首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   340篇
  免费   39篇
  国内免费   62篇
  2022年   2篇
  2021年   10篇
  2020年   6篇
  2019年   11篇
  2018年   22篇
  2017年   29篇
  2016年   20篇
  2015年   19篇
  2014年   26篇
  2013年   47篇
  2012年   29篇
  2011年   30篇
  2010年   10篇
  2009年   19篇
  2008年   14篇
  2007年   24篇
  2006年   42篇
  2005年   28篇
  2004年   17篇
  2003年   10篇
  2001年   9篇
  2000年   6篇
  1999年   5篇
  1998年   1篇
  1997年   1篇
  1994年   2篇
  1993年   2篇
排序方式: 共有441条查询结果,搜索用时 0 毫秒
341.
介绍了防空信息防御系统安全分析方法与流程.分析了防空信息防御作战的效能评估指标,由于诸指标主观性很强,普通的方法难以取得好的效果,而神经网络以其良好的非线性处理能力,为解决此问题提供了一个好的方法.对应用代数算法神经网络解决防空信息防御作战效能评估的方法问题进行了探讨.给出了代数算法及评估模型.并通过实例证明了方法的可行性,最后与一般的BP神经网络方法进行了对比,体现了该方法的先进性.  相似文献   
342.
针对岸防炮兵雷达的特点和作战任务,从探测能力、定位能力、数据处理能力、目标识别能力、抗干扰能力、可用性、可靠性和生存能力8个指标层,建立岸防炮兵雷达作战效能评估的层次结构体系,并确定了指标体系综合指标的随机性和模糊性,运用模糊层次分析法对雷达效能进行综合评估,给出了确立各因素权重的方法.为该雷达作战使用提供了辅助决策的依据.  相似文献   
343.
In this paper, we introduce partially observable agent‐intruder games (POAIGs). These games model dynamic search games on graphs between security forces (an agent) and an intruder given possible (border) entry points and high value assets that require protection. The agent faces situations with dynamically changing, partially observable information about the state of the intruder and vice versa. The agent may place sensors at selected locations, while the intruder may recruit partners to observe the agent's movement. We formulate the problem as a two‐person zero‐sum game, and develop efficient algorithms to compute each player's optimal strategy. The solution to the game will help the agent choose sensor locations and design patrol routes that can handle imperfect information. First, we prove the existence of ?‐optimal strategies for POAIGs with an infinite time horizon. Second, we introduce a Bayesian approximation algorithm to identify these ?‐optimal strategies using belief functions that incorporate the imperfect information that becomes available during the game. For the solutions of large POAIGs with a finite time horizon, we use a solution method common to extensive form games, namely, the sequence form representation. To illustrate the POAIGs, we present several examples and numerical results.  相似文献   
344.
防空通信系统是保障防空指挥和控制有效性的重要手段,其效能的好坏将直接影响到作战结果.在分析效能评估方法的基础上,根据防空通信系统的特点,建立了防空通信系统综合评估指标体系.对防空通信系统的效能评估过程进行了描述,给出了效能评估模型和评估方法,并进行了实例分析.对全面而科学地评价防空通信系统的效能具有较强的实用性.  相似文献   
345.
The US government initiated a Defense Counterproliferation Initiative to address the concern that, in the post-Cold War years, the proliferation of nuclear, biological, and chemical weapons would be widespread and create a significant challenge to the US military’s combat operations. In particular, non-nuclear states might use chemical or biological warfare agents against US forces with the belief that nuclear weapons would not be used against them in retaliation. Following the events of September 11, 2001, defense strategy and policy shifted to a wider view of the threat of adversarial use of “weapons of mass destruction” (WMD) and the term “counterproliferation” was replaced by “combating” or “countering WMD.” Over time, the Defense Department increasingly moved away from counterproliferation principles with the detrimental effect of losing capabilities that US forces still need for contemporary adversaries. This shift has been aggravated by other US government agencies’ use of “counterproliferation” in lieu of what would have been termed “nonproliferation” activities in the 1990s. The loss of clarity within the US government on these terms has led to the inability to focus the “whole of government” on this significant national security challenge. To alleviate this challenge, the US government needs a top-down initiative to refocus policy on the distinctly different aspects of WMD with respect to military combat operations, combating terrorism, and homeland security.  相似文献   
346.
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities.  相似文献   
347.
简要分析了防空通信网络系统的主要任务,建立了防空通信网络系统的效能评估指标体系。提出了利用TOPSIS算法进行防空通信网络效能评估的方法,可根据影响通信网络系统效能的指标及权重,对不同组网方式下的防空通信网络系统效能进行评估。示例表明,利用TOPSIS算法可对防空通信网络效能进行评估排序,能够为指挥员的决策规划提供参考。  相似文献   
348.
针对当前武器优化分配算法缺少通用性,难以兼顾效率和时间的问题,提出了一种通用型舰载防空硬武器火力优化算法。该算法首先提取各舰载武器能够攻击的目标集合,然后对各武器的目标集合逐一进行时间分配,并计算对目标的毁伤概率,最终完成所有武器的分配。计算表明,该算法具有很好的通用性和实时性,可适用于较大规模舰载防空硬武器的火力优化分配问题。  相似文献   
349.
军队科研机构推进国防知识产权转化运用   总被引:1,自引:0,他引:1  
军队科研机构作为国家科技创新体系的重要组成部分,承担了大量科技创新任务,产生了许多具有自主知识产权的高水平科技成果,推动军队科研机构国防知识产权转化运用,是贯彻军民融合发展战略的必要途径。分析了军队科研机构国防知识产权转化的现状及制约转化的现实障碍,并结合实际探讨了推进军队科研机构国防知识产权转化的建议举措。  相似文献   
350.
Decision-making in defense acquisition programs in the Republic of Korea (ROK) has been problematic, especially in highly advanced complex systems. The highly disputed force modernization program for the ROK Air Force’s fifth-generation fighter, dubbed the Fighter eXperiment, went through extreme turbulence during the type selection phase. The gist of the turbulence became evident through poor institutional coordination within the defense acquisition authorities that eventually forced them to rescind the decision generated from their own yearlong efforts, thus basically shooting themselves on the foot. The paper highlights the background of the program and reviews the institutional elements that influenced the decision-making process, and conclude that the absence of an effective coordination mechanism has made decision-making in complex defense programs even more troublesome.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号