首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   686篇
  免费   10篇
  国内免费   2篇
  698篇
  2024年   1篇
  2023年   2篇
  2022年   3篇
  2021年   5篇
  2020年   8篇
  2019年   7篇
  2018年   6篇
  2017年   10篇
  2016年   20篇
  2015年   3篇
  2014年   49篇
  2013年   53篇
  2012年   42篇
  2011年   61篇
  2010年   63篇
  2009年   60篇
  2008年   46篇
  2007年   25篇
  2006年   19篇
  2005年   27篇
  2004年   36篇
  2003年   24篇
  2002年   7篇
  2001年   14篇
  2000年   18篇
  1999年   15篇
  1998年   20篇
  1997年   11篇
  1996年   13篇
  1995年   8篇
  1994年   9篇
  1993年   1篇
  1992年   1篇
  1991年   3篇
  1990年   6篇
  1988年   2篇
排序方式: 共有698条查询结果,搜索用时 0 毫秒
151.
鉴于干扰效果/效益评估在雷达干扰资源优化分配中的重要地位,提出了一种基于云模型和匈牙利算法的雷达干扰资源优化分配模型。利用一维云模型单条件单规则发生器和逆向云发生器构建了评估指标干扰效果推理器,利用基于风险态度因子的云模型映射函数定义了云模型之间距离的度量方法。提出了一种基于云模型与逼近理想解法的雷达干扰效益矩阵求解方法,最后运用匈牙利算法实现了干扰资源优化分配。将所建模型应用到干扰资源分配中,结果表明该模型能够较好的处理评估中的不确定性知识,是合理、可行的。  相似文献   
152.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
153.
    
This study addresses cyclic scheduling in robotic flowshops with bounded work‐in‐process (WIP) levels. The objective is to minimize the cycle time or, equivalently, to maximize the throughput, under the condition that the WIP level is bounded from above by a given integer number. We present several strongly polynomial algorithms for the 2‐cyclic robotic flowshop scheduling problems for various WIP levels. © 2010 Wiley Periodicals, Inc. Naval Research Logistics 58: 1–16, 2011  相似文献   
154.
    
Kovenock and Roberson's (2012a, b) replication of Hausken’s (2008a) equations and parameter restrictions do not enhance our insight into the defense and attack of reliability systems. This reply intends to fill the remaining understanding gaps.  相似文献   
155.
    
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   
156.
对敌后侦察反军事诱骗的远程火力打击战法的定量分析是战役研究中尚未解决的关键问题之一,根据信息作战原理,运用仿真和统计学分析的混合方法,建立基于概率的二人非零和(TPNZS)非合作博弈模型,设计基于侦察与诱骗博弈的远程火力打击战法,定量分析我方的敌后侦察和敌方的军事诱骗对远程信息与火力联合打击能力的影响,并对一个典型实例的初步试验及分析结果表明:与敌后侦察和军事诱骗有关的正确识别目标和错误识别目标的概率以及远程火力命中目标的概率是评估远程信息与火力联合打击能力的关键,而对评估结果进行博弈分析则是远程火力打击战法设计的关键,用识别正确目标和错误目标能力以及远程火力命中目标能力描述的基于敌后侦察与诱骗博弈的远程火力最优打击战法为Δ*=(0,Δ2*,1-Δ2*)=(0.0000,0.7727,0.2273),被打击方对远程火力打击的最优战法为π*=(π1*,0,1-π1*)=(0.8511,0.0000,0.1489)。  相似文献   
157.
软硬件协同设计技术目前已在嵌入式系统设计中得到广泛的应用。介绍了传统的设计方法与软硬件协同设计方法,重点就软硬件协同设计的过程进行了描述,以嵌入式电视图像缩放为例研究了图像缩放的实现算法,讨论了软硬件协同设计对军工产品的重大意义。  相似文献   
158.
针对舰载激光武器系统仿真技术发展要求和应用方向,通过对舰载激光武器系统组成、功能和作战过程的分析,归纳整理出一套较完整的舰载激光武器仿真模型,其中对激光能量传输仿真模型和毁伤效果仿真模型进行详细描述;并提出仿真软件设计方案,包括软件功能组成、软件结构、软件运行流程等仿真软件设计要点;最后介绍了软件的仿真输出结果。文中设计的仿真软件可支持舰载激光武器系统的设计开发,也可以应用到舰船新型防空反导火控系统仿真认证中。  相似文献   
159.
    
Assemble in Advance (AIA) policy reduces assembly cost due to advance planning, while Assemble to Order (ATO) policy eliminates assembly of excessive (more than demanded) units. The tradeoffs between the two policies have been studied in the past for single product environments. Moreover, it was shown that it is beneficial to employ AIA and ATO simultaneously. In this article, we study the employment of such a composite assembly policy in a multiproduct environment with component commonality. When common components are used, ATO may also enable us to benefit from the risk pooling effect. We provide important managerial insights such as: the multiperiod problem is myopic and changes in inventory levels due to the use of common components, and demonstrate the potential profit increase compared to other policies.© 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
160.
    
Burn‐in is a widely used method to improve the quality of products or systems after they have been produced. In this paper, we study burn‐in procedure for a system that is maintained under periodic inspection and perfect repair policy. Assuming that the underlying lifetime distribution of a system has an initially decreasing and/or eventually increasing failure rate function, we derive upper and lower bounds for the optimal burn‐in time, which maximizes the system availability. Furthermore, adopting an age replacement policy, we derive upper and lower bounds for the optimal age parameter of the replacement policy for each fixed burn‐in time and a uniform upper bound for the optimal burn‐in time given the age replacement policy. These results can be used to reduce the numerical work for determining both optimal burn‐in time and optimal replacement policy. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号