首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   598篇
  免费   89篇
  国内免费   44篇
  2024年   1篇
  2023年   3篇
  2022年   8篇
  2021年   14篇
  2020年   13篇
  2019年   13篇
  2018年   10篇
  2017年   23篇
  2016年   31篇
  2015年   24篇
  2014年   46篇
  2013年   51篇
  2012年   45篇
  2011年   49篇
  2010年   35篇
  2009年   55篇
  2008年   27篇
  2007年   39篇
  2006年   49篇
  2005年   39篇
  2004年   30篇
  2003年   25篇
  2002年   13篇
  2001年   17篇
  2000年   15篇
  1999年   6篇
  1998年   6篇
  1997年   4篇
  1996年   6篇
  1995年   7篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   8篇
  1990年   9篇
  1989年   2篇
排序方式: 共有731条查询结果,搜索用时 718 毫秒
111.
针对航空电子设备无失效数据可靠性分析问题,提出了weibull分布下基于Bayes理论的无失效数据分析方法,基于分层Bayes思想建立了模型,推导出可靠性参数后验分布计算公式,结合实例,验证了方法的有效性,结果表明,此方法计算结果符合工程实际,在其他电子设备可靠性分析中,有一定的借鉴意义.  相似文献   
112.
基于数字地图的威胁空间建模与仿真   总被引:1,自引:0,他引:1  
利用雷达地形遮蔽盲区进行低空突防对敌人地面目标进行攻击是航迹规划关键技术之一.在综合考虑作战区域地形、敌方防空力量等因素条件下,应用人工势场理论对威胁空间的威胁级别进行量化处理,建立了战区势场模型.通过仿真证明,该模型更加符合真实的战场环境,为战斗机任务规划特别是航迹规划提供了参考依据.  相似文献   
113.
人本主义教育思想在教育理念、教育目标、教育过程、教育方法、教育评价等方面均对德育具有借鉴意义。德育的目标指向:培育受教育者的完美人性;实施途径:强调受教育者的直接经验;德育模式:凸显受教育者的主体地位。  相似文献   
114.
通过不同时期国家战略部署、科研发展情况及经济承受能力对装备经费分配的影响分析,采用博弈的方法,建立了装备科研、购置和维修费之间的比例关系优化模型,给出了寻求纳什均衡点的迭代算法,并进行了仿真计算.仿真结果证明了该方法的可行性与正确性.  相似文献   
115.
气液两相管流流型识别理论研究进展   总被引:2,自引:0,他引:2  
综述了气液两相流流型识别理论及方法的研究进展。首先探讨了流型划分问题,然后针对水平管路、垂直管路及摇摆管路介绍了两相流流型转换机理及转换的边界条件;对于流型的在线识别,介绍了基于波动理论、神经网络和图像处理的流型识别方法。最后提出了气液两相管流流型识别中亟待开展的理论研究方向。  相似文献   
116.
在任职教育中开发学员任职经验的探讨   总被引:1,自引:0,他引:1  
任职教育是在受训学员有着一定的任职经验基础上,提高岗位任职能力的一种短期培训。在教学实施过程中,必须注重挖掘任职经验,交流任职经验,再把经验上升为理论从而去指导部队实践。这种任职经验的开发,有利于在教学过程中按需施教,扩大师生的视野,丰富教学资源,实现理论与实践的统一,有效达成任职教育的目标。  相似文献   
117.
前景理论(Prospect Theory,PT)描述了个体在不确定条件下的决策规律,较好地刻画了决策者的风险偏好。分析表明,PT在作战决策建模中具有一定的适用性和可行性。提出了一种基于PT的计算机生成兵力(Computer Generated Forces,CGF)Agent决策建模方法,给出了CGF Agent的建模框架,对CGF Agent决策过程中方案选择的具体步骤和算法进行了详细阐述。实验表明,所提出的方法在一定程度上提高了CGF Agent决策行为的真实性,证明了所提出方法的有效性。  相似文献   
118.
In this article, we develop a novel electric power supply chain network model with fuel supply markets that captures both the economic network transactions in energy supply markets and the physical network transmission constraints in the electric power network. The theoretical derivation and analysis are done using the theory of variational inequalities. We then apply the model to a specific case, the New England electric power supply chain, consisting of six states, five fuel types, 82 power generators, with a total of 573 generating units, and 10 demand market regions. The empirical case study demonstrates that the regional electric power prices simulated by our model match the actual electricity prices in New England very well. We also compute the electric power prices and the spark spread, an important measure of the power plant profitability, under natural gas and oil price variations. The empirical examples illustrate that in New England, the market/grid‐level fuel competition has become the major factor that affects the influence of the oil price on the natural gas price. Finally, we utilize the model to quantitatively investigate how changes in the demand for electricity influence the electric power and the fuel markets from a regional perspective. The theoretical model can be applied to other regions and multiple electricity markets under deregulation to quantify the interactions in electric power/energy supply chains and their effects on flows and prices. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
119.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
120.
Many manufacturers sell their products through retailers and share the revenue with those retailers. Given this phenomenon, we build a stylized model to investigate the role of revenue sharing schemes in supply chain coordination and product variety decisions. In our model, a monopolistic manufacturer serves two segments of consumers, which are distinguished by their willingness to pay for quality. In the scenario with exogenous revenue sharing ratios, when the potential gain from serving the low segment is substantial (e.g., the low‐segment consumers' willingness to pay is high enough or the low segment takes a large enough proportion of the market), the retailer is better off abandoning the revenue sharing scheme. Moreover, when the potential gain from serving the low (high) segment is substantial enough, the manufacturer finds it profitable to offer a single product. Furthermore, when revenue sharing ratios are endogenous, we divide our analysis into two cases, depending on the methods of cooperation. When revenue sharing ratios are negotiated at the very beginning, the decentralized supply chain causes further distortion. This suggests that the central premise of revenue sharing—the coordination of supply chains—may be undermined if supply chain parties meticulously bargain over it.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号