首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1333篇
  免费   329篇
  国内免费   256篇
  1918篇
  2024年   2篇
  2023年   7篇
  2022年   17篇
  2021年   38篇
  2020年   21篇
  2019年   32篇
  2018年   23篇
  2017年   57篇
  2016年   85篇
  2015年   58篇
  2014年   137篇
  2013年   95篇
  2012年   125篇
  2011年   115篇
  2010年   69篇
  2009年   122篇
  2008年   94篇
  2007年   116篇
  2006年   106篇
  2005年   121篇
  2004年   89篇
  2003年   63篇
  2002年   52篇
  2001年   52篇
  2000年   44篇
  1999年   41篇
  1998年   42篇
  1997年   18篇
  1996年   20篇
  1995年   6篇
  1994年   17篇
  1993年   7篇
  1992年   7篇
  1991年   9篇
  1990年   7篇
  1989年   2篇
  1988年   2篇
排序方式: 共有1918条查询结果,搜索用时 0 毫秒
91.
SIMULINK仿真过程中的动态数据传递研究   总被引:1,自引:0,他引:1  
针对大型复杂控制系统仿真建模中所遇到的动态数据传递问题,研究了初始数据和参数的统一装订方法,仿真过程中数据的动态输入和输出方法以及状态变量的实时切换方法。这些方法灵活方便,对于大型复杂系统的仿真建模十分有益。  相似文献   
92.
分布式结构的坦克火控仿真系统的研究   总被引:1,自引:0,他引:1  
采用现代仿真技术,分布式结构战车火控仿真系统在完成火控系统动态特性仿真任务后,可实现新火控系统研制过程的先期技术演示,并可为装备论证研究提供先进的仿真手段。此外还分析了以DIS结构接入到作战仿真系统的可能性和现实性。  相似文献   
93.
针对当前武器系统作战模拟不易于使用的观状,探讨了建立武器系统作战模拟多媒体表现环境的概念、方法和必要性,从总体上研究了武器系统作战模拟多媒体表观环境的系统结构、功能要求和实现过程。  相似文献   
94.
主要论述了某型空空导弹实现3维实时动态数字仿真的思路和方法,首先建立3维空战模型,然后通过一定的计算方法和编程技巧实现了数字仿真的实时性。在数字仿真实时性的基础上,实现了导弹攻击目标过程的3维动态图形显示。  相似文献   
95.
介绍一个动态互连全透明模拟训练系统设计过程,运用二级分布式结构实现实时模拟,并给出了某型导弹火力控制模拟系统硬件和多媒体软件结构模式  相似文献   
96.
航空集群协同探测问题,是集群作战研究的重要内容,其中对隐身目标在不同机动,不同极化方式下的集群动态RCS研究是重点和难点问题。在双基地雷达建模和坐标转换的前提下,对隐身目标的两种典型机动——匀加速机动和匀速转弯机动进行建模,在HH、VV两种极化方式下,运用线性插值法对动态RCS进行时序分析。仿真结果表明,两种机动模型下,随着时间变化,动态RCS起伏波动较大,在匀加速运动模型下,HH、VV极化所引起的RCS差异性较大,匀速转弯模型下,不同极化方式带来的影响较小。  相似文献   
97.
During the period 1996–2006, the Communist Party of Nepal (Maoist) waged overt people’s war to seize state power and institute a new order that realized the party’s understanding of ‘New Democracy’ as posited by Mao Tse-tung. Contextual shifts led to a crucial strategic turning point in September 2005, when the Maoists agreed to a united front with estranged legal parties to oust the monarchy and establish a republic. Though touted as acceptance of political reintegration, the move was tactical rather than strategic. The party had no intention of supporting a parliamentary version of democracy and thus, 2006–2016, engaged in a covert effort to seize power. Central to this effort was the paramilitary Young Communist League (YCL), the members of which responded to inflammatory party verbiage and exhortations with attacks upon rival political actors. These attacks, academically and legally, were terrorism and offered a salient illustration of intra-state unrestricted warfare. Ultimately, organizational, national, and regional circumstances caused the main Maoist movement to move decisively away from its covert approach. By that time, however, radical splinters had embraced the use of terrorism against rival political actors, creating a situation whereby local politics is yet a dangerous endeavor in certain areas and at certain times.  相似文献   
98.
Insurgencies thrive in regions where government legitimacy is absent. In the post-war Philippines, Captain Charles T. R. Bohannan of the Army’s Counter Intelligence Corps became actively aware of this dynamic. Bohannan is best known for his later work with Edward Lansdale and Ramon Magsaysay in defeating the Huk Rebellion (1950–1954). Here the author examines Bohannan’s early investigative work against Japanese war criminals, wartime Filipino collaborators, and the rising threat of communist subversion most associated with the Huk. All of these experiences fed into what would be the successful campaign against the Huk, chronicled in his seminal work, Counter Guerrilla Operations: The Philippines Experience, and offers lessons on the investigative (as opposed to tactical or psychological) nature of effective counter-insurgency work, as it relates to both legitimacy in governance and the rise of insurgencies.  相似文献   
99.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   
100.
Design and management of complex systems with both integer and continuous decision variables can be guided using mixed‐integer optimization models and analysis. We propose a new mixed‐integer black‐box optimization (MIBO) method, subspace dynamic‐simplex linear interpolation search (SD‐SLIS), for decision making problems in which system performance can only be evaluated with a computer black‐box model. Through a sequence of gradient‐type local searches in subspaces of solution space, SD‐SLIS is particularly efficient for such MIBO problems with scaling issues. We discuss the convergence conditions and properties of SD‐SLIS algorithms for a class of MIBO problems. Under mild conditions, SD‐SLIS is proved to converge to a stationary solution asymptotically. We apply SD‐SLIS to six example problems including two MIBO problems associated with petroleum field development projects. The algorithm performance of SD‐SLIS is compared with that of a state‐of‐the‐art direct‐search method, NOMAD, and that of a full space simplex interpolation search, Full‐SLIS. The numerical results suggest that SD‐SLIS solves the example problems efficiently and outperforms the compared methods for most of the example cases. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 305–322, 2017  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号