首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   575篇
  免费   8篇
  2021年   6篇
  2020年   4篇
  2019年   9篇
  2018年   9篇
  2017年   14篇
  2016年   14篇
  2015年   10篇
  2014年   12篇
  2013年   102篇
  2012年   22篇
  2011年   27篇
  2010年   21篇
  2009年   15篇
  2008年   29篇
  2007年   15篇
  2006年   17篇
  2005年   8篇
  2004年   6篇
  2003年   5篇
  2002年   4篇
  1998年   7篇
  1997年   7篇
  1995年   8篇
  1994年   6篇
  1993年   12篇
  1992年   8篇
  1991年   7篇
  1989年   14篇
  1988年   5篇
  1987年   12篇
  1986年   11篇
  1985年   9篇
  1984年   4篇
  1983年   5篇
  1982年   6篇
  1981年   8篇
  1980年   10篇
  1979年   11篇
  1978年   4篇
  1977年   7篇
  1976年   8篇
  1975年   7篇
  1974年   3篇
  1973年   5篇
  1972年   12篇
  1971年   3篇
  1970年   4篇
  1969年   9篇
  1968年   7篇
  1966年   3篇
排序方式: 共有583条查询结果,搜索用时 15 毫秒
161.
C4ISR(Command、Control、Communication、Computer、Intelligence、Surveillance and Reconnaissance)系统开发的仿真活动贯穿于系统全生命周期的各个阶段,仿真支持过程联系着C4ISR系统开发仿真的各类要素。首先对C4ISR系统开发仿真支持的内容进行分析,从生命周期维、仿真产品维和仿真任务维三个维度描述仿真支持内容之间的联系。然后分析了C4ISR系统开发仿真支持过程的层次性,应用UML描述了支持过程中的仿真项目模型和仿真过程模型。在此基础上,应用基于Petri网的工作流网,对C4ISR系统开发的仿真支持过程进行建模,分析了支持过程中活动、产品、角色、约束四类要素的Petri网表示方式。最后在一个C4ISR系统开发仿真支持实例中应用以上分析和建模方法,验证了方法的可行性和应用效果。  相似文献   
162.
大规模地形作为分布式虚拟战场的重要组成部分,在非常有限的资源下,很难达到实时性绘制。针对此问题,设计了两级三层的概要四叉树组织地形数据,用多线程模式算法调度数据,以提高庞大地形数据的交互速率;提出基于衔接索引模板的算法来消除裂缝,实现不同细节层次的无缝拼接;引入样本纹理堆栈的纹理合成算子,增强各层次细节地貌的逼真表现。实验表明:该方法能够很好地实现战场环境下地形的实时性绘制,提供稳定的视觉漫游效果。  相似文献   
163.
ABSTRACT

The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.  相似文献   
164.
This article examines contemporary modes of American warfare. It posits the concept of “vicarious warfare” as a means of capturing prominent patterns in warfighting approaches. Although rooted in long-standing traditions of military practice, vicarious warfare is sufficiently novel as to be identifiable as a distinct phenomenon. The precise manifestation or combination of vicarious methods vary according to the specific circumstances and political contexts prevailing in different theaters. However, America’s general preference is to fight its wars by delegating tasks to proxies and limiting exposure of its own military to danger. Where U.S. forces are employed directly, this takes place largely in the shadows. Such approaches have clear attractions, offer undoubted tactical advantages, and permit successive administrations to maintain a persistent tempo of operations that evades rigorous democratic scrutiny. Yet, prominent cases and numerous studies suggest that vicarious warfare has a high potential to generate counterproductive effects and significant strategic harm.  相似文献   
165.
