全文获取类型
收费全文 | 370篇 |
免费 | 52篇 |
国内免费 | 66篇 |
出版年
2022年 | 2篇 |
2021年 | 9篇 |
2020年 | 7篇 |
2019年 | 11篇 |
2018年 | 22篇 |
2017年 | 31篇 |
2016年 | 24篇 |
2015年 | 24篇 |
2014年 | 29篇 |
2013年 | 56篇 |
2012年 | 31篇 |
2011年 | 30篇 |
2010年 | 11篇 |
2009年 | 22篇 |
2008年 | 16篇 |
2007年 | 26篇 |
2006年 | 44篇 |
2005年 | 31篇 |
2004年 | 17篇 |
2003年 | 10篇 |
2001年 | 14篇 |
2000年 | 6篇 |
1999年 | 6篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1989年 | 1篇 |
排序方式: 共有488条查询结果,搜索用时 15 毫秒
381.
自Harris(1989)提出最小方差控制基准以来,控制性能评价与监控技术受到了极大的关注,并取得了大量的成果.学者们在最小方差基准的基础上提出了广义最小方差基准、用户定义基准、基于模型的基准等多种评价方法,并由最初的单输入单输出系统推广到了多输入多输出系统、时变系统等.仔细回顾了控制性能评价与监控理论的发展历程,并指出该领域面临的主要问题以及未来的发展方向. 相似文献
382.
从防空兵作战指挥的实际需求出发,利用概率论和防空作战运筹理论,描述了集中、分散、混合和平行等射击指挥方式的概念、特点及其相互关系,论述了射击指挥方式定量分析的基本方法、主要依据和指标,建立了基于群抗击效率的评估模型,在对多种射击指挥方式进行定量比较的基础上,揭示了射击指挥中具有普遍意义的、潜在的实用规则. 相似文献
383.
介绍了防空信息防御系统安全分析方法与流程.分析了防空信息防御作战的效能评估指标,由于诸指标主观性很强,普通的方法难以取得好的效果,而神经网络以其良好的非线性处理能力,为解决此问题提供了一个好的方法.对应用代数算法神经网络解决防空信息防御作战效能评估的方法问题进行了探讨.给出了代数算法及评估模型.并通过实例证明了方法的可行性,最后与一般的BP神经网络方法进行了对比,体现了该方法的先进性. 相似文献
384.
385.
Corine M. Laan Ana Isabel Barros Richard J. Boucherie Herman Monsuur Judith Timmer 《海军后勤学研究》2019,66(2):174-190
In this paper, we introduce partially observable agent‐intruder games (POAIGs). These games model dynamic search games on graphs between security forces (an agent) and an intruder given possible (border) entry points and high value assets that require protection. The agent faces situations with dynamically changing, partially observable information about the state of the intruder and vice versa. The agent may place sensors at selected locations, while the intruder may recruit partners to observe the agent's movement. We formulate the problem as a two‐person zero‐sum game, and develop efficient algorithms to compute each player's optimal strategy. The solution to the game will help the agent choose sensor locations and design patrol routes that can handle imperfect information. First, we prove the existence of ?‐optimal strategies for POAIGs with an infinite time horizon. Second, we introduce a Bayesian approximation algorithm to identify these ?‐optimal strategies using belief functions that incorporate the imperfect information that becomes available during the game. For the solutions of large POAIGs with a finite time horizon, we use a solution method common to extensive form games, namely, the sequence form representation. To illustrate the POAIGs, we present several examples and numerical results. 相似文献
386.
防空通信系统是保障防空指挥和控制有效性的重要手段,其效能的好坏将直接影响到作战结果.在分析效能评估方法的基础上,根据防空通信系统的特点,建立了防空通信系统综合评估指标体系.对防空通信系统的效能评估过程进行了描述,给出了效能评估模型和评估方法,并进行了实例分析.对全面而科学地评价防空通信系统的效能具有较强的实用性. 相似文献
387.
Albert Mauroni 《The Nonproliferation Review》2019,26(1-2):127-141
The US government initiated a Defense Counterproliferation Initiative to address the concern that, in the post-Cold War years, the proliferation of nuclear, biological, and chemical weapons would be widespread and create a significant challenge to the US military’s combat operations. In particular, non-nuclear states might use chemical or biological warfare agents against US forces with the belief that nuclear weapons would not be used against them in retaliation. Following the events of September 11, 2001, defense strategy and policy shifted to a wider view of the threat of adversarial use of “weapons of mass destruction” (WMD) and the term “counterproliferation” was replaced by “combating” or “countering WMD.” Over time, the Defense Department increasingly moved away from counterproliferation principles with the detrimental effect of losing capabilities that US forces still need for contemporary adversaries. This shift has been aggravated by other US government agencies’ use of “counterproliferation” in lieu of what would have been termed “nonproliferation” activities in the 1990s. The loss of clarity within the US government on these terms has led to the inability to focus the “whole of government” on this significant national security challenge. To alleviate this challenge, the US government needs a top-down initiative to refocus policy on the distinctly different aspects of WMD with respect to military combat operations, combating terrorism, and homeland security. 相似文献
388.
Lawrence E. Cline 《Defense & Security Analysis》2019,35(3):241-260
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities. 相似文献
389.
390.
针对当前武器优化分配算法缺少通用性,难以兼顾效率和时间的问题,提出了一种通用型舰载防空硬武器火力优化算法。该算法首先提取各舰载武器能够攻击的目标集合,然后对各武器的目标集合逐一进行时间分配,并计算对目标的毁伤概率,最终完成所有武器的分配。计算表明,该算法具有很好的通用性和实时性,可适用于较大规模舰载防空硬武器的火力优化分配问题。 相似文献