首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   762篇
  免费   130篇
  国内免费   72篇
  2024年   2篇
  2023年   3篇
  2022年   4篇
  2021年   12篇
  2020年   12篇
  2019年   23篇
  2018年   29篇
  2017年   55篇
  2016年   50篇
  2015年   34篇
  2014年   47篇
  2013年   124篇
  2012年   55篇
  2011年   56篇
  2010年   36篇
  2009年   49篇
  2008年   41篇
  2007年   65篇
  2006年   71篇
  2005年   52篇
  2004年   37篇
  2003年   25篇
  2002年   19篇
  2001年   24篇
  2000年   21篇
  1999年   8篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1994年   3篇
  1993年   3篇
  1990年   1篇
排序方式: 共有964条查询结果,搜索用时 15 毫秒
31.
技术预警是对技术突破和由此引起的军事、政治、经济和社会危机的预测,是从国家安全的根本利益出发,以保持己方军事优势、防止敌人"技术突袭"为宗旨的技术发展预测。研究回顾了国内外技术预警研究历程,从前期准备、预警清单、技术调查、分析评估等四个主要环节,全面分析国防领域技术预警的具体流程,为国防领域技术预警系统的构建与应用提供支撑。  相似文献   
32.
王磊  苏金波 《国防科技》2018,39(3):096-099,113
由于契约的不完全性、专用性资产的存在,导致民企参军的谈判过程中,一方可能利用另一方因专用性资产投资的锁定效应,而采取机会主义行为将另一方套牢,攫取可占用专用性准租金。这种套牢风险不是单向的,而是双向的,双向套牢风险的存在不仅会降低军品科研生产项目建设质量,而且还会严重挫伤民营企业承担军品科研生产任务的积极性。为有效防范双向套牢风险,本文将从博弈论的角度,建立民营企业与军队采办部门的期望收益与专用性资产投资的函数关系和博弈矩阵,分阶段讨论民营企业与军队采办部门所面临的套牢风险大小及各自的最佳行为选择。以降低民企参军面临的套牢风险,引导更多优势民营企业进入军品科研生产与维修领域,推动军民融合的深度发展。  相似文献   
33.
张正明  崔殿宁  高岑 《国防科技》2018,39(5):054-056
综合国防素质是在适应世界军事变革发展和国家安全新需要的基础上,对传统国防素质的一次改进与提升。与传统国防素质不同,综合国防素质强调的是对综合国防意识、综合国防知识以及综合国防技能的掌握和运用。新时代,弘扬和培育大学生综合国防素质是贯彻党的十九大精神、落实国家教育事业"十三五"规划部署的重要举措,对加快实施人才强国战略、实现新时代强军目标发挥着重要作用。  相似文献   
34.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
35.
It is well‐known that the efficient set of a multiobjective linear programming (MOLP) problem can be represented as a union of the maximal efficient faces of the feasible region. In this paper, we propose a method for finding all maximal efficient faces for an MOLP. The new method is based on a condition that all efficient vertices (short for the efficient extreme points and rays) for the MOLP have been found and it relies on the adjacency, affine independence and convexity results of efficient sets. The method uses a local top‐down search strategy to determine maximal efficient faces incident to every efficient vertex for finding maximal efficient faces of an MOLP problem. To our knowledge, the proposed method is the first top‐down search method that uses the adjacency property of the efficient set to find all maximal efficient faces. We discuss this and other advantages and disadvantages of the algorithm. We also discuss some computational experience we have had with our computer code for implementing the algorithm. This computational experience involved solving several MOLP problems with the code.  相似文献   
36.
Some U.S. military leaders have asserted that the United States, Japan, Australia, and India and the Republic of Korea are developing multilateral defense cooperation to deter aggression and uphold norms much like North Atlantic Treaty Organization (NATO) has in Europe. Frequent military exercises and China’s threats to freedom of navigation (FoN) and North Korea’s nuclear missiles comprise the motive force for such cooperation. However, cooperation thus far has been trilateral and minimal, given divergent national interests and dispersed geopolitical locations. Cooperation among Japan, Republic of Korea (ROK), and the United States is increasing given the threat, but ROK’s public opinion is divided about Japan. Australia, Japan, and India have increased cooperation with the United States but are reluctant to conduct FoN operations with the United States to challenge China’s expansionism in the South China Sea. If China becomes more aggressive and blocks FoN or seizes territory, development toward an Asian NATO is possible.  相似文献   
37.
通过不同时期国家战略部署、科研发展情况及经济承受能力对装备经费分配的影响分析,采用博弈的方法,建立了装备科研、购置和维修费之间的比例关系优化模型,给出了寻求纳什均衡点的迭代算法,并进行了仿真计算.仿真结果证明了该方法的可行性与正确性.  相似文献   
38.
对模糊入侵事件进行了描述,分析了模糊入侵事件间的相似性,提出了基于模糊ECA规则的入侵检测知识表示方法,并阐述了模糊ECA规则的分析过程,以解决入侵行为的不确定性。  相似文献   
39.
装备采办中的讨价还价博弈模型   总被引:1,自引:0,他引:1  
竞争性谈判是一种重要的武器装备采办方式,军方与承包商之间的谈判是一个重复博弈过程,双方谈判的本质是讨价还价。分析了轮流出价的讨价还价模型,对轮流出价博弈的子博弈精炼均衡进行了论述;在轮流出价模型的基础上建立了同时出价的讨价还价模型,并对2种模型的特点进行了分析;通过案例对2个模型的均衡结果进行了对比。分析结果显示:同时出价的讨价还价模型更能有效解决实际问题,更具有现实意义。  相似文献   
40.
We study the assignment of flexible servers to stations in tandem lines with service times that are not necessarily exponentially distributed. Our goal is to achieve optimal or near‐optimal throughput. For systems with infinite buffers, it is already known that the effective assignment of flexible servers is robust to the service time distributions. We provide analytical results for small systems and numerical results for larger systems that support the same conclusion for tandem lines with finite buffers. In the process, we propose server assignment heuristics that perform well for systems with different service time distributions. Our research suggests that policies known to be optimal or near‐optimal for Markovian systems are also likely to be effective when used to assign servers to tasks in non‐Markovian systems. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号