首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2026篇
  免费   544篇
  国内免费   324篇
  2894篇
  2024年   5篇
  2023年   16篇
  2022年   19篇
  2021年   37篇
  2020年   42篇
  2019年   34篇
  2018年   30篇
  2017年   96篇
  2016年   146篇
  2015年   92篇
  2014年   174篇
  2013年   185篇
  2012年   183篇
  2011年   167篇
  2010年   105篇
  2009年   179篇
  2008年   116篇
  2007年   165篇
  2006年   200篇
  2005年   157篇
  2004年   148篇
  2003年   103篇
  2002年   94篇
  2001年   82篇
  2000年   55篇
  1999年   63篇
  1998年   43篇
  1997年   34篇
  1996年   22篇
  1995年   19篇
  1994年   15篇
  1993年   15篇
  1992年   17篇
  1991年   15篇
  1990年   15篇
  1989年   5篇
  1987年   1篇
排序方式: 共有2894条查询结果,搜索用时 15 毫秒
961.
文章给出防空导弹轨道实时优化射表的计算方法。首先介绍最优轨道对参数的连续依赖性和优化算法的算法模型的收敛性理论。特别对于每条最优轨道存在一个吸引区域 D* ,使得只要初始迭代轨道属于这个区域 ,由算法模型构造的轨道序列将收敛到所要的最优轨道。根据这个理论 ,设计了计算射表的延拓法。理论证明和计算实践证实由这种算法能有效地计算为实时优化提供初始迭代值的射表  相似文献   
962.
弹道导弹落点预报的雷达系统仿真   总被引:1,自引:0,他引:1  
根据弹道理论建立了雷达探测弹道导弹的仿真模型 ,并对仿真的雷达探测跟踪弹道数据给出了处理方法 ,预报了导弹落点范围 ,并与理论落点进行了比较 ,给出落点精度。仿真结果表明 :雷达对导弹的探测数据经过一定数据处理 ,可得到预定的落点精度 ,说明该种仿真方法是可行的  相似文献   
963.
被动寻的制导技术的新进展   总被引:1,自引:0,他引:1  
反辐射武器是电子对抗中硬杀伤的重要手段。在现代战争中 ,以其显著的突出性和隐蔽性赢得胜利。简要地介绍了反辐射武器的核心———被动寻的制导技术近年来的新技术、新动向及其应用情况  相似文献   
964.
基于遗传算法的目标分配问题研究   总被引:11,自引:2,他引:11  
通过对地空导弹部队射击指挥中目标分配问题的分析,建立了目标优化分配数学模型。在此基础上,给合遗传算法对模型进行求解。通过在具体实例中的应用表明,采用遗传算法为有效地解决这一复杂组合优化问题提供了一种新途径。  相似文献   
965.
This paper investigates the multivariate Polya distribution (MPD) for application in combat models for which enemy targets must be randomly assigned to fighting units. Six sets of actual combat data motivate the allocation model. Scenarios include air‐to‐air combat, tank, and submarine warfare. Goodness of fit tests are derived which verify the validity of the MPD, and reinforce the notion that multinomial allocation is too simplistic for such combat models. Simulations to determine optimal allocations for minimal combat cost are applied in order to illustrate the role of the MPD in combat modeling. © 2001 John Wiley & Sons,Inc. Naval Research Logistics 48: 1–17, 2001  相似文献   
966.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
967.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
968.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
969.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
970.
《防务技术》2014,10(2):198-210
The ability to predict the natural fragmentation of an explosively loaded metal casing would represent a significant achievement. Physically-based material models permit the use of small scale laboratory tests to characterise and validate their parameters. The model can then be directly employed to understand and design the system of interest and identify the experiments required for validation of the predictions across a wide area of the performance space. This is fundamentally different to the use of phenomenologically based material algorithms which require a much wider range of characterisation and validation tests to be able to predict a reduced area of the performance space. Eulerians numerical simulation methods are used to describe the fragmentation of thick walled EN24 steel cylinders filled with PBXN-109 explosive. The methodology to characterise the constitutive response of the material using the physically based Armstrong–Zerilli constitutive model and the Goldthorpe path dependent fracture model is described, and the results are presented. The ability of an Eulerian hydrocode to describe the fragmentation process and reproduce the experimentally observed fragment mass and velocity distributions is presented and discussed. Finally the suitability of the current experimental analysis methodology for simulation validation is addressed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号