全文获取类型
收费全文 | 514篇 |
免费 | 141篇 |
国内免费 | 24篇 |
出版年
2024年 | 3篇 |
2023年 | 1篇 |
2022年 | 5篇 |
2021年 | 7篇 |
2020年 | 1篇 |
2019年 | 14篇 |
2018年 | 10篇 |
2017年 | 25篇 |
2016年 | 39篇 |
2015年 | 26篇 |
2014年 | 36篇 |
2013年 | 87篇 |
2012年 | 32篇 |
2011年 | 42篇 |
2010年 | 32篇 |
2009年 | 29篇 |
2008年 | 29篇 |
2007年 | 45篇 |
2006年 | 33篇 |
2005年 | 28篇 |
2004年 | 24篇 |
2003年 | 15篇 |
2002年 | 25篇 |
2001年 | 21篇 |
2000年 | 22篇 |
1999年 | 11篇 |
1998年 | 13篇 |
1997年 | 10篇 |
1996年 | 5篇 |
1995年 | 3篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 2篇 |
排序方式: 共有679条查询结果,搜索用时 31 毫秒
231.
摘要:利用泛函微分方程的度理论,研究一类具有时滞的Cohen-Grossberg神经网络的全局分支的存在性,研究结果为该类神经网络的应用设计提供理论基础. 相似文献
232.
Spencer Willardson 《Defense & Security Analysis》2013,29(1):42-53
One aspect of the global “War on Terror” that has received limited coverage in the academic literature is the problem of detained persons as it relates to intelligence. This is a surprising oversight, given the number of detainees that the USA has been responsible for (over 25,000 were in custody in Iraq alone at one time during its peak). The detention environment offers a prime strategic intelligence opportunity for the US intelligence community to study the tactics and organizations of individuals who have been removed from the overall conflict. In this article an easily implemented collection program is recommended to be deployed in US/coalition detention centers. The primary recommendation is to gather relational data on detainee communication, both authorized and illicit, and to use these data to perform network analyses of terrorist groups and their individual members. 相似文献
233.
Amy Z. Zeng 《海军后勤学研究》2013,60(1):31-45
In this article, we consider a generic electronic product that can be remanufactured or recycled at the end of its life cycle to generate new profit. We first describe the product return process and then present a customer segmentation model to capture consumers' different behaviors with respect to product return so that the retailer can work more effectively to increase the return volume. In regard to the collaboration between the retailer and the manufacturer, we explore a revenue‐sharing coordination mechanism for achieving a win‐win outcome. The optimality and sensitivity of the critical parameters in four strategies are obtained and examined both theoretically and numerically, which generate insights on how to manage an efficient consumer‐retailer‐manufacturer reverse supply chain, as well as on the feasibility of simplifying such a three‐stage chain structure. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
234.
235.
In this article we introduce a 2‐machine flowshop with processing flexibility. Two processing modes are available for each task: namely, processing by the designated processor, and processing simultaneously by both processors. The objective studied is makespan minimization. This production environment is encountered in repetitive manufacturing shops equipped with processors that have the flexibility to execute orders either individually or in coordination. In the latter case, the product designer exploits processing synergies between two processors so as to execute a particular task much faster than a dedicated processor. This type of flowshop environment is also encountered in labor‐intensive assembly lines where products moving downstream can be processed either in the designated assembly stations or by pulling together the work teams of adjacent stations. This scheduling problem requires determining the mode of operation of each task, and the subsequent scheduling that preserves the flowshop constraints. We show that the problem is ordinary NP‐complete and obtain an optimal solution using a dynamic programming algorithm with considerable computational requirements for medium and large problems. Then, we present a number of dynamic programming relaxations and analyze their worst‐case error performance. Finally, we present a polynomial time heuristic with worst‐case error performance comparable to that of the dynamic programming relaxations. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004. 相似文献
236.
Command and Control (C2) in a military setting can be epitomized in battles‐of‐old when commanders would seek high ground to gain superior spatial‐temporal information; from this vantage point, decisions were made and relayed to units in the field. Although the fundamentals remain, technology has changed the practice of C2; for example, enemy units may be observed remotely, with instruments of varying positional accuracy. A basic problem in C2 is the ability to track an enemy object in the battlespace and to forecast its future position; the (extended) Kalman filter provides a straightforward solution. The problem changes fundamentally if one assumes that the moving object is headed for an (unknown) location, or waypoint. This article is concerned with the new problem of estimation of such a waypoint, for which we use Bayesian statistical prediction. The computational burden is greater than an ad hoc regression‐based estimate, which we also develop, but the Bayesian approach has a big advantage in that it yields both a predictor and a measure of its variability. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004 相似文献
237.
未知非线性系统的神经网络建模与控制仿真研究 总被引:2,自引:1,他引:1
针对一类未知非线性系统的建模与控制问题,采用基于神经网络的多步预测控制算法进行了仿真研究,仿真对象选取控制工程界常用的单摆试验装置.该算法的实现步骤为:获取系统开环试验数据;辨识神经网络正向动态模型;设计非线性优化控制律.仿真研究结果表明,所提出的建模与控制方法是有效的. 相似文献
238.
研究一类具有变时滞的离散型随机BAM神经网络。通过构造Lyapunov泛函以及线性矩阵不等式(LMI),得出了离散系统全局渐近稳定的充分条件。 相似文献
239.
240.
利用小波包分析提取出齿轮箱在各种工况下振动信号的有效成分,根据时频域特点提取比较典型的特征参量,利用改进的BP网络进行训练,根据训练结果判别齿轮箱的故障状态。 相似文献