Consider a stochastic simulation experiment consisting of v independent vector replications consisting of an observation from each of k independent systems. Typical system comparisons are based on mean (long‐run) performance. However, the probability that a system will actually be the best is sometimes more relevant, and can provide a very different perspective than the systems' means. Empirically, we select one system as the best performer (i.e., it wins) on each replication. Each system has an unknown constant probability of winning on any replication and the numbers of wins for the individual systems follow a multinomial distribution. Procedures exist for selecting the system with the largest probability of being the best. This paper addresses the companion problem of estimating the probability that each system will be the best. The maximum likelihood estimators (MLEs) of the multinomial cell probabilities for a set of v vector replications across k systems are well known. We use these same v vector replications to form vk unique vectors (termed pseudo‐replications) that contain one observation from each system and develop estimators based on AVC (All Vector Comparisons). In other words, we compare every observation from each system with every combination of observations from the remaining systems and note the best performer in each pseudo‐replication. AVC provides lower variance estimators of the probability that each system will be the best than the MLEs. We also derive confidence intervals for the AVC point estimators, present a portion of an extensive empirical evaluation and provide a realistic example. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 341–358, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10019  相似文献   
166.
Discrete‐time queues with D‐MAP arrival process are more useful in modeling and performance analysis of telecommunication networks based on the ATM environment. This paper analyzes a finite‐buffer discrete‐time queue with general bulk‐service rule, wherein the arrival process is D‐MAP and service times are arbitrarily and independently distributed. The distributions of buffer contents at various epochs (departure, random, and prearrival) have been obtained using imbedded Markov chain and supplementary variable methods. Finally, some performance measures such as loss probability and average delay are discussed. Numerical results are also presented in some cases. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 345–363, 2003.  相似文献   
167.
We consider the scheduling of large‐scale projects to maximize the project net present value given temporal and resource constraints. The net present value objective emphasizes the financial aspects of project management. Temporal constraints between the start times of activities make it possible to handle practical problem assumptions. Scarce resources are an expression of rising cost. Since optimization techniques are not expedient to solve such problems and most heuristic methods known from literature cannot deal with general temporal constraints, we propose a new bidirectional priority‐rule based method. Scheduling activities with positive cash flows as early and activities with negative cash flows as late as possible results in a method which is completed by unscheduling techniques to cope with scarce resources. In a computational experiment, we compare the well‐known serial generation scheme where all activities are scheduled as early as possible with the proposed bidirectional approach. On the basis of a comprehensive data set known from literature containing instances with up to 1002 activities, the efficiency of the new approach is demonstrated. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
168.
传统的时频分析方法,如Winger Ville Distribution,smoothed pseudo Wigner-Ville distribution等在多目标分辨的时候,无法同时在时频分辨率和抑制交叉项两方面同时达到较好的效果,所提出的MSPWVD解决了这一问题,MSPWVDHOUGH还可在低信噪比的情况下检测出多目标,并估算其参数,可利用来进行雷达成像的运动补偿.  相似文献   
169.
多退化模式下的电子装备可靠性建模   总被引:1,自引:0,他引:1  
通常加速退化分析中退化失效只考虑或者假设只有一个退化通道,而实际上很多情况下会存在多退化模式.产品的各个退化通道间的关系存在随机性,即任意两个退化通道间不可能只是单一的相关或者独立.在考虑这种相关性的条件下,深入研究了电子产品的性能退化理论和机理,提出了两个多退化模式竞争失效的数学模型,分别阐述了退化通道相关与独立的两种不同情况下产品可靠度评估方法.  相似文献   
170.
履带车辆动力舱空气流场的CFD模拟与试验研究   总被引:2,自引:0,他引:2  
以某履带车辆动力舱为研究对象,建立了舱内空气流动与传热计算的物理模型和数学模型,采用标准k-ε方程湍流模型对动力舱内的空气流动进行了描述,采用Fluent软件中的薄面模型对散热器与冷却风扇进行了简化处理,对舱内空气的速度场和温度场进行了三维数值模拟,采用热线风速仪对进、排气窗处的气体流速与温度进行了试验测试,测试值与模拟值的最大相对误差为9.42%,精度能够满足工程需要,表明该计算模型合理可行。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号