全文获取类型
收费全文 | 206篇 |
免费 | 66篇 |
国内免费 | 15篇 |
出版年
2023年 | 6篇 |
2022年 | 4篇 |
2021年 | 12篇 |
2020年 | 4篇 |
2019年 | 6篇 |
2018年 | 2篇 |
2017年 | 10篇 |
2016年 | 14篇 |
2015年 | 6篇 |
2014年 | 26篇 |
2013年 | 14篇 |
2012年 | 20篇 |
2011年 | 20篇 |
2010年 | 13篇 |
2009年 | 11篇 |
2008年 | 14篇 |
2007年 | 18篇 |
2006年 | 8篇 |
2005年 | 12篇 |
2004年 | 12篇 |
2003年 | 8篇 |
2002年 | 4篇 |
2001年 | 4篇 |
2000年 | 9篇 |
1999年 | 5篇 |
1998年 | 6篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1989年 | 1篇 |
排序方式: 共有287条查询结果,搜索用时 15 毫秒
111.
112.
We consider two game‐theoretic settings to determine the optimal values of an issuer's interchange fee rate, an acquirer's merchant discount rate, and a merchant's retail price in a credit card network. In the first setting, we investigate a two‐stage game problem in which the issuer and the acquirer first negotiate the interchange fee rate, and the acquirer and the retailer then determine their merchant discount rate and retail price, respectively. In the second setting, motivated by the recent US bill “H.R. 2695,” we develop a three‐player cooperative game in which the issuer, the acquirer, and the merchant form a grand coalition and bargain over the interchange fee rate and the merchant discount rate. Following the cooperative game, the retailer makes its retail pricing decision. We derive both the Shapley value‐ and the nucleolus‐characterized, and globally‐optimal unique rates for the grand coalition. Comparing the two game settings, we find that the participation of the merchant in the negotiation process can result in the reduction of both rates. Moreover, the stability of the grand coalition in the cooperative game setting may require that the merchant should delegate the credit card business only to the issuer and the acquirer with sufficiently low operation costs. We also show that the grand coalition is more likely to be stable and the U.S. bill “H.R. 2695” is thus more effective, if the degree of division of labor in the credit card network is higher as the merchant, acquirer, and issuer are more specialized in the retailing, acquiring, and issuing operations, respectively. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012 相似文献
113.
We consider a stochastic partially observable system that can switch between a normal state and a transient abnormal state before entering a persistent abnormal state. Only the persistent abnormal state requires alarms. The transient and persistent abnormal states may be similar in appearance, which can result in excess false alarms. We propose a partially observable Markov decision process model to minimize the false alarm rate, subject to a given upper bound on the expected alarm delay time. The cost parameter is treated as the Lagrange multiplier, which can be estimated from the bound of the alarm delay. We show that the optimal policy has a control‐limit structure on the probability of persistent abnormality, and derive closed‐form bounds for the control limit and present an algorithm to specify the Lagrange multiplier. We also study a specialized model where the transient and persistent abnormal states have the same observation distribution, in which case an intuitive “watchful‐waiting” policy is optimal. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 320–334, 2016 相似文献
114.
分析间歇采样转发形成的假目标干扰对雷达CFAR检测的影响和间歇采样转发假目标生成机理,给出间歇采样转发假目标产生方法。在此基础上,以雷达一次搜索周期内虚警、漏警造成的检测代价作为检测性能指标,分别分析单元平均恒虚警检测器、有序恒虚警检测器、剔除和平均恒虚警检测器在间歇采样转发假目标干扰下的检测代价。着重分析间歇采样转发干扰关键参数对检测代价的影响。仿真结果表明,间歇采样转发产生的多个假目标显著提高了雷达的检测代价,检测代价受转发占空比、转发功率的影响较大,而受转发频率影响较小。在三种恒虚警检测器的对比中,剔除和平均恒虚警检测器相对于另两种检测器的检测代价更大些。 相似文献
115.
针对传统欺骗干扰难以对调频斜率极性捷变SAR形成有效干扰的问题,研究了对调频斜率极性捷变SAR进行欠采样转发干扰的方法。通过建立调频斜率极性捷变SAR有限时长欠采样转发干扰信号模型,分析欠采样转发干扰对调频斜率极性捷变SAR的干扰效果。给出假目标数目、位置以及幅度的理论计算公式,在此基础上讨论欠采样周期对干扰效果的影响。利用数字仿真验证了理论分析的正确性。 相似文献
116.
对来袭空中目标的威胁进行评估与排序是舰艇对空火力分配的重要一环。根据来袭空中目标的特点,在确定目标指标后进行相应量化,针对来袭目标各指标间非线性的特点,提出使用核主成分分析法对目标信息进行特征提取,随后依据核主成分方差贡献率对威胁目标进行评估与排序。通过仿真算例验证,所得结果较为准确、客观,有效地克服传统方法中主观性较强的问题,并且在对指标数据提取的过程中降低了相关信息维数,降低了计算复杂度,为舰艇防空作战威胁评估提供了新途径。 相似文献
117.
118.
119.
本文提出一种利用T/R-R型双基地系统识别欺骗式假目标的方法。在给出双基地系统数据相关算法的基础上,提出了真假目标的识别准则,仿真实验表明,该方法在电子战条件下识别欺骗式假目标是行之有效的。 相似文献
120.
田玉敏 《中国人民武装警察部队学院学报》1999,(5)
火灾中,起火建筑的内部构件以及相邻建筑物的外部构件都要受到火灾高温及火焰热的作用。本文定量评估了威胁上述建筑构件的火灾因素.旨在为人们综合考虑采取合理的防火技术措施提供理论依据。 相似文献