首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   119篇
  免费   48篇
  国内免费   13篇
  180篇
  2023年   3篇
  2021年   4篇
  2020年   3篇
  2019年   6篇
  2018年   7篇
  2017年   8篇
  2016年   8篇
  2015年   6篇
  2014年   9篇
  2013年   11篇
  2012年   8篇
  2011年   12篇
  2010年   8篇
  2009年   13篇
  2008年   11篇
  2007年   3篇
  2006年   9篇
  2005年   11篇
  2004年   5篇
  2003年   2篇
  2002年   4篇
  2001年   5篇
  2000年   1篇
  1999年   6篇
  1998年   4篇
  1997年   2篇
  1994年   2篇
  1992年   1篇
  1991年   3篇
  1990年   4篇
  1989年   1篇
排序方式: 共有180条查询结果,搜索用时 0 毫秒
61.
提出了一种基于混杂端口(hybridport)的VLAN设计方案。通过这种方式设计,在提高网络安全性的同时,避免了IP地址紧缺的问题。最后给出了基于华为交换机的混杂端口VLAN设计方案。  相似文献   
62.
现有的网络事件关联系统主要存在以下不足:各被管设备感知的大量告警事件全部传送到管理端处理,会带来很多传输与事件管理问题;现有的网络事件关联方法很不成熟,一般只涉及底层协议告警事件的关联.在分析网络告警与故障关系的基础上,提出了一种在设备这一级驻留代理,采用贝叶斯网络推理技术完成包括应用层告警事件在内的本地告警事件纵向关联方法.并在描述协议栈各层协议实体模型的基础上,给出了利用AdventNet API和ebayes进行系统具体实现的方法.  相似文献   
63.
针对机载雷达信号的复杂性和模糊性等特点,提出一种D-S(登普斯特-谢弗)证据理论和模糊理论组合应用的方法用于对机载雷达的识别。通过对信号的积累和对信任度(模糊隶属度)的重新分配,有效地解决了机载雷达信号的不确定性问题以及如何利用信号在时间上的冗余信息问题,提高了信号的正确识别率。仿真实验和正确识别率的统计结果验证了这种方法十分有效。  相似文献   
64.
ABDARDSS中基于候选消除学习算法的知识推理   总被引:1,自引:0,他引:1  
飞机战伤评估和修理的知识表示与推理机制,是建立飞机战伤评估与修理决策支持系统(ABDARDSS)需要解决的一个关键问题.采用一种候选消除算法来提取战伤评估与修理样本数据的变型空间,以变型空间实现战伤评估与修理决策支持系统中的知识表示和推理.对于ABDARDSS来说,候选消除学习算法是一种新的有效的知识推理方法.  相似文献   
65.
人工智能技术在众多领域获得广泛应用.为满足现代战争对防化指挥手段的现代化要求,针对不易量化的防化指挥决策问题的评估,提出了构建知识库并应用模糊推理机制建立专家系统,据此进行防化保障预案的评估选优方法,并对该方法的求解过程进行了探讨.  相似文献   
66.
Most scheduling problems are notoriously intractable, so the majority of algorithms for them are heuristic in nature. Priority rule‐based methods still constitute the most important class of these heuristics. Of these, in turn, parametrized biased random sampling methods have attracted particular interest, due to the fact that they outperform all other priority rule‐based methods known. Yet, even the “best” such algorithms are unable to relate to the full range of instances of a problem: Usually there will exist instances on which other algorithms do better. We maintain that asking for the one best algorithm for a problem may be asking too much. The recently proposed concept of control schemes, which refers to algorithmic schemes allowing to steer parametrized algorithms, opens up ways to refine existing algorithms in this regard and improve their effectiveness considerably. We extend this approach by integrating heuristics and case‐based reasoning (CBR), an approach that has been successfully used in artificial intelligence applications. Using the resource‐constrained project scheduling problem as a vehicle, we describe how to devise such a CBR system, systematically analyzing the effect of several criteria on algorithmic performance. Extensive computational results validate the efficacy of our approach and reveal a performance similar or close to state‐of‐the‐art heuristics. In addition, the analysis undertaken provides new insight into the behaviour of a wide class of scheduling heuristics. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 201–222, 2000  相似文献   
67.
This paper considers the statistical analysis of masked data in a series system, where the components are assumed to have Marshall‐Olkin Weibull distribution. Based on type‐I progressive hybrid censored and masked data, we derive the maximum likelihood estimates, approximate confidence intervals, and bootstrap confidence intervals of unknown parameters. As the maximum likelihood estimate does not exist for small sample size, Gibbs sampling is used to obtain the Bayesian estimates and Monte Carlo method is employed to construct the credible intervals based on Jefferys prior with partial information. Numerical simulations are performed to compare the performances of the proposed methods and one data set is analyzed.  相似文献   
68.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   
69.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
70.
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号