首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   749篇
  免费   158篇
  国内免费   38篇
  2024年   1篇
  2023年   4篇
  2022年   3篇
  2021年   13篇
  2020年   25篇
  2019年   22篇
  2018年   8篇
  2017年   29篇
  2016年   42篇
  2015年   32篇
  2014年   53篇
  2013年   89篇
  2012年   41篇
  2011年   44篇
  2010年   47篇
  2009年   55篇
  2008年   54篇
  2007年   54篇
  2006年   47篇
  2005年   40篇
  2004年   51篇
  2003年   28篇
  2002年   25篇
  2001年   23篇
  2000年   24篇
  1999年   16篇
  1998年   12篇
  1997年   10篇
  1996年   10篇
  1995年   4篇
  1994年   8篇
  1993年   13篇
  1992年   5篇
  1991年   6篇
  1990年   5篇
  1989年   1篇
  1975年   1篇
排序方式: 共有945条查询结果,搜索用时 15 毫秒
31.
某型导弹制导装置临战快速检测系统   总被引:1,自引:0,他引:1  
某刑导弹制导装置集光、机、电等多种技术于一体,技术状态易发生变化,在临战前必须快速确认其工作状态。针对某型导弹制导装置临战检测的特点,分析丁制导装置的结构和关键控制信号,开发了能够对制导装置的关键控制信号和激光信息场进行功能性检测的临战快速检测系统。该系统町为指挥员提供辅助决策支持,也可用于平时的技术维护和功能榆查。  相似文献   
32.
基于最大故障特征信息熵的测试点优化设计   总被引:4,自引:0,他引:4  
为解决故障诊断和可测试性设计中普遍存在的测试点优化问题,以相关性矩阵模型为基础,建立了最大故障特征信息熵的优化准则,给出了相应的测试点优化设计方法。应用实例表明:该方法是可行的、正确的,能为武器装备的故障诊断和可测试性设计提供有力的支持。  相似文献   
33.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
34.
Finding all nondominated vectors for multi‐objective combinatorial optimization (MOCO) problems is computationally very hard in general. We approximate the nondominated frontiers of MOCO problems by fitting smooth hypersurfaces. For a given problem, we fit the hypersurface using a single nondominated reference vector. We experiment with different types of MOCO problems and demonstrate that in all cases the fitted hypersurfaces approximate all nondominated vectors well. We discuss that such an approximation is useful to find the neighborhood of preferred regions of the nondominated vectors with very little computational effort. Further computational effort can then be spent in the identified region to find the actual nondominated vectors the decision maker will prefer. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
35.
C3I系统试验评估是C3I系统外场试验中非常重要的一个环节.结合C3I系统外场试验的试验需求,建立了一套相对比较完整的、包含了C3I系统评估方法、评估指标体系和指标计算模型三要素在内的C3I系统试验评估体系.利用模糊的概念和变权评估方法,改进了传统的层次分析法,提出了一种变权模糊层次分析法作为C3I系统评估方法.最后,通过某防空情报指挥系统外场试验评估实例验证了该评估体系的正确性和科学性.所设计的C3I系统试验评估体系技术先进、科学实用,对C3I系统外场试验鉴定具有比较重要的指导意义.  相似文献   
36.
基于网络和主机相结合的入侵检测技术   总被引:5,自引:0,他引:5  
首先介绍了基于主机和基于网络的两种入侵检测系统的功能原理 ,在分析这两种系统功能原理的基础上 ,提出了基于网络和主机相结合入侵检测系统的工作流程和工作原理 ,进而阐明了当系统检测到有入侵情况下的应对措施 ,采用人工神经网络的入侵检测算法 ,提高了对入侵类型的判别能力 ,保证应对措施的正确 ,确保了系统的安全性。  相似文献   
37.
38.
The “gold‐mining” decision problem is concerned with the efficient utilization of a delicate mining equipment working in a number of different mines. Richard Bellman was the first to consider this type of a problem. The solution found by Bellman for the finite‐horizon, continuous‐time version of the problem with two mines is not overly realistic since he assumed that fractional parts of the same mining equipment could be used in different mines and this fraction could change instantaneously. In this paper, we provide some extensions to this model in order to produce more operational and realistic solutions. Our first model is concerned with developing an operational policy where the equipment may be switched from one mine to the other at most once during a finite horizon. In the next extension we incorporate a cost component in the objective function and assume that the horizon length is not fixed but it is the second decision variable. Structural properties of the optimal solutions are obtained using nonlinear programming. Each model and its solution is illustrated with a numerical example. The models developed here may have potential applications in other areas including production of items requiring the same machine or choosing a sequence of activities requiring the same resource. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 186–203, 2002; DOI 10.1002/nav.10008  相似文献   
39.
Multiple Objectives Optimization is much seen in combination with linear functions and even with linear programming, together with an adding of the objectives by using weights. With distance functions, normalization instead of weights is used. It is also possible that together with an additive direct influence of the objectives on the utility function a mutual utility of the objectives exists under the form of a multiplicative representation. A critical comment is brought on some representations of this kind. A full‐multiplicative form may offer other opportunities, which will be discussed at length in an effort to exclude weights and normalization. This theoretical approach is followed by an application for arms procurement. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 327–340, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10014  相似文献   
40.
舰空导弹综合试验与鉴定方法   总被引:3,自引:0,他引:3  
从综合试验与鉴定的思路出发 ,针对舰空导弹的战术技术特点 ,建立了鉴定指标体系 ,论述了各种性能的综合试验与鉴定方法 ,并提出了需要研究的关键技术。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号