  1983年   2篇
  1980年   4篇
  1978年   4篇
  1977年   2篇
  1976年   2篇
  1975年   3篇
  1974年   6篇
  1973年   4篇
  1970年   3篇
  1968年   2篇
排序方式: 共有545条查询结果,搜索用时 531 毫秒
21.
This article examines the complex legacy of David Petraeus who was a key figure in the emergence of the US military shift towards counterinsurgency doctrine in the years after 2006. Although Petraeus has been perceived by critics as a publicity seeker, he can be credited with laying the foundations for a more serious commitment to COIN involving in particular in integrating conventional and Special Forces in arenas like village stability operations. The article looks a Petraeus's role in both Iraq and Afghanistan: it concludes that, in the case of Afghanistan, it is too early to assess whether counterinsurgency has had a decisive impact of the outcome of the war against the Taliban.  相似文献   
22.
针对MFC环境下GLStudio组件交互困难的问题,从GLStudio使用环境和开发基本流程人手,提出了一种MFC环境下GLStudio组件绘制和交互方法,阐述了虚拟组件操作和MFC环境下GLStudioAPI的对应关系,并给出了连续旋钮人机交互的具体算法.  相似文献   
23.
基于推挽拓扑结构设计,研究了一种全电坦克炮控系统用升压电源,但推挽电路存在着难以消除的偏磁现象,使得升压电源的可靠性降低。详细阐述了推挽电路中偏磁现象产生的原因,针对性地提出了串入箝位电容、采用电流内环控制、优化电路布局等偏磁抑制方法。实验结果表明:所采用的推挽电路偏磁抑制方法具有结构简单、抑制效果好的优点,提高了全电坦克炮控系统升压电源的可靠性。  相似文献   
24.
目标定位和跟踪的卡尔曼滤波加 BP 神经网络的方法   总被引:3,自引:0,他引:3  
首先分析了卡尔曼滤波应用于单目标定位与跟踪时需要校正的因素,接着用具有反向传播(BP)学习算法的前向网络,建立校正原理和校正网络体系结构,最后分别给出了它对第1类和第2类火控系统应用的数学模型。  相似文献   
25.
This paper presents a model for choosing a minimum-cost mix of strategic defenses to assure that specified production capacities for several economic sectors survive after a nuclear attack. The defender selects a mix of strategic defenses for each of several geographic regions. The attacker chooses an allocation of attacking weapons to geographic regions, within specified weapon inventories. The attack is optimized against any economic sector. This formulation allows the defense planner the capability to assess the results of the optimal defense structure for a “worst case” attack. The model is a mathematical program with nonlinear programming problems in the constraints; an example of its application is given and is solved using recently developed optimization techniques.  相似文献   
26.
The optimization of the dynamics of combat (optimal distribution of fire over enemy target types) is studied through a sequence of idealized models by use of the mathematical theory of optimal control. The models are for combat over a period of time described by Lanchester-type equations with a choice of tactics available to one side and subject to change with time. The structure of optimal fire distribution policies is discussed with reference to the influence of combatant objectives, termination conditions of the conflict, type of attrition process, and variable attrition-rate coefficients. Implications for intelligence, command and control systems, and human decision making are pointed out. The use of such optimal control models for guiding extensions to differential games is discussed.  相似文献   
27.
A basic problem in scheduling involves the sequencing of a set of independent tasks at a single facility with the objective of minimizing mean tardiness. Although the problem is relatively simple, the determination of an optimal sequence remains a challenging combinatorial problem. A number of algorithms have been developed for finding solutions, and this paper reports a comparative evaluation of these procedures. Computer programs for five separate algorithms were written and all were run on a data base designed to highlight computational differences. Optimizing algorithms developed by Emmons and by Srinivasan appeared to be particularly efficient in the comparative study.  相似文献   
28.
A method is presented to locate and allocate p new facilities in relation to n existing facilities. Each of the n existing facilities has a requirement flow which must be supplied by the new facilities. Rectangular distances are assumed to exist between all facilities. The algorithm proceeds in two stages. In the first stage a set of all possible optimal new facility locations is determined by a set reduction algorithm. The resultant problem is shown to be equivalent to finding the p-median of a weighted connected graph. In the second stage the optimal locations and allocations are obtained by using a technique for solving the p-median problem.  相似文献   
29.
The treatment of force-level constraints in time-sequential combat optimization problems is illustrated by further studying the fire-programming problem of Isbell and Marlow. By using the theory of state variable inequality constraints from modern optimal control theory, sharper results are obtained on necessary conditions of optimality for an optimal fire-distribution policy (in several cases justifying conjectures made in previous analysis). This leads to simplification of the determination of the domains of controllability for extremals leading to the various terminal states of combat. (Additionally, some new results for the determination of boundary conditions for the adjoint variables in optimal control problems with state variable inequality constraints have arisen from this work.) Some further extensions of previous analysis of the fire-programming problem are also given. These clarify some key points in the solution synthesis. Some important military principles for target selection and the valuation of combat resources are deduced from the solution. As a result of this work, more general time-sequential combat optimization problems can be handled, and a more systematic solution procedure is developed.  相似文献   
30.
软件维护性度量和评价研究   总被引:2,自引:0,他引:2  
分析了软件维护性度量的若干定性定量方法 ,介绍了用于软件维护性评价的技术和工具 ,指出了软件维护性度量和评价的进一步研究方向 ,对于提高软件的维护性具有一定的理论和工程意义。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号