首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   377篇
  免费   92篇
  国内免费   13篇
  2022年   9篇
  2021年   5篇
  2020年   9篇
  2019年   12篇
  2018年   2篇
  2017年   14篇
  2016年   14篇
  2015年   8篇
  2014年   15篇
  2013年   23篇
  2012年   31篇
  2011年   20篇
  2010年   26篇
  2009年   39篇
  2008年   30篇
  2007年   35篇
  2006年   31篇
  2005年   18篇
  2004年   26篇
  2003年   14篇
  2002年   15篇
  2001年   13篇
  2000年   12篇
  1999年   13篇
  1998年   5篇
  1997年   7篇
  1996年   7篇
  1995年   11篇
  1994年   3篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1990年   4篇
  1989年   3篇
  1988年   1篇
排序方式: 共有482条查询结果,搜索用时 14 毫秒
161.
针对精确制导弹药制导控制系统低成本的迫切需求,提出了一种弹载低成本制导控制系统设计方法。建立了一种弹载制导控制系统低成本体系架构,从功能、硬件、软件等方面对其进行了GNC一体化设计,并在此基础上提出了一种基于ARM处理器的一体化制导计算机设计方法。针对MEMS导航系统精度低、噪声大特点,设计了一种惯性/卫星数字制导方案。该低成本制导控制系统设计方法可有效减少系统冗余硬件,降低成本,实现较高的制导控制精度,满足未来低成本精确制导武器的需求。  相似文献   
162.
This paper empirically examines whether the aging of a fleet affects operational availability and operating cost using a unique data-set on the 117 47-foot Motor Lifeboats (MLBs) of the United States Coast Guard (USCG). Procured from 1997 to 2003, the 47-foot MLB is the standard lifeboat of the USCG and all 117 MLBs remain in service. The aging of the MLB fleet has resulted in higher annual operating costs and lower operational availability, although the nature of this relationship remains unclear. Our estimation strategy utilizes an error components estimator to examine these issues. We employ three variants of the dependent variables (i.e. the standard logarithmic transformation as is most commonly seen in the literature, inverse hyperbolic sine [IHS], and level outcomes). The point estimates from the standard logarithmic model finds operational availability for the MLBs decreases at a rate between 0.83 and 1.8% per year and cost increases at a rate between 0.33 and 7.81% per year. Similar effects are shown with the IHS and level outcome specifications. In terms of nonlinearity effects, we find the most pronounced changes in operational availability and cost occur for MLBs aged 15 years or more (in comparison to younger MLBs).  相似文献   
163.
构造模型决策树时超参数较多,参数组合复杂,利用网格搜索等调参方法将会消耗大量的时间,影响模型性能的提升。提出了一种多核贝叶斯优化的模型决策树算法,该算法为应对不同分类数据特性,采用三种高斯过程建模寻优,利用贝叶斯优化技术,选出最优的参数组合。实验结果表明,所提算法在参数寻优上要优于传统的模型决策树寻优方法,并且能够在迭代次数不多的情况下找到全局最优参数值,在一定程度上提升了算法的分类性能,节省了大量的调参时间。  相似文献   
164.
个体活动识别对用户画像、个性化推荐、异常行为检测、群体行为分析和基于活动的资源配置优化具有重要价值。提出了一种基于稀疏的社交媒体签到数据的个体活动语义识别方法,从签到数据中提取活动行为的时间周期性和趋势性特征,并采用空间偏好量化算法,从个体与群体活动的空间关联中提取群体和个体的空间访问偏好,使用自然语言嵌入工具BERT模型提取访问兴趣点的语义。时间特征、空间偏好特征和访问兴趣点名称语义特征共同构成表征群体、个体偏好的时空联合特征,通过极限梯度提升分类器对其进行分类,得到活动语义识别结果。在Foursquare数据集上的对比实验和消融实验中验证了所提活动语义识别模型可以有效提升活动语义识别的准确性。  相似文献   
165.
传统的主动学习方法往往仅基于当前的目标模型来挑选样本,而忽略了历史模型所蕴含的对未标注样本预测稳定性的信息。因此,提出基于不稳定性采样的主动学习方法,依据历史模型的预测差异来估计每个未标注样本对提高模型性能的潜在效用。该方法基于历史模型对样本的预测后验概率之间的差异来衡量无标注样本的不稳定性,并挑选最不稳定的样本进行查询。在多个数据集上的大量实验结果验证了方法的有效性。  相似文献   
166.
报文分类是网络的基本功能,研究人员在过去二十年提出了众多解决方案,其中决策树报文分类算法由于吞吐量高、适用于多字段、可流水线化等特点受到了广泛关注和深入研究。本文介绍了决策树算法最新研究成果,阐述了决策树报文分类算法的几何意义、常用技术和测试基准,从节点切割技术和规则集分组技术两个维度对决策树算法进行了系统分析和归纳。针对两类常用的决策树构建技术介绍了其中的典型算法,对比了各种典型算法的设计思路和特点,分析了它们的适用场景。总结并展望了决策树算法的下一步研究方向。  相似文献   
167.
We consider the burglar problem in which a burglar can either retire or choose among different types of burglaries, with each type having its own success probability and reward distribution. Some general structural results are established and, in the case of exponentially distributed reward distributions, a solution technique is presented. The burglar problem's relationship to a stochastic knapsack problem with a random exponentially distributed knapsack capacity is shown. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 359–364, 2014  相似文献   
168.
In this article, we address a stochastic generalized assignment machine scheduling problem in which the processing times of jobs are assumed to be random variables. We develop a branch‐and‐price (B&P) approach for solving this problem wherein the pricing problem is separable with respect to each machine, and has the structure of a multidimensional knapsack problem. In addition, we explore two other extensions of this method—one that utilizes a dual‐stabilization technique and another that incorporates an advanced‐start procedure to obtain an initial feasible solution. We compare the performance of these methods with that of the branch‐and‐cut (B&C) method within CPLEX. Our results show that all B&P‐based approaches perform better than the B&C method, with the best performance obtained for the B&P procedure that includes both the extensions aforementioned. We also utilize a Monte Carlo method within the B&P scheme, which affords the use of a small subset of scenarios at a time to estimate the “true” optimal objective function value. Our experimental investigation reveals that this approach readily yields solutions lying within 5% of optimality, while providing more than a 10‐fold savings in CPU times in comparison with the best of the other proposed B&P procedures. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 131–143, 2014  相似文献   
169.
Unlike most of the literature, this paper includes domestic political considerations in which two countries must decide defensive countermeasures against a common terrorist threat. A delegation problem arises as voters strategically choose a policymaker whose preferences differ from their own. As a consequence, countries limit the presumed oversupply of defensive countermeasures. Thus, the inclusion of domestic politics gives a new perspective on counterterrorism. The timing of elections is also shown to make a difference.  相似文献   
170.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号