首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   130篇
  免费   32篇
  国内免费   7篇
  2024年   2篇
  2023年   3篇
  2022年   2篇
  2021年   3篇
  2020年   5篇
  2019年   2篇
  2018年   6篇
  2017年   16篇
  2016年   13篇
  2015年   1篇
  2014年   7篇
  2013年   13篇
  2012年   12篇
  2011年   8篇
  2010年   8篇
  2009年   12篇
  2008年   8篇
  2007年   8篇
  2006年   9篇
  2005年   8篇
  2004年   2篇
  2003年   2篇
  2002年   2篇
  2001年   5篇
  2000年   4篇
  1999年   2篇
  1996年   1篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1990年   1篇
排序方式: 共有169条查询结果,搜索用时 15 毫秒
41.
针对威胁环境下的多智能体协同轨迹规划问题,以轮式机器人为对象,研究了基于序列凸优化方法的协同轨迹规划方法.首先通过对轮式机器人模型的分析,给出单独轮式机器人实际物理约束,同时以状态量、控制量加权为性能指标,考虑运动学方程、避障避碰约束、个体物理性能约束、终端约束,建立多轮式机器人协同轨迹规划问题;其次,对运动学方程、避...  相似文献   
42.
We have asymptotically solved a discrete search game on an array of n ordered cells with two players: infiltrator (hider) and searcher, when the probability of survival approaches 1. The infiltrator wishes to reach the last cell in finite time, and the searcher has to defend that cell. When the players occupy the same cell, the searcher captures the infiltrator with probability 1 ? z. The payoff to the hider is the probability that the hider reaches the last cell without getting captured. © 2002 John Wiley & Sons, Inc. Naval Research Logistics, 49: 1–14, 2002; DOI 10.1002/nav.1047  相似文献   
43.
对敌后侦察反军事诱骗的远程火力打击战法的定量分析是战役研究中尚未解决的关键问题之一,根据信息作战原理,运用仿真和统计学分析的混合方法,建立基于概率的二人非零和(TPNZS)非合作博弈模型,设计基于侦察与诱骗博弈的远程火力打击战法,定量分析我方的敌后侦察和敌方的军事诱骗对远程信息与火力联合打击能力的影响,并对一个典型实例的初步试验及分析结果表明:与敌后侦察和军事诱骗有关的正确识别目标和错误识别目标的概率以及远程火力命中目标的概率是评估远程信息与火力联合打击能力的关键,而对评估结果进行博弈分析则是远程火力打击战法设计的关键,用识别正确目标和错误目标能力以及远程火力命中目标能力描述的基于敌后侦察与诱骗博弈的远程火力最优打击战法为Δ*=(0,Δ2*,1-Δ2*)=(0.0000,0.7727,0.2273),被打击方对远程火力打击的最优战法为π*=(π1*,0,1-π1*)=(0.8511,0.0000,0.1489)。  相似文献   
44.
搜索路径给定时的最优搜索方案问题,也可以理解为是关于搜索者和目标的二人对策问题,主要讨论了当搜索路径给定时的单个搜索者和单个目标的搜索对策问题。首先根据问题的特点,利用动态规划和迭代的方法,确定关于目标逃逸路径混合策略的最优分区,证明该分区是多面体凸集;针对目标不同逃逸路径的分区,求出搜索者的最大期望收益,再将问题转化为二人有限零和对策,计算出搜索者的支付矩阵,确定最优搜索策略。最后结合海军护航行动,对我舰载直升机搜索小型海盗船进行分析和计算,说明搜索路径给定时的最优搜索对策对于双方的资源分配和提高搜索效率具有一定的应用价值。  相似文献   
45.
谷鑫  郑绍钰  张文鹏 《国防科技》2017,38(5):065-074
在军民融合发展战略与创新驱动发展战略深入推进进程中,军民融合产业创新集群成为军民融合产业发展的重要创新形式,其形成问题研究更是对其发展与演化具有重要影响。以军民融合产业创新集群的内涵着手,通过刺激—反应模型与演化博弈模型,分析其形成过程与促进措施。研究表明,军民融合产业创新集群作为复杂适应系统,创新主体的适应性能力及其内在关系是集群形成的关键所在;为使合作创新行为成为演化博弈的稳定策略,从合作创新能力系数和合作创新成本、拥有的创新资源以及政府资金支持三个方面剖析集群形成的促进作用,对军民融合产业创新集群的发展与演化研究奠定基础。  相似文献   
46.
Kovenock and Roberson's (2012a, b) replication of Hausken’s (2008a) equations and parameter restrictions do not enhance our insight into the defense and attack of reliability systems. This reply intends to fill the remaining understanding gaps.  相似文献   
47.
This paper uses game theory and modeling to address the role of incentive structures and information dynamics in nuclear inspections. The traditional argument is that compliant states should be willing to allow inspections to prove their innocence, while proliferating states are likely to impede inspections. This argument does not take into account the historical variation in inspection, signaling, and sanctioning behaviors. Using a game theoretic analysis and model, it is shown that the separation of proliferators from nonproliferators only occurs when the likelihood of proliferation is high and punishment costs are moderate. The model assumes that states can choose how much to cooperate with inspectors and must pay opportunity or secrecy costs when inspections are effective. The results are tested against a set of real-life cases, providing support for the claims of historical variation and the model's deductive propositions.  相似文献   
48.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
49.
In this article, we explore when firms have an incentive to hide (or reveal) their capacity information. We consider two firms that aim to maximize profits over time and face limited capacity. One or both of the firms have private information on their own capacity levels, and they update their beliefs about their rival's capacity based on their observation of the other firm's output. We focus on credible revelation mechanisms—a firm may signal its capacity through overproduction, compared to its myopic production levels. We characterize conditions when high‐capacity firms may have the incentive and capability to signal their capacity levels by overproduction. We show that prior beliefs about capacity play a crucial, and surprisingly complex, role on whether the firm would prefer to reveal its capacity or not. A surprising result is that, despite the fact that it may be best for the high‐capacity firm to overproduce to reveal its capacity when capacity information is private, it may end up with more profits than if all capacity information were public knowledge in the first place. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
50.
A rule that constrains decision‐makers is enforced by an inspector who is supplied with a fixed level of inspection resources—inspection personnel, equipment, or time. How should the inspector distribute its inspection resources over several independent inspectees? What minimum level of resources is required to deter all violations? Optimal enforcement problems occur in many contexts; the motivating application for this study is the role of the International Atomic Energy Agency in support of the Treaty on the Non‐Proliferation of Nuclear Weapons. Using game‐theoretic models, the resource level adequate for deterrence is characterized in a two‐inspectee problem with inspections that are imperfect in the sense that violations can be missed. Detection functions, or probabilities of detecting a violation, are assumed to be increasing in inspection resources, permitting optimal allocations over inspectees to be described both in general and in special cases. When detection functions are convex, inspection effort should be concentrated on one inspectee chosen at random, but when they are concave it should be spread deterministicly over the inspectees. Our analysis provides guidance for the design of arms‐control verification operations, and implies that a priori constraints on the distribution of inspection effort can result in significant inefficiencies. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号